scholarly journals Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Fengyin Li ◽  
Dongfeng Wang ◽  
Yilei Wang ◽  
Xiaomei Yu ◽  
Nan Wu ◽  
...  

The development of Internet of Things (IoT) and Mobile Edge Computing (MEC) has led to close cooperation between electronic devices. It requires strong reliability and trustworthiness of the devices involved in the communication. However, current trust mechanisms have the following issues: (1) heavily relying on a trusted third party, which may incur severe security issues if it is corrupted, and (2) malicious evaluations on the involved devices which may bias the trustrank of the devices. By introducing the concepts of risk management and blockchain into the trust mechanism, we here propose a blockchain-based trust mechanism for distributed IoT devices in this paper. In the proposed trust mechanism, trustrank is quantified by normative trust and risk measures, and a new storage structure is designed for the domain administration manager to identify and delete the malicious evaluations of the devices. Evidence shows that the proposed trust mechanism can ensure data sharing and integrity, in addition to its resistance against malicious attacks to the IoT devices.

Author(s):  
Jasmine Norman ◽  
Paul Joseph

IoT is an acronym for Internet of Things. It is the revolutionary area that transforms the digital world into a device world. IoT helps in not only fulfilling human requirements, but also they act as a communication medium between humans and electronic devices. The birth of IoT started in early 2000s, but since then, it is an amazing fact that now at least 65% of devices are connected with IoT technology with the term “smart” in their prefix and it would be up by 30% at the end of 2016 (Gartner Survey, 2015). Since then, many security issues were raised, and have been risen all these years due to the flaws in that devices. This made attackers to take advantage over that devices and started controlling them. This chapter studies IoT application layer protocols, services offered and gives an idea of existing cyber attacks and threat. In addition, the authors give the possible attacks on the IoT devices, in particular at application layer, and give the necessary precautions to overcome the cyber attacks both for consumers and vendors.


Blockchain technology uses the cryptographic technique to create expanding list of data records called blocks. Along with transaction and timestamp data, each block holds a hash value obtained using cryptographic technique. Blockchain gains importance for its decentralized data transaction and authorization without the need for third-party intervention. Although, it is mostly used in Finance sector these days, due to its inherent ability to protect data it can be applied to every field of computation especially in fields where data transaction is voluminous. Internet of Things (IoT) is one such area where it involves collection, transfer and processing of real time data from objects, humans and sensors to automate various tasks. Hence, this paper reviews the blockchain technology, and how it can be coupled with IoT to overcome the privacy and security issues. This paper first systematically introduces the concept of blockchain technology, its applications along with the need for IoT devices and its implementation. Finally, it discusses the blockchain based IoT (BIoT) its architecture, advantages, challenges in implementation


Author(s):  
Jasmine Norman ◽  
Paul Joseph

IoT is an acronym for Internet of Things. It is the revolutionary area that transforms the digital world into a device world. IoT helps in not only fulfilling human requirements, but also they act as a communication medium between humans and electronic devices. The birth of IoT started in early 2000s, but since then, it is an amazing fact that now at least 65% of devices are connected with IoT technology with the term “smart” in their prefix and it would be up by 30% at the end of 2016 (Gartner Survey, 2015). Since then, many security issues were raised, and have been risen all these years due to the flaws in that devices. This made attackers to take advantage over that devices and started controlling them. This chapter studies IoT application layer protocols, services offered and gives an idea of existing cyber attacks and threat. In addition, the authors give the possible attacks on the IoT devices, in particular at application layer, and give the necessary precautions to overcome the cyber attacks both for consumers and vendors.


Author(s):  
Aman Tyagi

Elderly population in the Asian countries is increasing at a very fast rate. Lack of healthcare resources and infrastructure in many countries makes the task of provding proper healthcare difficult. Internet of things (IoT) in healthcare can address the problem effectively. Patient care is possible at home using IoT devices. IoT devices are used to collect different types of data. Various algorithms may be used to analyse data. IoT devices are connected to the internet and all the data of the patients with various health reports are available online and hence security issues arise. IoT sensors, IoT communication technologies, IoT gadgets, components of IoT, IoT layers, cloud and fog computing, benefits of IoT, IoT-based algorithms, IoT security issues, and IoT challenges are discussed in the chapter. Nowadays global epidemic COVID19 has demolished the economy and health services of all the countries worldwide. Usefulness of IoT in COVID19-related issues is explained here.


Author(s):  
K. Dinesh Kumar ◽  
Venkata Rathnam T. ◽  
Venkata Ramana R. ◽  
M. Sudhakara ◽  
Ravi Kumar Poluru

Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create the communication among objects directly without human interaction. With the presence of internet of things technology in our daily comes smart thinking and various advantages. At the same time, secure systems have been a most important concern for the protection of information systems and networks. However, adopting traditional security management systems in the internet of things leads several issues due to the limited privacy and policies like privacy standards, protocol stacks, and authentication rules. Usually, IoT devices has limited network capacities, storage, and computing processors. So they are having more chances to attacks. Data security, privacy, and reliability are three main challenges in the IoT security domain. To address the solutions for the above issues, IoT technology has to provide advanced privacy and policies in this large incoming data source. Blockchain is one of the trending technologies in the privacy management to provide the security. So this chapter is focused on the blockchain technologies which can be able to solve several IoT security issues. This review mainly focused on the state-of-the-art IoT security issues and vulnerabilities by existing review works in the IoT security domains. The taxonomy is presented about security issues in the view of communication, architecture, and applications. Also presented are the challenges of IoT security management systems. The main aim of this chapter is to describe the importance of blockchain technology in IoT security systems. Finally, it highlights the future directions of blockchain technology roles in IoT systems, which can be helpful for further improvements.


