Artigos de revistas sobre o tema "Security of IoT"

Siga este link para ver outros tipos de publicações sobre o tema: Security of IoT.

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Security of IoT".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Jogdand, Gopal, Shubham Kadam, Kiran Patil e Gaurav Mate. "Iot Transaction Security". Journal of Advances and Scholarly Researches in Allied Education 15, n.º 2 (1 de abril de 2018): 711–16. http://dx.doi.org/10.29070/15/57056.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Abosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan e Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications". Sensors 21, n.º 11 (24 de maio de 2021): 3654. http://dx.doi.org/10.3390/s21113654.

Texto completo da fonte
Resumo:
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications. This paper mainly classifies the attacks and possible security solutions regarding IoT layers architecture. Consequently, each attack is connected to one or more layers of the architecture accompanied by a literature analysis on the various IoT security countermeasures. It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems. Additionally, there is a discussion of the emerging tools and simulations used for testing and evaluating security mechanisms in IoT applications. Last, this survey outlines several other relevant research issues and challenges for IoT/IIoT security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Toka, K. O., Y. Dikilitaş, T. Oktay e A. Sayar. "SECURING IOT WITH BLOCKCHAIN". International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (23 de dezembro de 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.

Texto completo da fonte
Resumo:
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most of the security deficiencies of heavily IoT based systems. The Hyperledger Fabric blockchain network used in this study provides confidentiality, data integrity, authentication, and data security for data obtained from IoT devices. Widely used IoT data transfer MQTT protocol is included in the proposed approach. The approach is demonstrated in a simple demo Hyperledger network with simulated IoT devices. The proposed approach is discussed in terms of network security dimensions. Based on the features of the Hyperledger Blockchain network, it is displayed that the IoT security deficiencies can largely be remedied with the proposed approach.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Kotaiah, Dharavath, e Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security". International Journal for Research in Applied Science and Engineering Technology 11, n.º 3 (31 de março de 2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.

Texto completo da fonte
Resumo:
Abstract: With the accelerating pace of technological advancement, demand for IoT app development is at an all-time high. Statistic predicts that $1.1 trillion will be spent globally on IoT. (approx.).Modern IoT apps and solutions will unquestionably become more popular as a result of this. Who will get the newest item into consumers' hands first among manufacturers is still a point of contention. Companies can profit much from IoT app development, but one of the key considerations is security. This post focused on IoT security issues and solutions. IoT solutions can be implemented by businesses of any size and in any industry to boost productivity and customer satisfaction. This article all about the security of IoT and IIoT how to overcome them. Organizations regardless of industry and size can make IoT solutions a part of their business to increase customer satisfaction and efficiency.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Raimundo, Ricardo Jorge, e Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management". Applied Sciences 12, n.º 3 (2 de fevereiro de 2022): 1598. http://dx.doi.org/10.3390/app12031598.

