Security Analysis in the Internet of Things: State of the Art, Challenges, and Future Research Topics

Author(s):  
Karim Ennasraoui ◽  
Youssef Baddi ◽  
Younes El Bouzekri El Idrissi ◽  
El Mehdi Baa
Author(s):  
Maha Saadeh ◽  
Azzam Sleit ◽  
Khair Eddin Sabri ◽  
Wesam Almobaideen

Internet of Things (IoT) is considered as the future of the Internet that connects billions of objects all together. Trusted communication between these objects is a crucial requirement for the wide deployment of IoT services. Consequently, effective authentication procedures should be applied between the communicating objects. This paper provides a comprehensive survey of object authentication in the IoT. The survey aims to direct future researchers in the field of IoT object authentication by delving into the details of authentication schemes and going through different comparisons. Comparisons are based on various criteria which include authentication process characteristics, the underlying architecture, key generation and distribution techniques, supporting IoT challenges, security analysis, and performance evaluation. Additionally, this survey highlights the main issues and challenges of IoT objects authentication and recommends future research directions.


2012 ◽  
Vol 198-199 ◽  
pp. 1755-1760 ◽  
Author(s):  
Guo Ping Zhou ◽  
Ya Nan Chen

Applying the Internet of Things (IOT) into ecological environmental monitoring is the goal of this paper. There are several advantages of the Internet of Things (IOT) applying in ecological environment monitoring. A hierarchical monitoring system is presented, including system architecture, hardware/software design, information flow and software implementation. In the end, using carbon dioxide gas in the atmosphere for experimental purposes, in data collection and analysis. Experiments showed that this system is capable of monitoring ecologica environment, which orientate the future research of forest ecosystem.


Author(s):  
Kundankumar Rameshwar Saraf ◽  
Malathi P. Jesudason

This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.


Author(s):  
Nalina Suresh ◽  
Valerianus Hashiyana ◽  
Martin Mabeifam Ujakpa ◽  
Anton Limbo ◽  
Gloria E. Iyawa ◽  
...  

The term “cloud of things” is currently in the forefront of computer research topics due to its vital role towards the internet of things. To integrate cloud computing and internet of things into a single technology or worldview, this chapter discussed the evolution of internet of things and cloud computing and reviewed literature on cloud computing and internet of things and their possible integration. The chapter also discussed the importance of cloud internet of things, its architecture, and operation; the need to integrate internet of things and cloud computing; and challenges of cloud internet of things. The chapter then used the identified open issues and future direction to propose a generic cloud internet of things architecture and pilot simulated the results to verify the possibility and effectiveness of cloud computing and internet of things (CIoTs) integration. The researchers believe that the chapter will provide a better insight for anyone who wishes to carry out research in the field of cloud internet of things.


2019 ◽  
Vol 11 (3) ◽  
pp. 763 ◽  
Author(s):  
Frauke Behrendt

This article asks how cycling, a sustainable form of urban mobility, is discussed in the context of smart cities and the Internet of Things in European Commission (EC) policy documents, and how this compares to discussions around cars. Sustainable forms of transport, such as cycling, are a key issue for cities across the globe, including smart cities, while transport is increasingly becoming part of the Internet of Things (IoT). This article contributes to an understanding of how cars and bicycles are discussed in this context. To do so, 39 relevant EC policy documents (2014–2018) were identified and examined through keyword searches and rigorous document analysis. The results show how the vast majority of policy discussions in this area revolve around cars (including autonomous cars and smart vehicles), while cycling is hardly considered, with a strong affinity between IoT and cars. In addition, recent EC policy debates take place more around IoT than around Smart Cities, while sustainability is not considered much in the IoT context. The conclusion highlights the implications of sustainable urban modes of transport such as cycling being absent from IoT/smart debates, including lack of policy visibility and funding opportunities, underlining the significance of this research, and it also makes policy suggestions for addressing these issues and for future research.


2019 ◽  
Vol 7 (2) ◽  
pp. 21-40 ◽  
Author(s):  
Parthasarathy Panchatcharam ◽  
Vivekanandan S.

Wellbeing is fundament requirement. What's more, it is human appropriate to get quality health care. These days, India is confronting numerous medical problems in light of fewer assets. This survey article displays the idea of solving health issues by utilizing a recent innovation, the Internet of Things (IOT). The Internet of Things with their developing interdisciplinary applications has changed our lives. Smart health care being one such IoT application interfaces brilliant gadgets, machines, patients, specialists, and sensors to the web. At long last, the difficulties and prospects of the improvement of IoT-based medicinal service frameworks are talked about in detail. This review additionally summarizes the security and protection worries of IoT, administrations and application of IoT and smart healthcare services that have changed the customary medicinal services framework by making healthcare administration more proficient through their applications.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


Sign in / Sign up

Export Citation Format

Share Document