scholarly journals A Guideline on Pseudorandom Number Generation (PRNG) in the IoT

2021 ◽  
Vol 54 (6) ◽  
pp. 1-38
Author(s):  
Peter Kietzmann ◽  
Thomas C. Schmidt ◽  
Matthias Wählisch

Random numbers are an essential input to many functions on the Internet of Things (IoT). Common use cases of randomness range from low-level packet transmission to advanced algorithms of artificial intelligence as well as security and trust, which heavily rely on unpredictable random sources. In the constrained IoT, though, unpredictable random sources are a challenging desire due to limited resources, deterministic real-time operations, and frequent lack of a user interface. In this article, we revisit the generation of randomness from the perspective of an IoT operating system (OS) that needs to support general purpose or crypto-secure random numbers. We analyze the potential attack surface, derive common requirements, and discuss the potentials and shortcomings of current IoT OSs. A systematic evaluation of current IoT hardware components and popular software generators based on well-established test suits and on experiments for measuring performance give rise to a set of clear recommendations on how to build such a random subsystem and which generators to use.

Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4806
Author(s):  
Naor Kalbo ◽  
Yisroel Mirsky ◽  
Asaf Shabtai ◽  
Yuval Elovici

Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user’s privacy. In this review, we explore the attack surface of modern surveillance systems and enumerate the various ways they can be compromised with real examples. We also identify the threat agents, their attack goals, attack vectors, and the resulting consequences of successful attacks. Finally, we present current countermeasures and best practices and discuss the threat horizon. The purpose of this review is to provide researchers and engineers with a better understanding of a modern surveillance systems’ security, to harden existing systems and develop improved security solutions.


IEEE Access ◽  
2016 ◽  
Vol 4 ◽  
pp. 1393-1405 ◽  
Author(s):  
Zhiguo Ding ◽  
Linglong Dai ◽  
H. Vincent Poor

Subject Prospects for cybersecurity in 2019 Significance Cybersecurity is now a chief concern for both private sector organisations and governments, both of which are doing their best to eliminate ‘low-hanging’ vulnerabilities, but new developments such as the rapid expansion of the Internet of Things (IoT) are broadening the attack surface.


Author(s):  
Firas A. Albalas ◽  
Haneen Taamneh ◽  
Wail E. Mardini

Recently, the internet of things (IoT) has become an important concept which has changed the vision of the Internet with the appearance of IPv6 over low power and lossy networks (6LoWPAN). However, these 6LoWPANs have many drawbacks because of the use of many devices with limited resources; therefore, suitable protocols such as the Routing Protocol for low power and lossy networks (RPL) were developed, and one of RPL's main components is the trickle timer algorithm, used to control and maintain the routing traffic frequency caused by a set of control messages. However, the trickle timer suffered from the short-listen problem which was handled by adding the listen-only period mechanism. This addition increased the delay in propagating transmissions and resolving the inconsistency in the network. However, to solve this problem we proposed the history based consistency algorithm (HBC), which eliminates the listen-only period based on the consistency period of the network. The proposed algorithm showed very good results. We measured the performance of HBC trickle in terms of convergence time; which was mainly affected, the power consumption and the packet delivery ratio (PDR). We made a comparison between the original trickle timer, the E-Trickle, the optimized trickle and our HBC trickle algorithm. The PDR and the power consumption showed in some cases better results under the HBC trickle compared to other trickle timers and in other cases the results were very close to the original trickle indicating the efficiency of the proposed trickle in choosing optimal routes when sending messages.


2020 ◽  
Author(s):  
Volker Stocker

The Internet ecosystem is characterised by strong dynamics and rapid evolution. In view of the evolving range of content and applications that are to be delivered in an integrated fashion via general-purpose broadband networks, the requirements for traffic delivery and corresponding capacity allocation problems are becoming increasingly complex. The anticipated role of the Internet of things, 5G or virtual reality applications underscores how important it will be for broadband access service providers to flexibly meet these evolving demands in an economically efficient fashion. This book examines the evolution of, and competition within, the Internet ecosystem and analyses efficient capacity allocations in all-IP networks from a network economic perspective. In doing so, it critically appraises the role of network neutrality regulations.


2019 ◽  
Vol 8 (4) ◽  
pp. 3712-3715

Nowadays, the Internet of Things (IoT) has been used widely in our daily day to day life, starting from health care devices, hospital management appliances to a smart city. Most of the IoT devices have limited resources and limited storing capability. All the sensed information must have to be transmitted and to store in the cloud. To make a decision and for making analysis all the data stored in the cloud has to be retrieved. Making certain the credibility and security of the sensed information are much necessary and very important for the use of IoT devices. We tend to examine the proposed technique to be much secure than the existing one. In IoT, if the security is not ensured, then it may result in a variety of unsought issues. This survey resembles the overall safety aspects of IoT and debates the overall issues in the security of IoT.


2021 ◽  
Author(s):  
Saeid Zangeneh ◽  
Rassoul Roustaei

Abstract Nowadays, we are witnessing an increasing trend towards interconnected devices. This process of connecting devices instead of people is called the Internet of Things (IoT). The main concept of IoT is to connect heterogeneous objects separately and centrally in different places using standard protocols. The general idea is to create an independent world using intelligent objects that have the ability to exchange information and make decisions. Connected objects allow users to monitor and track remotely and in real-time. IoT relies on the development of a low-power, high-throughput network to support communication between objects and their connection to the Internet. These networks are characterized by limited resources in terms of energy, memory, and processing. In the true sense of the Internet of Things, networks called 6LoWPAN were created, and a new routing protocol compatible with these networks, called RPL, was introduced. Due to the limited nature of RPL-based networks, they may be exposed to a variety of internal attacks. Neighbor attacks and DIS are specific attacks in this protocol. This study proposes a trust-based RPL routing protocol which deals with blackhole threats. Besides, it is shown that while our recommended system is secure against blackhole attacks, it doesn’t incur any unwanted expenses in terms of network traffic.


Sign in / Sign up

Export Citation Format

Share Document