A Trust-Based Security Research Method for Internet of Things Terminal

Author(s):  
Zhe Liu ◽  
Bo Zhao ◽  
Jiyang Li
2022 ◽  
Vol 2 (1) ◽  
pp. 34-43
Author(s):  
ADITYA ZULMI RAHMAWAN ◽  
ZAENURIYAH EFFENDI

The COVID-19 pandemic poses problems in various sectors. The most vulnerable sector in this situation is the social sector, especially education. Problems such as the learning process make the continuity of education a concern. This is a challenge for the community in the era of society 5.0 in the hope of overcoming the problems that arise due to the Covid-19 pandemic. The use of big data, artificial intelligence, and the internet of things is an alternative effort to help deal with the impact of the pandemic in accordance with the conditions in this disruptive era. This study aims to determine the policies and strategies of society 5.0 in the learning process as an effort to handle the impact of the pandemic. This study uses a systematic review research method of literature published by scientific journals in the period January 2010 to December 2021. The data used comes from published journals related to the topics studied and from various electronic media. The results of the study can find out strategies in the learning process in the implementation of society 5.0 in policies in the field of education as an effort to deal with the impact of the covid-19 pandemic. ABSTRAKPandemi covid-19 memberikan permasalahan di berbagai sektor. Sektor yang paling rentan dalam situasi ini adalah sektor sosial terutama pada pendidikan. Permasalahan seperti proses pembelajaran membuat keberlangsungan pendidikan menuai kekhawatiran. Hal ini menjadi sebuah tantangan bagi masyarakat di era society 5.0 dengan harapan dapat mengatasi permasalahan yang timbul akibat pandemi Covid-19. Pemanfaatan big data, artificial intelligent, dan internet of things menjadi upaya alternatif dalam membantu menangani dampak pandemi yang sesuai dengan keadaan di era disruptif ini. Penelitian ini bertujuan untuk mengetahui kebijakan dan strategi society 5.0 dalam proses pembelajaran sebagai upaya penanganan dampak pandemi. Penelitian ini menggunakan metode penelitian tinjauan sistematis terhadap literatur yang diterbitkan oleh jurnal ilmiah pada periode Januari tahun 2010 hingga Desember 2021. Sumber yang digunakan berasal dari jurnal-jurnal yang sudah dipublikasikan terkait dengan topik yang dikaji dan dari berbagai media elektronik. Hasil penelitian dapat mengetahui strategi dalam proses pembelajaran dalam implementasi society 5.0 pada kebijakan di bidang pendidikan sebagai upaya menghadapi dampak pandemi covid-19.


2021 ◽  
Vol 4 (2) ◽  
pp. 368
Author(s):  
Vita Efelina ◽  
Sarah Dampang ◽  
Iqbal Maulana ◽  
Riza Ibnu Adam ◽  
Endah Purwanti ◽  
...  

ABSTRAKSekarang ini, diramaikan dengan isu Corona Virus Disease-2019 atau yang biasa disingkat dengan Covid-19. Kasus asal coronavirus pertama kali ditemukan di Kota Wuhan, China. Termasuk salah satunya di Indonesia awal kasus kesehatan ini ditemukan di Depok, Jakarta pada 02 Maret 2020. Begitu juga Kabupaten Karawang yang saat ini merupakan zona hitam (kasus Covid-19 kian menambah setiap harinya). Tujuan dalam penilitian ini yaitu pembuatan drone untuk penyemprotan disinfektan. Di karenakan disinfektan sendiri merupakan bahan senyawa aktif yang dapat meminimalisir terpaparnya Covid-19. Metode pengabdian yang dilakukan dengan cara pendekatan kualitatif. Hal ini dilakukan untuk kajian literatur yang menjadi parameter dalam penggunaan drone. Hasil yang ditawarkan dalam pengabdian ini guna mencegah bertambahnya kasus positif Covid-19, khususnya di Kabupaten Karawang. Di harapkan penyebaran Covid-19 dapat diminimalisir dengan cara penyemprotan disinfektan melalui drone. Selain itu drone yang digunakan dapat terintegrasi oleh sistem internet of things (IoT). Dengan tujuan agar dalam penggunaannya dapat dengan mudah diarahkan sesuai kebutuhan. Kata kunci:covid-19; drone; disinfektan; internet of things. ABSTRACTCurrently, it is enlivened by the issue of Corona Virus Disease-2019 or commonly abbreviated as Covid-19. The case of the origin of the coronavirus was first found in Wuhan City, China. Including one of them in Indonesia, the initial health case was found in Depok, Jakarta on March 02, 2020. Likewise, Karawang Regency is currently a black zone (Covid-19 cases are increasing every day). The purpose of this research is to make drones for spraying disinfectants. This is because disinfectants are active compounds that can minimize exposure to Covid-19. The research method used is a qualitative approach. This is done for a literature review which is a parameter in using drones. The results offered in this study are to prevent an increase in positive cases of Covid-19, especially in Karawang Regency. It is hoped that the spread of Covid-19 can be minimized by spraying disinfectants through drones. In addition, the drones used can be integrated by the internet of things (IoT) system. With the aim that in use it can be easily directed as needed. Keywords: covid-19; drone; disinfectans; internet of things.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Sadia Soltani