Texto completo da fonte
Resumo:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited, as far as machine resources are concerned. In this way, traditional security does not fit in IoT systems. The issue of cybersecurity has become paramount to the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) in mitigating cybersecurity risk for organizations and end users. New cybersecurity technologies/applications present improvements for IoT security management. Nevertheless, there is a gap in the effectiveness of IoT cyber risk solutions. This review article discusses the literature trends around opportunities and threats in cybersecurity for IIoT, by reviewing 70 key articles discovered from a profound Scopus literature survey. It aims to present the current debate around the issue of IIoT rather than suggesting any particular technical solutions to solve network security problems.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Alkunidry, Dona, Shahad Alhuwaysi e Rawan Alharbi. "Security Threads and IoT Security". Journal of Computer and Communications 11, n.º 09 (2023): 76–83. http://dx.doi.org/10.4236/jcc.2023.119005.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Alasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things". Mathematics 11, n.º 12 (15 de junho de 2023): 2710. http://dx.doi.org/10.3390/math11122710.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) has experienced significant growth and is now a fundamental part of the next-generation Internet. Alongside improving daily life, IoT devices generate and collect vast amounts of data that can be leveraged by AI-enabled big data analytics for diverse applications. However, due to the machine-to-machine communication inherent in IoT, ensuring data security and privacy is crucial to mitigate various malicious cyber attacks, including man-in-the-middle, impersonation, and data poisoning attacks. Nevertheless, designing an efficient and adaptable IoT security framework poses challenges due to the limited computational and communication power of IoT devices, as well as their wide-ranging variety. To address these challenges, this paper proposes an Access Key Agreement (AKA) scheme called the “Reliable Device-Access Framework for the Industrial IoT (RDAF-IIoT)”. RDAF-IIoT verifies the user’s authenticity before granting access to real-time information from IIoT devices deployed in an industrial plant. Once authenticated at the gateway node, the user and IIoT device establish a session key for future encrypted communication. The security of the proposed RDAF-IIoT is validated using a random oracle model, while the Scyther tool is employed to assess its resilience against various security attacks. Performance evaluations demonstrate that the proposed scheme requires lower computational and communication costs compared to related security frameworks while providing enhanced security features.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Ma, Jinnan, Xuekui Shangguan e Ying Zhang. "IoT Security Review: A Case Study of IIoT, IoV, and Smart Home". Wireless Communications and Mobile Computing 2022 (21 de agosto de 2022): 1–10. http://dx.doi.org/10.1155/2022/6360553.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) acts as a tremendous network that is constructed by fusing diverse sensors. IoT can achieve the interconnection of individuals, things, and machines at any place and time and improve the function performance of network applications. However, the security of IoT has always been a major problem that may limit the application perspective of IoT technologies. Nowadays, industrial IOT (IIoT), Internet of vehicles (IoV), and smart home have become the three primary emerging perspectives of the current IoT studies, and it is necessary to systematically highlight the security analysis of these three types of scenarios. Hence, in this paper, guided by the three major IoT application scenarios, i.e., IIoT, IoV, and smart home, we sum up the development status of IoT security technologies, analyzed corresponding technical difficulties, and discussed several future outlook of challenges and development trends for the IoT technology.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Saidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich e Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy". ACADEMICIA: An International Multidisciplinary Research Journal 11, n.º 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Usman, Sahnius, Shahnurin Khanam Sanchi, Muhammad Idris e Sadiq Abubakar Zagga. "SECURING IOT HEALTHCARE APPLICATIONS AND BLOCKCHAIN: ADDRESSING SECURITY ATTACKS". International Journal of Software Engineering and Computer Systems 9, n.º 2 (29 de julho de 2023): 119–28. http://dx.doi.org/10.15282/ijsecs.9.2.2023.5.0116.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) describes the connection of bodily devices as "things" that can communicate with other systems and devices through the Internet and exchange statistics (data or information), facilitating the exchange of data with other systems and devices. These devices have sensors, software, and various components designed to exchange data seamlessly within the IoT network. Securing and protecting the data transmitted over the Internet from unauthorized access is imperative to ensuring the integrity and confidentiality of the information. IoT Smart health monitoring systems, integral components of the IoT landscape, are susceptible to various attacks. These include denial of service (DoS), fingerprint, router, select, forwarding, sensor, and replay attacks, all of which pose significant threats to the security of these systems. As such, there is a pressing need to address and mitigate the vulnerabilities associated with IoT healthcare applications. This paper aims to explore the significant role of IoT devices in healthcare systems and provide an in-depth review of attacks that threaten the security of IoT healthcare applications. The study analyses the existing literature on the vulnerabilities present in smart health monitoring systems and the potential application of blockchain technology as a robust solution to enhance the security of IoT healthcare applications. This research reveals critical vulnerabilities in IoT healthcare applications and highlights blockchain's effectiveness in mitigating them, providing insights for robust security measures and strategic decision-making in secure healthcare systems. This paper provides valuable insight and recommendations for policymakers, researchers, and practitioners involved in the domain of the IoT healthcare system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Nurrisma. "Information System Security Analysis in the Internet of Things (IoT) Era". Journal Informatic, Education and Management (JIEM) 5, n.º 1 (13 de fevereiro de 2023): 16–20. http://dx.doi.org/10.61992/jiem.v5i1.71.

Texto completo da fonte
Resumo:
The presence of the Internet of Things (IoT) has provided a new foundation in the development of information systems, but has also raised new challenges related to information security. This research aims to analyze the level of information system security in the context of the IoT era. The research methods used include an in-depth literature survey and critical analysis of security frameworks relevant to IoT. The research results show that while IoT offers great potential to increase efficiency and convenience, it also opens up new avenues for complex and serious security attacks. Security threats related to IoT include network attacks, data theft, and unauthorized access. To overcome this challenge, a holistic and layered approach is needed in securing information systems connected via IoT. The importance of implementing strong security protocols, data encryption, and continuous monitoring of IoT networks cannot be overstated. In conclusion, the success of widespread IoT implementation will be largely determined by efforts to strengthen the security of the information systems involved.
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad". International Journal of Interactive Mobile Technologies (iJIM) 15, n.º 24 (21 de dezembro de 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.

Texto completo da fonte
Resumo:
Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices.
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Mashiya Afroze F e Dr. Jose Reena K. "A Survey Study on IoT Application and its Attacks". International Research Journal on Advanced Engineering Hub (IRJAEH) 2, n.º 02 (23 de fevereiro de 2024): 80–86. http://dx.doi.org/10.47392/irjaeh.2024.0016.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) has witnessed exponential growth in recent years, with billions of interconnected devices seamlessly communicating and exchanging data. While IoT offers unprecedented opportunities for innovation and convenience, it also introduces a plethora of security challenges. This abstract provides an overview of the key security concerns in IoT and explores emerging solutions to address them. Security in IoT is paramount due to the potential consequences of breaches. IoT devices are often resource-constrained and lack robust security features. Malicious actors can exploit this vulnerability to gain unauthorized access, compromise privacy, launch cyberattacks, and disrupt critical services. Therefore, securing IoT ecosystems is imperative for the continued growth and adoption of IoT technologies.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Masyhur, Zulkarnaim, Firmansyah Ibrahim e Didit Hermawan. "Internet of Things (IoT): Security, Threats and Countermeasures". Journal Software, Hardware and Information Technology 2, n.º 2 (30 de junho de 2022): 15–20. http://dx.doi.org/10.24252/shift.v2i2.31.

