Internet of Things Cybersecurity Paradigm Shift, Threat Matrix and Practical Taxonomy

Author(s):  
Sébastien Ziegler
2018 ◽  
Vol 7 (2.8) ◽  
pp. 680
Author(s):  
T Pavan Kumar ◽  
B Eswar ◽  
P Ayyappa Reddy ◽  
D Sindhu Bhargavi

Cloud computing has become a new paradigm shift in the IT world because of its revolutionary model of computing. It provides flexibility, scalability, and reliability and decreased operational and support expenses for an organization. The Enterprise edition software’s are very costly and maintaining a separate IT team and maintaining their own servers is very expensive and that’s the reason why most of the companies are opting for Cloud computing over enterprise edition of the software. However, few organization cloud customers are not willing to step to cloud computing up on a big scale because of the safety problems present in cloud computing. One more disadvantage of Cloud is it’s not suitable for another revolutionary technology i.e.IoT(Internet of things)In this paper we are going to present the Advantages of Fog Computing and Decoy technology to address the security in cloud computing by extending it into fog computing.Fog Computing is a new paradigm in which the computing power moves to the edge of the network. So, it’s also called as Edge Computing.


2018 ◽  
Vol 30 (4) ◽  
pp. 51-63 ◽  
Author(s):  
Adai Mohammad Al-Momani ◽  
Moamin A Mahmoud ◽  
Mohd Sharifuddin Ahmad

This article describes how the Internet of Things (IoT) is a new paradigm shift in information technology (IT). The IoT manifests the phenomenon of ubiquitous computing when objects or ‘things' are connected to the Internet providing automated services related to the things. However, few studies investigated the acceptance of these services by customers. Consequently, the purpose of this article is to investigate the factors that affect the acceptance and use of the IoT services by customers of telecommunication companies in Jordan. A total of 176 respondents participate in this study and the collected data is analyzed using SPSS. The findings indicate that behavioral intention significantly affects the use behavior of IoT services. In addition, IT knowledge is the most important factor that affects the behavioral intention followed by other factors.


2019 ◽  
Vol 8 (3) ◽  
pp. 7917-7921

With the advent of smart devices, a huge paradigm shift is observed in the way the users define service quality. Further, these devices or Internet of Things (IoT) devices as they are generally addressed, have acted as catalyst for comfort and connectivity and are building blocks of Smart City environment. With limited thought related to security is involved during the deployment of such devices, they offer a dangerous environment of opportunity to the attackers from the internet; which not only jeopardize network security, bus also the privacy of the users. Hence, it is of utmost importance to address the security concerns in smart city environment. This paper attempts to study the current IoT technologies deployed in a smart-city environment along with its vulnerabilities and possible solutions to improve IoT security. An approach is made to study the various vulnerabilities available with the IoT devices deployed in the smart city setup, various motivation of an attacker and the analyse some of the recent attacks witnessed by IoT devices. A few possible solutions for mitigation are suggested in this paper. The findings of the paper can be implemented in any network of IoT devices


Author(s):  
Sahil Sholla ◽  
Sukhkirandeep Kaur ◽  
Gh Rasool Begh ◽  
Roohie Naaz Mir ◽  
M Ahsan Chishti

Internet of Things is a paradigm shift in networking that seeks to connect virtually all things on the planet. Given the constrained nature of smart devices, energy efficient routing would play a key role in successful deployment of such networks. Clustering algorithms organize nodes of a network into groups or clusters and a specific designated node, cluster head is responsible for its cluster. Clustering algorithms have been particularly suggested in the context of Wireless Sensor Networks (WSN) but their application may also address similar challenges in Internet of Things (IoT). Clustering would facilitate energy efficient routing and topology management by delegating large chunk of communication overhead to cluster head. This paper presents a review of various clustering algorithms, analyses routing characteristics of various IoT domains and suggests appropriate clustering algorithms for each domain.


Author(s):  
Vandana Reddy ◽  
Gayathri P

<p>The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.</p>


Sign in / Sign up

Export Citation Format

Share Document