scholarly journals From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes

Author(s):  
J. Augusto-Gonzalez ◽  
A. Collen ◽  
S. Evangelatos ◽  
M. Anagnostopoulos ◽  
G. Spathoulas ◽  
...  
Author(s):  
C. Vijayakumaran ◽  
B. Muthusenthil ◽  
B. Manickavasagam

Architectural changes are happening in the modern industries due to the adaption and the deployment of ‘Internet of Things (IoT)’ for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology makes the most sense is the industrial automation processes in smart industries (Industry 4.0). In this paper, a reliable ‘Next Generation Cyber Security Architecture (NCSA)’ is presented for Industrial IoT (IIoT) environment that detects and thwarts cybersecurity threats and vulnerabilities. It helps to automate the processes of exchanging real-time critical information between devices without any human intervention. It proposes an analytical framework that can be used to protect entities and network traffics involved in the IIoT wireless communication. It incorporates an automated cyber-defense authentication mechanism that detects and prevents security attacks when a network session has been established. The defense mechanism accomplishes the required level of security protection in the network by generating an identity token which is cryptographically encrypted and verified by a virtual gateway system. The proposed NCSA improves security in the IIoT environment and reduces operational management cost.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 10483-10496 ◽  
Author(s):  
Debajyoti Pal ◽  
Suree Funilkul ◽  
Nipon Charoenkitkarn ◽  
Prasert Kanthamanon

Author(s):  
Э.Д. Алисултанова ◽  
Л.К. Хаджиева ◽  
М.З. Исаева

Данная статья посвящена созданию профориентационной (умной) лаборатории, которая призвана сформировать у школьников базовые представления о технологии Интернет вещей (IoT), угрозах кибербезопасности в этой сфере, мотивировать к получению в будущем профильного образования и построению карьеры в области обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. Обучение школьников в профориентационной лаборатории, построенное на основе применения интерактивных электронных образовательных ресурсов, прежде всего будет позиционировать карьерные возможности будущих специалистов в сфере обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. В рамках функционирования лаборатории особое внимание обучающихся сконцентрировано на тематиках правовых аспектов обеспечения кибербезопасности, главных тенденциях развития киберугроз в современном глобальном информационном пространстве и мерах, необходимых для их нейтрализации. This article is devoted to the creation of a career-oriented (smart) laboratory, which is designed to formulate in schoolchildren basic ideas about the Internet of Things (IoT) technology, cyber security threats in this area, motivate to receive specialized education in the future and build a career in the field of Internet things (IoT) security) with the functioning of smart manufacturing. The training of schoolchildren in a vocational guidance laboratory, based on the use of interactive electronic educational resources, will primarily position the career opportunities of future specialists in the field of Internet of Things (IoT) security in the operation of smart manufacturing. Within the framework of the functioning of the laboratory, special attention of students is concentrated on the topics of the legal aspects of ensuring cyber security, the main trends in the development of cyber threats in the modern global information space and the measures necessary to neutralize them.


Author(s):  
Promise Agbedanu ◽  
Anca Delia Jurcut

In this era of explosive growth in technology, the internet of things (IoT) has become the game changer when we consider technologies like smart homes and cities, smart energy, security and surveillance, and healthcare. The numerous benefits provided by IoT have become attractive technologies for users and cybercriminals. Cybercriminals of today have the tools and the technology to deploy millions of sophisticated attacks. These attacks need to be investigated; this is where digital forensics comes into play. However, it is not easy to conduct a forensic investigation in IoT systems because of the heterogeneous nature of the IoT environment. Additionally, forensic investigators mostly rely on evidence from service providers, a situation that can lead to evidence contamination. To solve this problem, the authors proposed a blockchain-based IoT forensic model that prevents the admissibility of tampered logs into evidence.


Symmetry ◽  
2018 ◽  
Vol 10 (9) ◽  
pp. 374 ◽  
Author(s):  
Chi-Hua Chen ◽  
Eyhab Al-Masri ◽  
Feng-Jang Hwang ◽  
Despo Ktoridou ◽  
Kuen-Rong Lo

This editorial introduces the special issue, entitled “Applications of Internet of Things”, of Symmetry. The topics covered in this issue fall under four main parts: (I) communication techniques and applications, (II) data science techniques and applications, (III) smart transportation, and (IV) smart homes. Four papers on sensing techniques and applications are included as follows: (1) “Reliability of improved cooperative communication over wireless sensor networks”, by Chen et al.; (2) “User classification in crowdsourcing-based cooperative spectrum sensing”, by Zhai and Wang; (3) “IoT’s tiny steps towards 5G: Telco’s perspective”, by Cero et al.; and (4) “An Internet of things area coverage analyzer (ITHACA) for complex topographical scenarios”, by Parada et al. One paper on data science techniques and applications is as follows: “Internet of things: a scientometric review”, by Ruiz-Rosero et al. Two papers on smart transportation are as follows: (1) “An Internet of things approach for extracting featured data using an AIS database: an application based on the viewpoint of connected ships”, by He et al.; and (2) “The development of key technologies in applications of vessels connected to the Internet”, by Tian et al. Two papers on smart home are as follows: (1) “A novel approach based on time cluster for activity recognition of daily living in smart homes”, by Liu et al.; and (2) “IoT-based image recognition system for smart home-delivered meal services”, by Tseng et al.


2020 ◽  
Vol 60 (11) ◽  
pp. 16-20
Author(s):  
Vugar Hajimahmud Abdullayev ◽  
◽  
Vusala Alyag Abuzarova ◽  

The article is devoted to the study of cyber security problems in the Smart Cities system. The development of the IT industry has led to the introduction of new technologies into our lives. One of these technologies is the Internet of Things technology. The application of IoT technology has increased in recent years. One of the most important areas in which Internet of Things technology is applied is the Smart Cities system. The main difference between smart cities and other cities is that their components are connected to each other via the Internet. All these smart devices create a smart city system in general. One of the biggest and most important problems in many areas where the Internet is used is security. The article looks at possible security problems in the system of smart cities and solutions to ensure cyber security. Key words: Smart city; Internet of Things; Information technologies; Security; Cyber security


Author(s):  
Wassila Guebli ◽  
Abdelkader Belkhir

The emergence of the internet of things in the smart homes has given rise to many services to meet the user's expectations. It is possible to control the temperature, the brightness, the sound system, and even the security of the house via a smartphone, at the request of the inhabitant or by scheduling it. This growing number of “things” must deal with material constraints such as home network infrastructure, but also applicative due to the number of proposed services. The heterogeneity of users' preferences often creates conflicts between them like turn on and off light or using a heater and an air conditioner in the same time. To manage these conflicts, the authors proposed a solution based on linked open data (LOD). The LOD allows defining the relation between the different services and things in the house and a better exploitation of the attributes of the inhabitant's profile and services. It consists to find inconsistency relation between the equipment using the antonym thesaurus.


Author(s):  
Jonika Lamba ◽  
Esha Jain

Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.


Sign in / Sign up

Export Citation Format

Share Document