Texto completo da fonte
Resumo:
Internet of Things (IoT) is a technology that is very popular lately and is starting to get busy in Indonesia, marked by various cellphone manufacturers building an IoT ecosystem. IoT can help connect objects such as sensors, vehicles, hospital instruments, household appliances and others. However, connecting these smart devices to the internet network causes various data security problems because internet technology and communication protocols have not been specifically designed to support IoT devices. The leakage of data security through the commercialization of IoT devices, causes privacy problems, threats of cyber-attacks, and organized crime. This paper aims to educate about how data security attacks in IoT and how to overcome them. To achieve this goal, we first discuss various well-known IoT reference models and define security in the context of IoT. Second, identify and classify various IoT attacks and threats. Third, described methods of countermeasures against IoT attacks. In the end, it provides some tips on securing IoT devices.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Li, Yunfa, Yifei Tu, Jiawa Lu e Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things". Sensors 20, n.º 3 (9 de fevereiro de 2020): 916. http://dx.doi.org/10.3390/s20030916.

Texto completo da fonte
Resumo:
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of the above-mentioned security issues, a security transmission and storage solution is proposed about sensing image for blockchain in the IoT. Firstly, this solution intelligently senses user image information, and divides these sensed data into intelligent blocks. Secondly, different blocks of data are encrypted and transmitted securely through intelligent encryption algorithms. Finally, signature verification and storage are performed through an intelligent verification algorithm. Compared with the traditional IoT data transmission and centralized storage solution, our solution combines the IoT with the blockchain, making use of the advantages of blockchain decentralization, high reliability, and low cost to transfer and store users image information securely. Security analysis proves that the solution can resist theft attacks and ensure the security of user image information during transmission and storage.
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Papoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis e Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns". Applied Sciences 11, n.º 4 (4 de fevereiro de 2021): 1396. http://dx.doi.org/10.3390/app11041396.

Texto completo da fonte
Resumo:
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be an asset in alleviating said barrier. More specifically, patterns can be used to encode dependencies between SP properties of individual smart objects and corresponding properties of orchestrations (compositions) involving them, facilitating the design of IoT solutions that are secure and privacy-aware by design. Motivated by the above, this work presents a survey and taxonomy of SP patterns towards the creation of a usable pattern collection. The aim is to enable decomposition of higher-level properties to more specific ones, matching them to relevant patterns, while also creating a comprehensive overview of security- and privacy-related properties and sub-properties that are of interest in IoT/IIoT environments. To this end, the identified patterns are organized using a hierarchical taxonomy that allows their classification based on provided property, context, and generality, while also showing the relationships between them. The two high-level properties, Security and Privacy, are decomposed to a first layer of lower-level sub-properties such as confidentiality and anonymity. The lower layers of the taxonomy, then, include implementation-level enablers. The coverage that these patterns offer in terms of the considered properties, data states (data in transit, at rest, and in process), and platform connectivity cases (within the same IoT platform and across different IoT platforms) is also highlighted. Furthermore, pointers to extensions of the pattern collection to include additional patterns and properties, including Dependability and Interoperability, are given. Finally, to showcase the use of the presented pattern collection, a practical application is detailed, involving the pattern-driven composition of IoT/IIoT orchestrations with SP property guarantees.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Arat, Ferhat, e Sedat Akleylek. "Modified graph-based algorithm to analyze security threats in IoT". PeerJ Computer Science 9 (8 de dezembro de 2023): e1743. http://dx.doi.org/10.7717/peerj-cs.1743.

Texto completo da fonte
Resumo:
In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Giaretta, Alberto, Nicola Dragoni e Fabio Massacci. "IoT Security Configurability with Security-by-Contract". Sensors 19, n.º 19 (23 de setembro de 2019): 4121. http://dx.doi.org/10.3390/s19194121.

Texto completo da fonte
Resumo:
Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Kant, Daniel, Andreas Johannsen e Reiner Creutzburg. "Analysis of IoT Security Risks based on the exposure of the MQTT Protocol". Electronic Imaging 2021, n.º 3 (18 de junho de 2021): 96–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-096.

Texto completo da fonte
Resumo:
Due to the tremendous growth of Internet of Things (IoT) applications - e.g. smart homes, smart grids, smart factories – and the emerging integration into industrial systems, the cyber threat landscape for IoT and IIoT applications is rapidly evolving. Security by Design principles are still widely neglected in the design of IoT devices and protocols. For consumer IoT, the privacy of the applicant can be compromised when devices are inappropriately secured. With regard to Industrial IoT, the usage of insecure IIoT protocols such as MQTT can have a severe impact on the industrial environment such as failure or impairment of production systems. We evaluate the prevalence of exposed IoT and IIoT devices related to the protocol MQTT by means of the search engine Shodan. The approach, design and results of our analysis are summarized in this paper.
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Hussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, Ivan Miguel Pires, Ubaid U. Fayyaz, Farrukh Shahzad, Nuno M. Garcia e Eftim Zdravevski. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment". Sensors 21, n.º 9 (26 de abril de 2021): 3025. http://dx.doi.org/10.3390/s21093025.

