scholarly journals Enhancing technology of producing secure IoT devices on the base of remote attestation

2020 ◽  
Vol 329 ◽  
pp. 03023
Author(s):  
Vasily Desnitsky ◽  
Igor Kotenko

The goal of the work is to enhance the technological process for the production of components of integrated secure systems of the Internet of Things for solving problems of operational control and reaction in emergency situations. The most important requirement for such systems is the need to ensure the properties of reliability and security of software and hardware elements of the end devices, taking into account the specificity of such systems. To achieve the goal in the paper the mechanisms for protection of Android applications from the threats of integrity violation of the software and of critical data on the base of remote attestation principles are modeled. Analytical and experimental evaluations of the implemented protection components and the protocol of their interaction taking into account limitations on the computing and communication resources of the target device are performed.

2019 ◽  
Vol 9 (2) ◽  
pp. 277 ◽  
Author(s):  
Rajesh Kumar ◽  
Xiaosong Zhang ◽  
Riaz Khan ◽  
Abubakar Sharif

With the growing era of the Internet of Things (IoT), more and more devices are connecting with the Internet using android applications to provide various services. The IoT devices are used for sensing, controlling and monitoring of different processes. Most of IoT devices use Android applications for communication and data exchange. Therefore, a secure Android permission privileged mechanism is required to increase the security of apps. According to a recent study, a malicious Android application is developed almost every 10 s. To resist this serious malware campaign, we need effective malware detection approaches to identify malware applications effectively and efficiently. Most of the studies focused on detecting malware based on static and dynamic analysis of the applications. However, to analyse the risky permission at runtime is a challenging task. In this study, first, we proposed a novel approach to distinguish between malware and benign applications based on permission ranking, similarity-based permission feature selection, and association rule for permission mining. Secondly, the proposed methodology also includes the enhancement of the random forest algorithm to improve the accuracy for malware detection. The experimental outcomes demonstrate high proficiency of the accuracy for malware detection, which is pivotal for android apps aiming for secure data exchange between IoT devices.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ke Wang ◽  
Zheming Yang ◽  
Bing Liang ◽  
Wen Ji

Purpose The rapid development of 5G technology brings the expansion of the internet of things (IoT). A large number of devices in the IoT work independently, leading to difficulties in management. This study aims to optimize the member structure of the IoT so the members in it can work more efficiently. Design/methodology/approach In this paper, the authors consider from the perspective of crowd science, combining genetic algorithms and crowd intelligence together to optimize the total intelligence of the IoT. Computing, caching and communication capacity are used as the basis of the intelligence according to the related work, and the device correlation and distance factors are used to measure the improvement level of the intelligence. Finally, they use genetic algorithm to select a collaborative state for the IoT devices. Findings Experimental results demonstrate that the intelligence optimization method in this paper can improve the IoT intelligence level up to ten times than original level. Originality/value This paper is the first study that solves the problem of device collaboration in the IoT scenario based on the scientific background of crowd intelligence. The intelligence optimization method works well in the IoT scenario, and it also has potential in other scenarios of crowd network.


Author(s):  
Bin Lin

The Internet of Things is another information technology revolution and industrial wave after computer, Internet and mobile communication. It is becoming a key foundation and an important engine for the green, intelligent and sustainable development of economic society. The new networked intelligent production mode characterized by the integration innovation of the Internet of Things is shaping the core competitiveness of the future manufacturing industry. The application of sensor network data positioning and monitoring technology based on the Internet of Things in industry, power and other industries is a hot field for the development of the Internet of Things. Sensor network processing and industrial applications are becoming increasingly complex, and new features have appeared in the sensor network scale and infrastructure in these fields. Therefore, the Internet of Things perception data processing has become a research hotspot in the deep integration process between industry and the Internet of Things. This paper deeply analyzes and summarizes the characteristics of sensor network perception data under the new trend of the Internet of Things as well as the research on location monitoring technology, and makes in-depth exploration from the release and location monitoring of sensor network perception data of the Internet of Things. Sensor network technology integrated sensor technology, micro-electromechanical system technology, wireless communication technology, embedded computing technology and distributed information processing technology in one, with easy layout, easy control, low power consumption, flexible communication, low cost and other characteristics. Therefore, based on the release and location monitoring technologies of sensor network data based on the Internet of Things in different applications, this paper studies the corresponding networking technologies, energy management, data management and fusion methods. Standardization system in wireless sensor network low cost, and convenient data management needs, design the iot oriented middleware, and develops the software and hardware system, the application demonstration, the results show that the design of wireless sensor network based on iot data monitoring and positioning technology is better meet the application requirements, fine convenient integration of software and hardware, and standardized requirements and suitable for promotion.


Author(s):  
Kundankumar Rameshwar Saraf ◽  
Malathi P. Jesudason

This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6761
Author(s):  
Anjan Bandyopadhyay ◽  
Vikash Kumar Singh ◽  
Sajal Mukhopadhyay ◽  
Ujjwal Rai ◽  
Fatos Xhafa ◽  
...  

In the Internet of Things (IoT) + Fog + Cloud architecture, with the unprecedented growth of IoT devices, one of the challenging issues that needs to be tackled is to allocate Fog service providers (FSPs) to IoT devices, especially in a game-theoretic environment. Here, the issue of allocation of FSPs to the IoT devices is sifted with game-theoretic idea so that utility maximizing agents may be benign. In this scenario, we have multiple IoT devices and multiple FSPs, and the IoT devices give preference ordering over the subset of FSPs. Given such a scenario, the goal is to allocate at most one FSP to each of the IoT devices. We propose mechanisms based on the theory of mechanism design without money to allocate FSPs to the IoT devices. The proposed mechanisms have been designed in a flexible manner to address the long and short duration access of the FSPs to the IoT devices. For analytical results, we have proved the economic robustness, and probabilistic analyses have been carried out for allocation of IoT devices to the FSPs. In simulation, mechanism efficiency is laid out under different scenarios with an implementation in Python.


Sign in / Sign up

Export Citation Format

Share Document