2013 ◽  
Vol 401-403 ◽  
pp. 1792-1795 ◽  
Author(s):  
Tao Liu ◽  
Ya Wen Guan ◽  
Yi Qun Yan ◽  
Li Liu ◽  
Qi Chao Deng

Aimed to the security and privacy issues which restrict the construction and development of the Internet of Things, a WSN-oriented key agreement protocol in the Internet of Things ( IOT) has been proposed . Trust management was introduced the security mechanism of IOT, the use of bilinear pairing technology, the identity-based key agreement was realized. Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy. Thus it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network. The distributed self-organizing key negotiation process without credible third-party management can enhance the survivability of IOT, and the network has a good scalability.


2019 ◽  
Vol 16 (1) ◽  
pp. 1
Author(s):  
Eky Arjayanto Nurhasana ◽  
Hermansyah Hermansyah ◽  
Lely Aylia ◽  
Kasim Kasim

In relation to utilizing AC waste water and the use of water in watering plantsespecially ornamental plants and provide awareness for efforts to save water. By usingapplication of Internet of Things (IoT) based electronic circuit which is one of the programsdeveloped to facilitate the process of watering and fertilizing plants automatically. One ofthe way you can do this is by using IoT devices as a control device.This product is expected to be a product that can be sold to the market at an affordable price. andhas a function that is environmentally friendly and can be used by all people in the future. Activitiesmaking this product starts with the initial stage of observing the room using AC and makingdesign model, after getting the right room, then is to prepare the device to beused to make products both electronic and non-electronic devices and finally prepare toolswhich will be used for installation and configuration of the tool. After the product is finished, the next is testingproduct. The final stage includes functional checks to determine whether the tool is functioning properly based onsystem design that has been designed.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Yizhen Sun ◽  
Jianjiang Yu ◽  
Jianwei Tian ◽  
Zhongwei Chen ◽  
Weiping Wang ◽  
...  

Security issues related to the Internet of Things (IoTs) have attracted much attention in many fields in recent years. One important problem in IoT security is to recognize the type of IoT devices, according to which different strategies can be designed to enhance the security of IoT applications. However, existing IoT device recognition approaches rarely consider traffic attacks, which might change the pattern of traffic and consequently decrease the recognition accuracy of different IoT devices. In this work, we first validate by experiments that traffic attacks indeed decrease the recognition accuracy of existing IoT device recognition approaches; then, we propose an approach called IoT-IE that combines information entropy of different traffic features to detect traffic anomaly. We then enhance the robustness of IoT device recognition by detecting and ignoring the abnormal traffic detected by our approach. Experimental evaluations show that IoT-IE can effectively detect abnormal behaviors of IoT devices in the traffic under eight different types of attacks, achieving a high accuracy value of 0.977 and a low false positive rate of 0.011. It also achieves an accuracy of 0.969 in a multiclassification experiment with 7 different types of attacks.


2020 ◽  
Author(s):  
Liming Wang ◽  
Hongqin Zhu ◽  
Jiawei Sun ◽  
Ran Dai ◽  
Qi Ma ◽  
...  

Abstract Since IoT devices are strengthened, edge computing with multi-center cooperation becomes a trend. Considering that edge nodes may belong to different center, they have different trust management model, it’s hard to assess trust among edge nodes. In this paper, we take blockchain to coordinate differences among centers, construct a trust environment for transactions in IoT. In detail, we propose a blockchain based identity management for IoT to ensure identity is credible, then design a transaction model to provide certification for IoT transactions. And, we take machine learning methods to analyze IoT transaction log, thus decide trust nodes or not. Experiment results show that our mechanism could effectively identify trustworthy edges in IoT.


Internet-of-Things (IoT) has been considered as a fundamental part of our day by day existence with billions of IoT devices gathering information remotely and can interoperate within the current Internet framework. Fog computing is nothing but cloud computing to the extreme of network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in the Internet of Things (IoT). Fog computing allows the data storing and processing any nearby network devices or nearby cloud endpoint continuum. Using fog computing, the designer can reduce the computation architecture of the IoT devices. Unfortunitily, this new paradigm IoT-Fog faces numerous new privacy and security issues, like authentication and authorization, secure communication, information confidentiality. Despite the fact that the customary cloud-based platform can even utilize heavyweight cryptosystem to upgrade security, it can't be performed on fog devices drectly due to reseource constraints. Additionally, a huge number of smart fog devices are fiercely disseminated and situated in various zones, which expands the danger of being undermined by some pernicious gatherings. Trait Based Encryption (ABE) is an open key encryption conspire that enables clients to scramble and unscramble messages dependent on client qualities, which ensures information classification and hearty information get to control. Be that as it may, its computational expense for encryption and unscrambling stage is straightforwardly corresponding to the multifaceted nature of the arrangements utilized. The points is to assess the planning, CPU burden, and memory burden, and system estimations all through each phase of the cloud-to-things continuum amid an analysis for deciding highlights from a finger tapping exercise for Parkinson's Disease patients. It will be appeared there are confinements to the proposed testbeds when endeavoring to deal with upwards of 35 customers at the same time. These discoveries lead us to a proper conveyance of handling the leaves the Intel NUC as the most suitable fog gadget. While the Intel Edison and Raspberry Pi locate a superior balance at in the edge layer, crossing over correspondence conventions and keeping up a self-mending network topology for "thing" devices in the individual territory organize.


Sign in / Sign up

Export Citation Format

Share Document