Texto completo da fonte
Resumo:
The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established. However, due to the resource constraint property of IoT devices and the distinct behavior of IoT protocols, the existing security mechanisms cannot be deployed directly for securing the IoT devices and network from the cyber-attacks. To enhance the level of security for IoT, researchers need IoT-specific tools, methods, and datasets. To address the mentioned problem, we provide a framework for developing IoT context-aware security solutions to detect malicious traffic in IoT use cases. The proposed framework consists of a newly created, open-source IoT data generator tool named IoT-Flock. The IoT-Flock tool allows researchers to develop an IoT use-case comprised of both normal and malicious IoT devices and generate traffic. Additionally, the proposed framework provides an open-source utility for converting the captured traffic generated by IoT-Flock into an IoT dataset. Using the proposed framework in this research, we first generated an IoT healthcare dataset which comprises both normal and IoT attack traffic. Afterwards, we applied different machine learning techniques to the generated dataset to detect the cyber-attacks and protect the healthcare system from cyber-attacks. The proposed framework will help in developing the context-aware IoT security solutions, especially for a sensitive use case like IoT healthcare environment.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Balogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček e Pavol Zajac. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques". Electronics 10, n.º 21 (29 de outubro de 2021): 2647. http://dx.doi.org/10.3390/electronics10212647.

Texto completo da fonte
Resumo:
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Yang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed e Craig Valli. "Biometrics for Internet-of-Things Security: A Review". Sensors 21, n.º 18 (14 de setembro de 2021): 6163. http://dx.doi.org/10.3390/s21186163.

Texto completo da fonte
Resumo:
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Chen, Fei, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan e Hong-Linh Truong. "IoT Cloud Security Review". ACM Computing Surveys 54, n.º 4 (maio de 2021): 1–36. http://dx.doi.org/10.1145/3447625.

Texto completo da fonte
Resumo:
Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on existing, real, already deployed consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Choi, Ye-Jin, Hee-Jung Kang e Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity". Electronics 8, n.º 7 (3 de julho de 2019): 752. http://dx.doi.org/10.3390/electronics8070752.

Texto completo da fonte
Resumo:
The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, resulting in serious damage to human life and property. Therefore, we aim to study a method to increase the security of IoT devices and effectively extend them simultaneously. To this end, we analyze the authentication methods and limitations of traditional IoT devices and examine cases for improving IoT environments by using blockchain technology. Accordingly, we propose a framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist. The method proposed in this paper restricts the extension of devices vulnerable to security risks by imposing penalties and allows only devices with high security to be securely and quickly authenticated and extended without user intervention. In this study, we applied the proposed method to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments.
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Zaher, Mahmoud A., e Nabil M. Eldakhly. "Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis". Journal of Cybersecurity and Information Management 10, n.º 2 (2022): 26–34. http://dx.doi.org/10.54216/jcim.100203.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) has revolutionized the way we interact with everyday objects, enabling devices to collect and share data seamlessly. However, this increased connectivity has also increased the security risks associated with these devices, as they often lack the necessary security mechanisms to prevent malicious attacks. To address this issue, we propose using blockchain technology to secure IoT devices. In this paper, we present a proof-of-concept implementation of a blockchain-based IoT security system and analyze its effectiveness. Our system leverages blockchain's distributed ledger technology to ensure data integrity, decentralization, and transparency, making it more resilient to attacks. We evaluate our system's performance and compare it with other existing IoT security solutions. Our results show that our blockchain-based approach outperforms traditional security measures and is a viable solution for securing IoT devices. Finally, we discuss the limitations of our study and suggest future research directions for improving the security of IoT devices.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Alotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities". Sensors 23, n.º 17 (28 de agosto de 2023): 7470. http://dx.doi.org/10.3390/s23177470.

Texto completo da fonte
Resumo:
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. One of the unrivaled characteristics of IIoT is the inter-connectivity provided to industries; however, this characteristic might open the door for cyber-criminals to launch various attacks. In fact, one of the major challenges hindering the prevalent adoption of the IIoT paradigm is IoT security. Inevitably, there has been an inevitable increase in research proposals over the last decade to overcome these security concerns. To obtain an overview of this research area, conducting a literature survey of the published research is necessary, eliciting the various security requirements and their considerations. This paper provides a literature survey of IIoT security, focused on the period from 2017 to 2023. We identify IIoT security threats and classify them into three categories, based on the IIoT layer they exploit to launch these attacks. Additionally, we characterize the security requirements that these attacks violate. Finally, we highlight how emerging technologies, such as AI and edge/fog computing, can be adopted to address security concerns and enhance IIoT security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Bhardwaj, Akashdeep, Keshav Kaushik, Salil Bharany, Ateeq Ur Rehman, Yu-Chen Hu, Elsayed Tag Eldin e Nivin A. Ghamry. "IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices". Sustainability 14, n.º 21 (7 de novembro de 2022): 14645. http://dx.doi.org/10.3390/su142114645.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) has redefined several aspects of our daily lives, including automation and control of the living environment, innovative healthcare services, and much more. Digital IoT devices and sensors, when integrated with home appliances, industrial systems, and online services in the physical world, have brought intense, disruptive changes in our lives. The industry and home users have widely embraced these ‘things’ on the Internet or IoT. However, the innate, intrinsic repercussions regarding security and data privacy are not evaluated. Security applies to Industrial IoT (IIoT) is in its infancy stage. Techniques from security and privacy research promise to address broad security goals, but attacks continue to emerge in industrial devices. This research explores the vulnerabilities of IIoT ecosystems not just as individual nodes but as the integrated infrastructure of digital and physical systems interacting with the domains. The authors propose a unique threat model framework to analyze the attacks on IIoT application environments. The authors identified sensitive data flows inside the IIoT devices to determine privacy risks at the application level and explored the device exchanges at the physical level. Both these risks lead to insecure ecosystems. The authors also performed a security analysis of physical domains to digital domains.
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Rajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi e Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation". Mathematical Problems in Engineering 2021 (8 de outubro de 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.

