Network Security for Home IoT Devices Must Involve the User: A Position Paper

Author(s):  
Lorenzo De Carli ◽  
Antonio Mignano
2020 ◽  
Vol 8 (5) ◽  
pp. 3454-3457

In the real world cloud robotics network are highly structured. The network security and IOT devices ability to cope with complex problem in such cloud environment crucially depend on exploiting this network security structured.C2M (Cloud to Machine) is the core network technology to implement cloud robotics. This paper firstly introduce the concept of C2M with Cloud Heritage Technique and the cloud network architecture of C2MHT (Cloud to Machine Heritage Technique) .Then it analyses the cloud security threats of C2M , moving the C2M robotics devices to unauthorized location and note.


2019 ◽  
Vol 8 (3) ◽  
pp. 7917-7921

With the advent of smart devices, a huge paradigm shift is observed in the way the users define service quality. Further, these devices or Internet of Things (IoT) devices as they are generally addressed, have acted as catalyst for comfort and connectivity and are building blocks of Smart City environment. With limited thought related to security is involved during the deployment of such devices, they offer a dangerous environment of opportunity to the attackers from the internet; which not only jeopardize network security, bus also the privacy of the users. Hence, it is of utmost importance to address the security concerns in smart city environment. This paper attempts to study the current IoT technologies deployed in a smart-city environment along with its vulnerabilities and possible solutions to improve IoT security. An approach is made to study the various vulnerabilities available with the IoT devices deployed in the smart city setup, various motivation of an attacker and the analyse some of the recent attacks witnessed by IoT devices. A few possible solutions for mitigation are suggested in this paper. The findings of the paper can be implemented in any network of IoT devices


2021 ◽  
Vol 3 (11) ◽  
pp. 124-135
Author(s):  
Roman Chernenko ◽  
Olena Riabchun ◽  
Maksym Vorokhob ◽  
Andriy Anosov ◽  
Valerii Kozachok

Because IoT devices work with data that may be confidential or confidential, that data must be protected. Due to the peculiarities of platforms and the implementation of such systems, namely: first, the use of devices with limited computing characteristics, which makes it impossible to use traditional means of information protection and data transmission protocols, and secondly. systems, and provide them with sufficient computing resources due to the impossibility of laying power lines, thirdly, the lack of standards for the implementation of these devices in the existing infrastructure, there are serious threats to the confidentiality, integrity and availability of information. The article considers the model of the IoT system, oneM2M standard presented by the European Institute of Communication Standards. IoT devices are designed with the necessary network connectivity, but often do not provide reliable network security. Network security is a critical factor in the deployment of IoT devices. The situation is complicated by the fact that IoT largely consists of limited devices. A limited device usually has a very limited cycle of power, memory, and processing. IoT devices are particularly vulnerable to threats because many of the current IoT devices do not support encryption. Several known encryption algorithms were selected for analysis: RSA, Vernam cipher, El Gamal scheme. After analyzing the above algorithms, a prototype of the IoT system was developed using limited devices, which provides absolute cryptographic stability. The prototype consists of a gateway in the role of a Raspberry pi 3 B + microcomputer, a limited Arduino Nano device with a connected sensor and a software implementation of the above-mentioned Vernam cipher with all the tasks.


Sign in / Sign up

Export Citation Format

Share Document