Preserving Data Confidentiality in Internet of Things

2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Poornima M. Chanal ◽  
Mahabaleshwar S. Kakkasageri
Author(s):  
Bashar Alohali ◽  
Vassilios G. Vassilakis

Following the rapid development of the Internet of Things (IoT) technology worldwide, the integration of the IoT to the cloud, referred to as the Cloud of Things (CoT), has become essential for easy access and management of remote resources. However, security and malicious intrusions must be seriously considered to ensure network reliability and data confidentiality. In this paper, the authors analyze the security implications of CoT and propose a solution for data confidentiality. They prove that the proposed solution can effectively protect against a number of security attacks.


2020 ◽  
pp. 1112-1131
Author(s):  
Bashar Alohali ◽  
Vassilios G. Vassilakis

Following the rapid development of the Internet of Things (IoT) technology worldwide, the integration of the IoT to the cloud, referred to as the Cloud of Things (CoT), has become essential for easy access and management of remote resources. However, security and malicious intrusions must be seriously considered to ensure network reliability and data confidentiality. In this paper, the authors analyze the security implications of CoT and propose a solution for data confidentiality. They prove that the proposed solution can effectively protect against a number of security attacks.


2018 ◽  
Vol 2018 ◽  
pp. 1-24 ◽  
Author(s):  
Anna Triantafyllou ◽  
Panagiotis Sarigiannidis ◽  
Thomas D. Lagkas

Internet of Things (IoT) constitutes the next step in the field of technology, bringing enormous changes in industry, medicine, environmental care, and urban development. Various challenges are to be met in forming this vision, such as technology interoperability issues, security and data confidentiality requirements, and, last but not least, the development of energy efficient management systems. In this paper, we explore existing networking communication technologies for the IoT, with emphasis on encapsulation and routing protocols. The relation between the IoT network protocols and the emerging IoT applications is also examined. A thorough layer-based protocol taxonomy is provided, while how the network protocols fit and operate for addressing the recent IoT requirements and applications is also illustrated. What is the most special feature of this paper, compared to other survey and tutorial works, is the thorough presentation of the inner schemes and mechanisms of the network protocols subject to IPv6. Compatibility, interoperability, and configuration issues of the existing and the emerging protocols and schemes are discussed based on the recent advanced of IPv6. Moreover, open networking challenges such as security, scalability, mobility, and energy management are presented in relation to their corresponding features. Lastly, the trends of the networking mechanisms in the IoT domain are discussed in detail, highlighting future challenges.


2007 ◽  
Vol 23 (4) ◽  
pp. 248-257 ◽  
Author(s):  
Matthias R. Mehl ◽  
Shannon E. Holleran

Abstract. In this article, the authors provide an empirical analysis of the obtrusiveness of and participants' compliance with a relatively new psychological ambulatory assessment method, called the electronically activated recorder or EAR. The EAR is a modified portable audio-recorder that periodically records snippets of ambient sounds from participants' daily environments. In tracking moment-to-moment ambient sounds, the EAR yields an acoustic log of a person's day as it unfolds. As a naturalistic observation sampling method, it provides an observer's account of daily life and is optimized for the assessment of audible aspects of participants' naturally-occurring social behaviors and interactions. Measures of self-reported and behaviorally-assessed EAR obtrusiveness and compliance were analyzed in two samples. After an initial 2-h period of relative obtrusiveness, participants habituated to wearing the EAR and perceived it as fairly unobtrusive both in a short-term (2 days, N = 96) and a longer-term (10-11 days, N = 11) monitoring. Compliance with the method was high both during the short-term and longer-term monitoring. Somewhat reduced compliance was identified over the weekend; this effect appears to be specific to student populations. Important privacy and data confidentiality considerations around the EAR method are discussed.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Author(s):  
Shreya Joshi ◽  
Ms Bhavyaa ◽  
Suhani Gupta ◽  
Lalita Luthra

Blockchain is considered to be a disruptive core technology. Although many researchers have realized the importance of blockchain, but the research of it is still emerging. It is the record-keeping technology behind bitcoin and is one of the hottest and fastest growing skills in the IT sector today. It serves as an immutable ledger which allows transactions to take place in a decentralized man Blockchain-based applications are rising up, covering numerous fields including finance, healthcare, product management, Internet of Things (IoT), and many more. However, there are still some challenges of blockchain technology such as scalability and security problems which need to be overcome. This paper comprises of a comprehensive study of Blockchain technology. We have included here a deep dive into how blockchains work, its architecture, consensus and various applications. Furthermore, technical challenges are briefly listed.


Sign in / Sign up

Export Citation Format

Share Document