Texto completo da fonte
Resumo:
In terms of growth, effect, and capability, the 5G-enabled Internet of Things (IoT) is incredible. The volume of data distributed and processed by IoT (Internet of Things) systems that trust connectivity and coverage raises some security problems. As IoT technology is directly used in our daily lives, the threats of present cyberspace may grow more prominent globally. Extended network life, coverage, and connectivity are all required for securing IoT-based 5G network devices. As a result of these failures, there are flaws that lead to security breaches. Because purposeful faults can quickly render the entire network dysfunctional, they are more difficult to identify than unexpected failures. Securing IoT-based 5G Network Device Connectivity and Coverage for expending Encryption and Authentication Scheme (EAS) framework is proposed in this study, which uses novel security flaws. In this research, we proposed a Boltzmann machine (BMKG)-based encryption algorithm for securing 5G-enabled IoT device network environment and compared various asymmetric algorithms for key exchange.
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

B, Shreya. "Blockchain in IOT Security". International Journal for Research in Applied Science and Engineering Technology 12, n.º 4 (30 de abril de 2024): 1074–77. http://dx.doi.org/10.22214/ijraset.2024.59962.

Texto completo da fonte
Resumo:
Abstract: The Internet of Things (IoT) paradigm is rapidly transforming various industries by enabling the interconnection of billions of devices. However, the pervasive deployment of IoT devices also introduces significant security challenges, including data integrity, confidentiality, and device authentication. Blockchain technology, initially popularized by cryptocurrencies, has emerged as a promising solution to enhance the security of IoT ecosystems. This paper provides a comprehensive review of the integration of blockchain technology into IoT security frameworks. We explore various blockchain-based security mechanisms, including distributed ledger technology, smart contracts, consensus algorithms, and cryptographic techniques, and analyze their effectiveness in addressing IoT security concerns. Furthermore, we discuss the current state-of-the-art implementations, challenges, and future research directions for leveraging blockchain in IoT security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Taji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi e Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches". Data and Metadata 2 (30 de dezembro de 2023): 155. http://dx.doi.org/10.56294/dm2023155.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) is a decentralized network of physically connected devices that communicate with other systems and devices over the internet. As the number of IoT-based devices continues to grow at an exponential rate, this technology has the potential to improve nearly every aspect of daily life, from smart networks and transportation to home automation and agriculture. However, the absence of adequate security measures on all levels of the IoT poses a significant security risk, with the potential for cyber-attacks and data theft. While scholars have suggested various security measures, there are still gaps that need to be addressed. In this study, we analyzed previous research and proposed metamodels for security, IoT, and machine learning. We then proposed a new IoT-based smart agriculture model with integrated security measures to mitigate cyber- attacks and increase agricultural output. Our model takes into account the unique features of the smart farming domain and offers a framework for securing IoT devices in this specific application area. Moreover, in order to mitigate a range of cyber security attacks across various layers of IoT, we introduced two certificate-based schemes named CBHA and SCKA for smart agriculture. A comparative analysis of their security with existing literature demonstrates their superior robustness against diverse attacks. Additionally, security testing utilizing scyther affirms the resilience and security of both CBHA and SCKA, establishing them as viable options for ensuring security in smart agriculture.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Tiwari,, Arun. "Security and Privacy Analysis in Internet of Things". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (18 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.

Texto completo da fonte
Resumo:
The concept of the Internet of Things (IoT) promises to make all electronic devices smart, connected and capable of functioning together seamlessly courtesy of a worldwide network that links virtual elements with physical ones. Every IoT item in this network has a unique identification number to indicate its position in this system. In addition, connectivity is important for effective coordination with some low-tech gadgets. In this chapter, we shall be discussing the relevant IoT systems and security issues related to them including privacy, security attacks, means of securing IoT environments as well as appropriate models for privacy and security in IoT. This paper looks at various privacy concerns as well as security problems that emanate from the internet of things like data breaches, identity thefts and unauthorized entries. Finally, it also discusses multiple approaches that can be adopted to minimize these risks such as using techniques like data protection, access control and encryption etc. Keywords Internet of Things (IoT), Data Privacy, Physical security, Device Access
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

kumar, Abhinav. "IOT Security with Blockchain". YMER Digital 20, n.º 11 (10 de novembro de 2021): 7–19. http://dx.doi.org/10.37896/ymer20.11/2.

