Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce

Author(s):  
Sachchidanand Singh ◽  
Nirmala Singh
2020 ◽  
Vol 17 (1) ◽  
pp. 115-121 ◽  
Author(s):  
Soram Ranbir Singh ◽  
Khan Kumar Ajoy

With the advancements in wireless internet technology, a new computing ecosystem, the Internet of Things(IoT), has ushered in numerous devices in many areas in our life as well as in industries. The IoT is a computing notion that describes a scenario in which objects we use everyday are accessible using the internet and can be controlled from anywhere (Kung, Y.F., et al., 2018. Home Monitoring System Based Internet of Things. 2018 IEEE International Conference on Applied System Invention (ICASI), April; IEEE. pp.325–327; Singh, S. and Singh, N., 2015. Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE. pp.1577–1581). It could comprise devices with sensors to gather and broadcast data over the Internet (Singh, S. and Singh, N., 2015. Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE. pp.1577–1581). As per report of the research firm Gartner, the number of IoT objects will surpass 11.2 billion by 2018, and 20.4 billion by 2020. By 2020, the IoT industries will make revenue of almost 3 trillion US Dollars. As IoT devices are largely used in various areas of importance, it will definitely bring a lot of interests to hackers. It is worthwhile to quote here that hackers took away more than Rs 78 crore by hacking into router of Cosmos Bank based in Pune by duplicating debit cards in August, 2018. They carried out about 12 thousand unethical transactions worth Rs 78 crore in 28 countries. Hence, it is necessary to consider data privacy so that we can protect the data with limited system resource and technology. This paper proposes a new key management scheme with entity authentication for IoT devices. The proposed scheme uses modified Tate pairing. The presented scheme is apposite for IoT devices such as sensor networks due to their lower computational requirements.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Rachit ◽  
Shobha Bhatt ◽  
Prakash Rao Ragiri

AbstractThe Internet of Things (IoT) is a network of embedded devices that are uniquely identifiable and have embedded software required to communicate between the transient states. The purpose of this study is to explore discrete IoT security challenges pertaining to currently deployed IoT standards and protocols. We have presented a detailed review in this study that focuses on IoT's imminent security aspects, covering identification of risks pertaining to the current IoT system, novel security protocols, and security projects proffered in recent years. This work presents an updated review of the IoT architecture in the protocols and standards that are proffered for the next-gen IoT systems. A security-specific comparative analysis of protocols, standards, and proffered security models are presented as per IoT security requirements. This study elicits the need for standardization at the communication and data audit level, which exposes the hardware, software, and data to various threats and attacks. Our study reveals a need for protocols that are competent enough to be accorded for over one threat vector. This paper provides an insight into the latest security research trends, which will prove beneficial in the development of IoT security. The research outcomes can benefit the research community in IoT by integrating IoT-based devices' best security aspects.


Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2647
Author(s):  
Stefan Balogh ◽  
Ondrej Gallo ◽  
Roderik Ploszek ◽  
Peter Špaček ◽  
Pavol Zajac

Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.


Author(s):  
Nagesh UB ◽  
Nayana MS ◽  
Shruthi CS ◽  
Sudeep Poojary ◽  
Vaishnavi PS ◽  
...  

Internet of Things (IoT) has drawn important attention in recent years since it has made revolutionary changes in human life. The IoT enables the exchange of information or data in a wide variety of applications such as smart buildings, smart health, smart transport, and so on. As billions of connected things communicate with each other and can interchange sensitive information that may be revealed. Hence, strengthening IoT’s security and preserving users’ privacy is a crucial challenge. The aim of this paper is to provide a comprehensive study of the IoT security. Several IoT security attacks are examined and a taxonomy of the security requirements based on the attacks purposes is proposed. Furthermore, recent security solutions are described and classified based on their application area. Ultimately, open research directions and security challenges are discussed.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6163
Author(s):  
Wencheng Yang ◽  
Song Wang ◽  
Nor Masri Sahri ◽  
Nickson M. Karie ◽  
Mohiuddin Ahmed ◽  
...  

The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.


2021 ◽  
Vol 58 (2) ◽  
pp. 6544-6560
Author(s):  
Dr. B. Sundaravadivazhagan, Dr. B. Subashini, Mr. Mohemed Ashik M

In the present scenario, Internet of Things is playing vital role in the next era of communication. The IOT applications like smart cities, smart houses, smart livestock, smart health care, smart climate etc.It can be lead to many security challenges and issues. The aim of this survey focus on the main objective of the security challenges and issues in the data privacy, security, confidentiality, integrity, availability, access control, encryption, default password, malware and ransom, botnet, phishing, cloud, routing and trust management and discussed recovery from mention security defies. This study has detailed review of IoT layered design, each of these layers having lot of security challenges such as threats, vulnerabilities and attacks. Understanding these challenges and associated countermeasures mechanism with the help of the secure routing.          


2019 ◽  
Vol 8 (3) ◽  
pp. 1519-1528

Internet of Things (IoT) is an alliance of material object linked via internet. Material objects embedded with RFID, WSNs and many more through which objects remain connected with each other. Each material objects which is the part of communication are having a unique identifier. IoT is extremely heterogeneous, so security is a big challenge in IoT. In this article, many security challenge and counters measures and research objectives are studied.


Author(s):  
Mohamed Labbi ◽  
Nabil Kannouf ◽  
Mohammed Benabdellah

The internet of things (IoT) is a concept that is revolutionizing our daily lives along with different areas of industry. All existing objects will be connected to the internet. All the possibilities offered by IoT are very promising. However, setting up these architectures poses various problems. The exponential increase in devices is a challenge to the current internet architecture and represents a major security weakness of the internet of things. Indeed, securing these devices poses a significant security challenge. Thus, the emergence of the internet of things requires the design and deployment of new solutions. In this chapter, the authors propose content-centric networking (CCN) as a potential alternative networking solution for the IoT. The authors show that the implementation of CCN architecture in IoT can address several IoT requirements including security challenges.


Sign in / Sign up

Export Citation Format

Share Document