Security Analysis for SmartThings IoT Applications

Author(s):  
Florian Schmeidl ◽  
Bara Nazzal ◽  
Manar H. Alalfi
Author(s):  
Muthukumaran V. ◽  
Ezhilmaran D.

In recent years, the growth of IoT applications is rapid in nature and widespread across several domains. This tremendous growth of IoT applications leads to various security and privacy concerns. The existing security algorithms fail to provide improved security features across IoT devices due to its resource constrained nature (inability to handle a huge amount of data). In this context, the authors propose a cloud-assisted proxy re-encryption scheme for efficient data sharing across IoT systems. The proposed approach solves the root extraction problem using near-ring. This improves the security measures of the system. The security analysis of the proposed approach states that it provides improved security with lesser computational overheads.


Author(s):  
F. Rougaii ◽  
T. Mazri

Abstract. Recent years have seen a new amalgamation between Remote virtual doctor systems and healthcare IoT applications which plays a crucial role in enhancing patient’s healthcare life. The Remote VDS connected with smart Healthcare devices through the wireless network to be accessible anytime and anywhere is anticipated to treat rapidly valuable and confidential data such as personal medical images. Therefore, quick medical image encryption is an essential task in healthcare topic. Some medical image encryption research like the Scan methodology proposed for Remote VDS suffers from a long computational time. Then, the patient will confront difficulty on treatment availability in real-time and especially for critical situations. To overcome this problem, in this work, three medical image encryption methods are compared, (1) A Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications, (2) A new chaotic map with dynamic analysis and encryption application on the Internet of Health Things, and (3) Robust medical image encryption based on DNA chaos method. The comparison results have proven that the new chaotic map with a dynamic analysis scheme has high-security analysis and performances with low computational time compared to other methods. That makes it a good candidate for the H-IOT-RVDS environment connecting over 5G technology like a cellular network to enable connectivity between nodes.


Author(s):  
Muhammad Rana ◽  
Quazi Mamun

To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication with a robust pervasive communication mechanism. However, due to the resource constraints and heterogeneous characteristics of the sensor devices, traditional authentication and key management schemes are not effective for such applications. Here, we propose a pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications in which the sensor nodes can establish secure links with peer sensor nodes and end-users. The established authentication scheme is based on implicit certificates, and it provides application-level end-to-end security. A comprehensive description of the scenario based behaviour of the protocol is presented. With the performance evaluation and the security analysis, it is justified that the proposed scheme is viable to deploy in the resource constrained WSNs.


Author(s):  
Yu.M. Sklyarova ◽  
I.Yu. Sklyarov ◽  
E.N. Lapina

2020 ◽  
Vol 10 (5) ◽  
pp. 43-49
Author(s):  
MARINA MARKHGEYM ◽  
◽  
ANNA BEZUGLAYA

The article presents the author’s analysis of constitutional texts, regulations and analytical materials of the countries of the Commonwealth of Independent States in order to consolidate in them the consolidated powers of the chambers of parliaments associated with the implementation of food security. Analysis of legal acts of the studied group of states showed that the sphere of food security (as part of the agrarian and food sphere/function) is one of the eventual spheres of interaction between the chambers of parliament. In the course of the study, two approaches of states to the formalization of provisions related to food security in constitutional texts were identified. The first approach is to consolidate norms that indirectly affect the field of food security (Belarus, Kazakhstan, Russia); the second - in the absence of such provisions (Tajikistan and Uzbekistan). It has been established that the interaction of the chambers of parliaments in the field of food security is implemented through the adoption of laws, as well as through various parliamentary events (parliamentary hearings, round tables, seminars, meetings, etc.). It is concluded that the available options for interaction between the chambers of parliaments of states in the field of food security reflect their independent approaches, which are developed on the basis of legal doctrine and practice.


Sign in / Sign up

Export Citation Format

Share Document