Texto completo da fonte
Resumo:
Internet of Things (IoT) plays a very vital role in almost every field of technology. Its key elements of security are very much crucial elements which are to be maintained as it is used universally. Traditional security and privacy methods be likely to be inapplicable for IoT, mainly due to its distributed network topology and the supply-constraints of most of its devices. For creating these concepts, a new technology called blockchain can be used. Blockchain that reinforce the crypto- currency Bitcoin have been just now used to provide security and privacy in peer-to-peer networks with similar topologies to IoT. In this paper, we present basic part of IoT enabled with blockchain, their distinctive features of both the technologies, their futuristic solutions for different real-world issues, different communicational standards etc. Both the technologies have several distinctive characteristics in every field, but certain limits too exist which gives futuristic path for research.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Schiller, Eryk, Andy Aidoo, Jara Fuhrer, Jonathan Stahl, Michael Ziörjen e Burkhard Stiller. "Landscape of IoT security". Computer Science Review 44 (maio de 2022): 100467. http://dx.doi.org/10.1016/j.cosrev.2022.100467.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

ADASCALITEI, Ioan. "Smartphones and IoT Security". Informatica Economica 23, n.º 2/2019 (30 de junho de 2019): 63–75. http://dx.doi.org/10.12948/issn14531305/23.2.2019.06.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Moos, James. "IoT, Malware and Security". ITNOW 59, n.º 1 (2017): 28–29. http://dx.doi.org/10.1093/itnow/bwx013.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Buenrostro, Erick, Daniel Cyrus, Tra Le e Vahid Emamian. "Security of IoT Devices". Journal of Cyber Security Technology 2, n.º 1 (2 de janeiro de 2018): 1–13. http://dx.doi.org/10.1080/23742917.2018.1474592.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

WOOD, NICK. "RF AND IOT SECURITY". New Electronics 55, n.º 3 (março de 2022): 42–43. http://dx.doi.org/10.12968/s0047-9624(22)60121-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Mohammadiounotikandi, Ali. "Presenting a Protocol to Increase IOT-Based Security". Webology 19, n.º 1 (20 de janeiro de 2022): 629–45. http://dx.doi.org/10.14704/web/v19i1/web19045.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) has expanded access to information technology by combining both digital and physical fields as an emerging technology. IoT will increasingly overshadow human life as it becomes more pervasive. IoT will be applied to important areas of the national economy, such as health care and medical care, and smart transportation. Hence, data security in IoT must be met with highlights such as distinguishing proof, unwavering quality, integration, and verifiable, and so on. Security within the field of IoT is more vital in terms of openness and reliance. Security is an critical issue for IoT applications and proceeds to confront major challenges. This think about pointed to supply a convention to extend IoT-based security. The method proposed in this paper is to show modern conveyance engineering to extend IoT security. This unused design is based on a blockchain and can be actualized as a dispersed design in all layers of IoT. The findings of recreations and usage in genuine IoT scenarios appear that the execution of the proposed security conventions can be proficient and viable within the productivity and adequacy of distinctive levels of security and IoT accessibility.
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Abdulghani, Hezam Akram, Anastasija Collen e Niels Alexander Nijdam. "Guidance Framework for Developing IoT-Enabled Systems’ Cybersecurity". Sensors 23, n.º 8 (21 de abril de 2023): 4174. http://dx.doi.org/10.3390/s23084174.

Texto completo da fonte
Resumo:
Internet of Things (IoT) faces security concerns different from existing challenges in conventional information systems connected through the Internet because of their limited resources and heterogeneous network setups. This work proposes a novel framework for securing IoT objects, the key objective of which is to assign different Security Level Certificates (SLC) for IoT objects according to their hardware capabilities and protection measures implemented. Objects with SLCs, therefore, will be able to communicate with each other or with the Internet in a secure manner. The proposed framework is composed of five phases, namely: classification, mitigation guidelines, SLC assignment, communication plan, and legacy integration. The groundwork relies on the identification of a set of security attributes, termed security goals. By performing an analysis on common IoT attacks, we identify which of these security goals are violated for specific types of IoT. The feasibility and application of the proposed framework is illustrated at each phase using the smart home as a case study. We also provide qualitative arguments to demonstrate how the deployment of our framework solves IoT specific security challenges.
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud e Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis". Sensors 20, n.º 13 (28 de junho de 2020): 3625. http://dx.doi.org/10.3390/s20133625.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Fatima, Haram, Habib Ullah Khan e Shahzad Akbar. "Home Automation and RFID-Based Internet of Things Security: Challenges and Issues". Security and Communication Networks 2021 (28 de novembro de 2021): 1–21. http://dx.doi.org/10.1155/2021/1723535.