Purpose This study aims to investigate business-to-business (B2B) engagement within an internet of things (IoT) ecosystem. A conceptual framework is proposed that can be used for building engagement strategies considering key actors within an IoT ecosystem. Design/methodology/approach The study used an integrative literature review as a research method and investigated engagement across several disciplines along with antecedents and outcomes of engagement to form an understanding of IoT engagement. Findings The findings in this study revealed IoT engagement antecedents as IoT readiness, commitment, communication, involvement and support and, consequently, the outcomes of IoT engagement as trust, loyalty, better performance and satisfaction. Furthermore, IoT engagement needs to be considered from three perspectives, namely, from a multidimensional perspective, beyond a dyad perspective and from the service-dominant logic perspective, which suggests thinking of goods as services and highlights the importance of value co-creation. Research limitations/implications As the study of B2B engagement within the IoT ecosystem is conceptual, empirical investigations are suggested for elaborating on the findings. Practical implications The conceptual framework provides managers within an IoT ecosystem with thorough recommendations on why to change their perspectives toward engagement; it points out drivers of engagement that need to be maintained and adds IoT readiness as a new antecedent to engagement literature. Originality/value This study contributes a coherent conceptualization of actors’ engagement within IoT ecosystems and enhances both the theoretical and practical domain of B2B engagement.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Rachit ◽  
Shobha Bhatt ◽  
Prakash Rao Ragiri

AbstractThe Internet of Things (IoT) is a network of embedded devices that are uniquely identifiable and have embedded software required to communicate between the transient states. The purpose of this study is to explore discrete IoT security challenges pertaining to currently deployed IoT standards and protocols. We have presented a detailed review in this study that focuses on IoT's imminent security aspects, covering identification of risks pertaining to the current IoT system, novel security protocols, and security projects proffered in recent years. This work presents an updated review of the IoT architecture in the protocols and standards that are proffered for the next-gen IoT systems. A security-specific comparative analysis of protocols, standards, and proffered security models are presented as per IoT security requirements. This study elicits the need for standardization at the communication and data audit level, which exposes the hardware, software, and data to various threats and attacks. Our study reveals a need for protocols that are competent enough to be accorded for over one threat vector. This paper provides an insight into the latest security research trends, which will prove beneficial in the development of IoT security. The research outcomes can benefit the research community in IoT by integrating IoT-based devices' best security aspects.


2018 ◽  
Vol 14 (08) ◽  
pp. 80
Author(s):  
Yi Yue-e

To explore the security mechanism of the Internet of Things (IoT) perception environment, we perform a security research on the IoT on the basis of game algorithm. The dynamic game method of node cooperation is used in the experiments. Firstly, multiple report nodes are merged into a game party, and the dynamic game for two parties is established with the detection node. In the environment where the malicious nodes are dominant, the detection nodes collaborate, and the state of the unknown nodes is conjectured by the reputation value of the reporting nodes. The high trust reference report is used for the modification and reduction the weight of malicious nodes in the overall report, for node merging, and finally for bias equilibrium. The results show that cooperative game can significantly improve the success rate of incident monitoring and reduce the number of forged reports.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Hui Deng ◽  
Dongwen Xie

With the development of the Internet of Things and big data technologies and the rise of smart cities, more and more Internet of Things and big data technologies are applied in the economic field, and the construction of the Shanghai Pilot Free-Trade Zone will be important for my country’s follow-up construction of free-trade zones and the whole country. Its economic development strategy has a significant impact, and it has also become a hot spot for domestic and foreign research. Among them, the use of big data and the Internet of Things application of the free-trade zone tax policy system for research cannot be ignored. This article puts forward the literature in the process of writing research method, quantitative research method, and case research method. We used the literature research method to study the theory of big data and tax informatization, used the quantitative research method to conduct data statistics on the tax system of the free-trade zone to understand the information construction of the tax authority, and used the case study method to realize the “data quality monitoring platform.” Taxation informatization management in turn brings enlightenment and suggestions for big data to promote the taxation informatization construction of the free-trade zone. A total of 2,854 samples of tax data were extracted from the system of the State Taxation Bureau of a certain district using SQL statements, when the tax burden rate threshold value selected by the nodes of the tax burden discrimination decision tree for all industries is 2.23%, through experiments, various tax collection, and management. The work has achieved ideal results, providing a more scientific and persuasive argument for the proposal of countermeasure research.


2017 ◽  
Vol 15 (4) ◽  
pp. 79-84 ◽  
Author(s):  
Earlence Fernandes ◽  
Amir Rahmati ◽  
Kevin Eykholt ◽  
Atul Prakash

2021 ◽  
Vol 2021 ◽  
pp. 1-21
Author(s):  
Haram Fatima ◽  
Habib Ullah Khan ◽  
Shahzad Akbar

Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, or people on the World Wide Web (WWW). All these different devices have a unique identity in the IoT and must convey data across the network automatically. If computers are not adequately secured, allowing them to connect to the Internet exposes them to a range of serious vulnerabilities. Because the consequences of IoT failures are severe, it is necessary to observe and analyze security issues related to IoT. The prime goal of IoT security is to protect personal safety, while also guaranteeing and ensuring accessibility. In the context of IoT technology, the present study conducts a systematic literature review that analyzes the security problems associated with commercial and educational applications of home automation and details the technical possibilities of IoT with respect to the network layer. In this systematic review, we discuss how current contexts result in the inability of designers of IoT devices to enhance their cyber-security initiatives. Typically, application developers are responsible for training themselves to understand recent security advancements. As a result, active participation on the ridge scale with passive improvement can be achieved. A comparative analysis of the literature was conducted. The main objective of this research is to provide an overview of current IoT security research in home automation, particularly those using authentication methods in different devices, and related technologies in radio frequency identification (RFID) on network layers. IoT security issues are addressed, and various security problems in each layer are analyzed. We describe cross-layer heterogeneous integration as a domain of IoT and demonstrate how it can provide some promising solutions.


Sign in / Sign up

Export Citation Format

Share Document