Edge-based auditing method for data security in resource-constrained Internet of Things

2020 ◽  
pp. 101971
Author(s):  
Tian Wang ◽  
Yaxin Mei ◽  
Xuxun Liu ◽  
Jin Wang ◽  
Hong-Ning Dai ◽  
...  
Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1598
Author(s):  
Sigurd Frej Joel Jørgensen Ankergård ◽  
Edlira Dushku ◽  
Nicola Dragoni

The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-connected devices which are revolutionizing many domains, such as healthcare, transportation, smart cities, to mention only a few. Along with the unprecedented new opportunities, the IoT revolution is creating an enormous attack surface for potential sophisticated cyber attacks. In this context, Remote Attestation (RA) has gained wide interest as an important security technique to remotely detect adversarial presence and assure the legitimate state of an IoT device. While many RA approaches proposed in the literature make different assumptions regarding the architecture of IoT devices and adversary capabilities, most typical RA schemes rely on minimal Root of Trust by leveraging hardware that guarantees code and memory isolation. However, the presence of a specialized hardware is not always a realistic assumption, for instance, in the context of legacy IoT devices and resource-constrained IoT devices. In this paper, we survey and analyze existing software-based RA schemes (i.e., RA schemes not relying on specialized hardware components) through the lens of IoT. In particular, we provide a comprehensive overview of their design characteristics and security capabilities, analyzing their advantages and disadvantages. Finally, we discuss the opportunities that these RA schemes bring in attesting legacy and resource-constrained IoT devices, along with open research issues.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 453-465
Author(s):  
Nguyen Dinh Trung ◽  
Dinh Tran Ngoc Huy ◽  
Le Thi Thanh Huong ◽  
Ta Van Thanh ◽  
Nguyen Thi Phuong Thanh ◽  
...  

Once again in this study, we emphasizes strongly on applications of mathematical solutions for industrial uses. By using qualitative analysis, synthesis and inductive methods, together with statistic data, our paper target is to analyze aspects of SWOT analysis on blockchain technology and its opportunities for various industries and sectors in emerging markets such as Vietnam. This is based on the original foundation theory indicating that blockchain tech functioned as a mathematical solutions that can be applied for solving commerce secrets, with high data security and can be used for intellectual property. Among our research results is findings on the connection between IoTs - Internet of Things and blockchain tech, as well as relationship between AI - Artificial intelligence and blockchain tech. Last but not least authors propose cybersecurity risk solutions and there are policies implications attached.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Isha Batra ◽  
Hatem S. A. Hamatta ◽  
Arun Malik ◽  
Mohammed Baz ◽  
Fahad R. Albogamy ◽  
...  

Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and mechanism they follow to secure a message. This work first determines the benefit of applying lightweight security cryptographic solutions in IoT. The existing lightweight counterparts are still vulnerable to attacks and also consume calculative more power. Therefore, this research work proposes a new hybrid lightweight logical security framework for offering security in IoT (LLSFIoT). The operations, key size, and mechanism used in the proposed framework make its lightweight. The proposed framework is divided into three phases: registration, authentication, and light data security (LDS). LDS offers security by using unique keys at each round bearing small size. Key generation mechanism used is comparatively fast making the compromise of keys as a difficult task. These steps followed in the proposed algorithm design make it lightweight and a better solution for IoT-based networks as compared to the existing solutions that are relatively heavy weight in nature.


Author(s):  
Yongjun Zheng ◽  
Haider Ali ◽  
Umair Ullah Tariq

2021 ◽  
pp. 593-601
Author(s):  
T. P. Rani ◽  
K. Suganthi

Sign in / Sign up

Export Citation Format

Share Document