Texto completo da fonte
Resumo:
Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, or people on the World Wide Web (WWW). All these different devices have a unique identity in the IoT and must convey data across the network automatically. If computers are not adequately secured, allowing them to connect to the Internet exposes them to a range of serious vulnerabilities. Because the consequences of IoT failures are severe, it is necessary to observe and analyze security issues related to IoT. The prime goal of IoT security is to protect personal safety, while also guaranteeing and ensuring accessibility. In the context of IoT technology, the present study conducts a systematic literature review that analyzes the security problems associated with commercial and educational applications of home automation and details the technical possibilities of IoT with respect to the network layer. In this systematic review, we discuss how current contexts result in the inability of designers of IoT devices to enhance their cyber-security initiatives. Typically, application developers are responsible for training themselves to understand recent security advancements. As a result, active participation on the ridge scale with passive improvement can be achieved. A comparative analysis of the literature was conducted. The main objective of this research is to provide an overview of current IoT security research in home automation, particularly those using authentication methods in different devices, and related technologies in radio frequency identification (RFID) on network layers. IoT security issues are addressed, and various security problems in each layer are analyzed. We describe cross-layer heterogeneous integration as a domain of IoT and demonstrate how it can provide some promising solutions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Choudhary, Yash, B. Umamaheswari e Vijeta Kumawat. "A Study of Threats, Vulnerabilities and Countermeasures: An IoT Perspective". Shanlax International Journal of Arts, Science and Humanities 8, n.º 4 (1 de abril de 2021): 39–45. http://dx.doi.org/10.34293/sijash.v8i4.3583.

Texto completo da fonte
Resumo:
IoT or the Internet of things refers to all the physical devices connected to the internet. IoT consists of computing devices that are web-enabled and have the capability of sensing, collecting, and sending data. IoT provides the ability to remote control appliances and has many more applications. Since IoT is becoming a big part of society, it is necessary to ensure that these devices provide adequate security measures. This paper discusses various security issues in IoT systems like threats, vulnerabilities and some countermeasures which can be used to provide some security. Developing a secure device is now more important than ever, as with the increase in digitization, much of a user’s data is available on these devices. Securing data is a primary concern in any system, as internet-enabled devices are easier to hack. The idea of this paper is to spread awareness and improve the security of IoT devices.
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Haddad, Nabeel Mahdy, Hayder Sabah Salih, Ban Salman Shukur, Sura Khalil Abd, Mohammed Hasan Ali e Rami Qais Malik. "Managing security in IoT by applying the deep neural network-based security framework". Eastern-European Journal of Enterprise Technologies 6, n.º 9 (120) (30 de dezembro de 2022): 38–50. http://dx.doi.org/10.15587/1729-4061.2022.269221.

Texto completo da fonte
Resumo:
Security issues and Internet of Things (IoT) risks in several areas are growing steadily with the increased usage of IoT. The systems have developed weaknesses in computer and memory constraints in most IoT operating systems. IoT devices typically cannot operate complicated defense measures because of their poor processing capabilities. A shortage of IoT ecosystems is the most critical impediment to developing a secured IoT device. In addition, security issues create several problems, such as data access control, attacks, vulnerabilities, and privacy protection issues. These security issues lead to affect the originality of the data that cause to affects the data analysis. This research proposes an AI-based security method for the IoT environment (AI-SM-IoT) system to overcome security problems in IoT. This design was based on the edge of the network of AI-enabled security components for IoT emergency preparedness. The modules presented detect, identify and continue to identify the phase of an assault life span based on the concept of the cyberspace killing chain. It outlines each long-term security in the proposed framework and proves its effectiveness in practical applications across diverse threats. In addition, each risk in the borders layer is dealt with by integrating artificial intelligence (AI) safety modules into a separate layer of AI-SM-IoT delivered by services. It contrasted the system framework with the previous designs. It described the architectural freedom from the base areas of the project and its relatively low latency, which provides safety as a service rather than an embedded network edge on the internet-of-things design. It assessed the proposed design based on the administration score of the IoT platform, throughput, security, and working time
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Shevtsov, Vadim, e Nikita Kasimovsky. "Threat and Vulnerability Analysis of IoT and IIoT Concepts". NBI Technologies, n.º 3 (março de 2021): 28–35. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.5.

Texto completo da fonte
Resumo:
IoT and IIoT are new information technologies. They are very efficient solutions for home, industry and infrastructure. A lot of complex processes can be implemented using this systems. The popularity of the industrial Internet of things is steadily growing along with the development of the Internet of things. Both of these approaches involve the exchange of data over the Internet, use of common hardware platforms and are managed by using specialized software, and this leads to an increase in the number of common vulnerabilities and possible attacks on industrial facilities. The Frost & Sullivan report shows that industrial and IT infrastructures are becoming more transparent. First of all, this is due to the development of the Industrial 4.0 standard and the refusal to isolate industrial facilities, which entails common vulnerabilities, the use of security services based on the SaaS model for industrial facilities, as well as the use of hardware devices that a potential attacker can access quite easily. But very actual problems of IoT and IIoT are information security. Many of this systems are critical and little error can stop the entire system. This is not hard for hackers because that complex system has sensitive components usually. For example simple router can have a lot of vulnerabilities. There an attacker takes a root easily in every system. To solve the problem successfully it is recommended to use complex security actions. These are secure configurations of network devices, using safe devices and protocols, regular audit, using backups, using actual politics of information security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

