Cognition Enabled IoT Platform for Industrial IoT Safety, Security and Privacy — The CHARIOT Project

Author(s):  
Konstantinos Loupos ◽  
Bora Caglayan ◽  
Alexandros Papageorgiou ◽  
Basile Starynkevitch ◽  
Franck Vedrine ◽  
...  

Internet of things (IoT) is an emerging concept which aims to connect billions of devices with each other anytime regardless of their location. Sadly, these IoT devices do not have enough computing resources to process huge amount of data. Therefore, Cloud computing is relied on to provide these resources. However, cloud computing based architecture fails in applications that demand very low and predictable latency, therefore the need for fog computing which is a new paradigm that is regarded as an extension of cloud computing to provide services between end users and the cloud user. Unfortunately, Fog-IoT is confronted with various security and privacy risks and prone to several cyberattacks which is a serious challenge. The purpose of this work is to present security and privacy threats towards Fog-IoT platform and discuss the security and privacy requirements in fog computing. We then proceed to propose an Intrusion Detection System (IDS) model using Standard Deep Neural Network's Back Propagation algorithm (BPDNN) to mitigate intrusions that attack Fog-IoT platform. The experimental Dataset for the proposed model is obtained from the Canadian Institute for Cybersecurity 2017 Dataset. Each instance of the attack in the dataset is separated into separate files, which are DoS (Denial of Service), DDoS (Distributed Denial of Service), Web Attack, Brute Force FTP, Brute Force SSH, Heartbleed, Infiltration and Botnet (Bot Network) Attack. The proposed model is trained using a 3-layer BP-DNN


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 928 ◽  
Author(s):  
Mahdi Daghmehchi Firoozjaei ◽  
Ali Ghorbani ◽  
Hyoungshick Kim ◽  
JaeSeung Song

In the current centralized IoT ecosystems, all financial transactions are routed through IoT platform providers. The security and privacy issues are inevitable with an untrusted or compromised IoT platform provider. To address these issues, we propose Hy-Bridge, a hybrid blockchain-based billing and charging framework. In Hy-Bridge, the IoT platform provider plays no proxy role, and IoT users can securely and efficiently share a credit with other users. The trustful end-to-end functionality of blockchain helps us to provide accountability and reliability features in IoT transactions. Furthermore, with the blockchain-distributed consensus, we provide a credit-sharing feature for IoT users in the energy and utility market. To provide this feature, we introduce a local block framework for service management in the credit-sharing group. To preserve the IoT users’ privacy and avoid any information leakage to the main blockchain, an interconnection position, called bridge, is introduced to isolate IoT users’ peer-to-peer transactions and link the main blockchain to its subnetwork blockchain(s) in a hybrid model. To this end, a k-anonymity protection is performed on the bridge. To evaluate the performance of the introduced hybrid blockchain-based billing and charging, we simulated the energy use case scenario using Hy-Bridge. Our simulation results show that Hy-Bridge could protect user privacy with an acceptable level of information loss and CPU and memory usage.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1525
Author(s):  
Chathurangi Edussuriya ◽  
Kasun Vithanage ◽  
Namila Bandara ◽  
Janaka Alawatugoda ◽  
Manjula Sandirigama ◽  
...  

The Internet of Things (IoT) is the novel paradigm of connectivity and the driving force behind state-of-the-art applications and services. However, the exponential growth of the number of IoT devices and services, their distributed nature, and scarcity of resources has increased the number of security and privacy concerns ranging from the risks of unauthorized data alterations to the potential discrimination enabled by data analytics over sensitive information. Thus, a blockchain based IoT-platform is introduced to address these issues. Built upon the tamper-proof architecture, the proposed access management mechanisms ensure the authenticity and integrity of data. Moreover, a novel approach called Block Analytics Tool (BAT), integrated with the platform is proposed to analyze and make predictions on data stored on the blockchain. BAT enables the data-analysis applications to be developed using the data stored in the platform in an optimized manner acting as an interface to off-chain processing. A pharmaceutical supply chain is used as the use case scenario to show the functionality of the proposed platform. Furthermore, a model to forecast the demand of the pharmaceutical drugs is investigated using a real-world data set to demonstrate the functionality of BAT. Finally, the performance of BAT integrated with the platform is evaluated.


2018 ◽  
Vol 8 (4) ◽  
pp. 1-28
Author(s):  
Guo (Ginkgo) Bai ◽  
Liman Zhao ◽  
Zhenrong Edison Wang

Learning outcomes Through this case, students will not only learn about the latest development of this emerging industry, IoT, but also gain a systematic understanding of “ecosystem strategy” and get to know a new corporate growth model called “co-creation”. Case overview/synopsis This case describes why and how Advantech Co., Ltd. (hereinafter referred to as Advantech) has transformed in the age of the Internet of Things. Aware of the ecosystem attributes of the IoT industry and committed to the company’s principle of “altruism”, Advantech strategically positioned itself as an “IoT platform provider” and an “enabler” for IoT applications. After carrying out a reform in terms of internal management, external cooperation, and development model, Advantech has evolved from an industrial computer maker to an IoT solution provider. Since the launch of the “co-creation model” at the end of 2016, Advantech has drawn attention from many excellent companies in traditional industries. With the Internet of Everything close at hand, Chairman KC Liu is well aware there are many challenges to overcome as Advantech strives to build an industrial IoT ecosystem, the “evolution” continues. Complexity academic level MBAs, EMBAs and senior executives. Supplementary materials Teaching Notes are available for educators only. Please contact your library to gain login details or email [email protected] to request teaching notes. Subject code CSS 11: Strategy


2022 ◽  
Vol 137 ◽  
pp. 103591
Author(s):  
Ioannis T. Christou ◽  
Nikos Kefalakis ◽  
John K. Soldatos ◽  
Angela-Maria Despotopoulou

2020 ◽  
Vol 2020 ◽  
pp. 1-31 ◽  
Author(s):  
Sahar Shah ◽  
Mahnoor Khan ◽  
Ahmad Almogren ◽  
Ihsan Ali ◽  
Lianwen Deng ◽  
...  

In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques with their specialities as well as the previously available literature review is outdated. This paper presents the security for cloud computing models with a new aspect. Unlike the previously existing surveys, the literature review of this paper includes the latest research papers in the field of cloud security. Also, different classifications are made for cloud computing security on the basis of different cloud components that are used to secure the cloud models. Furthermore, a total of eleven (11) classifications are considered, which includes cloud components to secure the cloud systems. These classifications help the researchers to find out the desired technique used in a specific component to secure the cloud model. Moreover, the shortcoming of each component enables the researchers to design an optimal algorithm. Finally, future directions are given to highlight future research challenges that give paths to researchers.


2021 ◽  
Vol 11 (21) ◽  
pp. 10456
Author(s):  
Alfonso Infante-Moro ◽  
Juan C. Infante-Moro ◽  
Julia Gallardo-Pérez ◽  
Francisco J. Martínez-López

The level of implementation of IoT technology in Spanish companies is not low for a novel technology, but there are concerns that hinder its level of implementation from being higher: initial costs, security, and privacy. These concerns could be solved with the choice of the appropriate IoT platform, but it must be taken into account that there are numerous criteria that participate in this decision that influence each other. This could give rise to criteria not being considered at first, even though they should be taken into account in this choice. Existing studies do not consider this. Thus, the objective of this study was to find out what are the key criteria to be taken into account by Spanish companies when choosing an IoT platform. The criteria were located through a literary review, and classified according to their level of importance in this decision through a causal study carried out with the methodology of fuzzy cognitive maps. The results achieved showed that there were key criteria beyond the criteria directly implied by the concerns, such as stability, scalability, flexibility, and interoperability, and these new criteria acquired the same or greater importance.


Sign in / Sign up

Export Citation Format

Share Document