M. Sultan, Mohammed. "Securing the internet of things: challenges, strategies, and emerging trends in IoT Security Systems". International Journal of Research in Engineering and Innovation 07, n.º 06 (2023): 266–73. http://dx.doi.org/10.36037/ijrei.2023.7607.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) has revolutionized how we interact with technology, enabling seamless connectivity among various devices. However, this interconnected ecosystem also presents significant security challenges that demand comprehensive solutions. This paper explores IoT security systems, focusing on understanding the unique challenges and devising effective strategies to mitigate risks. By analyzing the diverse landscape of IoT networks and protocols, we identify potential vulnerabilities and threats that could compromise integrity and data confidentiality. Additionally, we delve into emerging technologies and trends, such as blockchain-based solutions and decentralized identity management, which hold promise for enhancing IoT security. Throughout the paper, we emphasize the importance of ongoing monitoring, prompt firmware updates, and efficient incident response strategies. Organizations can ensure compliance and create a more secure IoT environment by adhering to established regulatory frameworks and standards. This research paper serves as a comprehensive guide for practitioners and researchers, offering valuable insights into IoT security systems' challenges, best practices, and future directions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Malge, Sunilkumar, e Pallavi Singh. "Internet of Things IoT: Security Perspective". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junho de 2019): 1041–43. http://dx.doi.org/10.31142/ijtsrd24010.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Fedrik, Dr E. J. Thomson, A. Vinitha e B. Vanitha. "Review on Vulnerabilities of IoT Security". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junho de 2019): 1117–19. http://dx.doi.org/10.31142/ijtsrd24020.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Awad Saad Al-Qahtani, Mohammad Ayoub Khan, Awad Saad Al-Qahtani, Mohammad Ayoub Khan. "Predicting Internet of Things (IOT) Security and Privacy Risks – A Proposal Model: توقع مخاطر أمن وخصوصية إنترنت الأشياء (IOT) – نموذج مقترح بحثي". Journal of engineering sciences and information technology 5, n.º 3 (30 de setembro de 2021): 133–12. http://dx.doi.org/10.26389/ajsrp.q070621.

Texto completo da fonte
Resumo:
The Internet of things (IOT) users lack awareness of IOT security infrastructure to handle the risks including Threats, attack and penetration associated with its use. IOT devices are main targets for cyber-attacks due to variable personally identifiable information (PII) stored and transmit in the cyber centers. The security risks of the Internet of Things aimed to damage user's security and privacy. All information about users can be collected from their related objects which are stored in the system or transferred through mediums among diverse smart objects and may exposed to exposed dangerous of attacks and threats if it lack authentication so there are essential need to make IOT security requirements as important part of its efficient implementation. These requirements include; availability, accountability, authentication, authorization, privacy and confidentiality, Integrity and Non-repudiation. The study design is a survey research to investigate the visibility of the proposed model of security management for IOT uses, the security risks of IOT devices, and the changes IOT technology on the IT infrastructure of IOT users through answering of the research questionnaires. This work proposes a model of security management for IOT to predict IOT security and privacy threats, protect IOT users from any unforeseen dangers, and determine the right security mechanisms and protocols for IOT security layers, as well as give the most convenient security mechanisms. Moreover, for enhancing the performance of IOT networks by selecting suitable security mechanisms for IOT layers to increase IOT user's security satisfaction.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

H.J., Felcia Bel, e Sabeen S. "A Survey on IoT Security: Attacks, Challenges and Countermeasures". Webology 19, n.º 1 (20 de janeiro de 2022): 3741–63. http://dx.doi.org/10.14704/web/v19i1/web19246.

Texto completo da fonte
Resumo:
IoT technology grows enormously now-a-days in various fields and it is a need to achieve high security requirements. IoT produces more amounts of data to communicate to each other which may undergo various issues like low processor speed, power, and memory. The IoT devices undergoing these barriers along with crucial information will get into different types of security attacks in IoT layers. An outline of IoT, it’s architecture, state-of-the-art technologies, security attacks in layers and analysis of security threats are studied and the countermeasures have been reported in this survey. The challenges and goals facing IoT security have also been discussed. The security threats on the IoT devices have been briefly introduced. The security challenges, giving research directions and finding security solution for each and every challenge have been also discussed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Istiaque Ahmed, Kazi, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau e Abdul Ahad. "Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction". Sensors 21, n.º 15 (28 de julho de 2021): 5122. http://dx.doi.org/10.3390/s21155122.

Texto completo da fonte
Resumo:
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the electric power grid or water supply systems has emerged as a major national and global priority. To address the security issue of IoT, several studies are being carried out that involve the use of, but are not limited to, blockchain, artificial intelligence, and edge/fog computing. Authentication and authorization are crucial aspects of the CIA triad to protect the network from malicious parties. However, existing authorization and authentication schemes are not sufficient for handling security, due to the scale of the IoT networks and the resource-constrained nature of devices. In order to overcome challenges due to various constraints of IoT networks, there is a significant interest in using machine learning techniques to assist in the authentication and authorization process for IoT. In this paper, recent advances in authentication and authorization techniques for IoT networks are reviewed. Based on the review, we present a taxonomy of authentication and authorization schemes in IoT focusing on machine learning-based schemes. Using the presented taxonomy, a thorough analysis is provided of the authentication and authorization (AA) security threats and challenges for IoT. Furthermore, various criteria to achieve a high degree of AA resiliency in IoT implementations to enhance IoT security are evaluated. Lastly, a detailed discussion on open issues, challenges, and future research directions is presented for enabling secure communication among IoT nodes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia