scholarly journals Trust Based Security Model for IoT and Fog based Applications.

2018 ◽  
Vol 7 (2.7) ◽  
pp. 691
Author(s):  
Patil Abhijit J ◽  
Dr G. Syam Prasad

Wireless sensor networks (WSN’s) are becoming increasingly popular in the current Era. WSN and Smart Devices are key enablers for the Internet of things (IoT) and Fog Computing based applications and it brings IoT applications with enhanced capabilities for sensing and actuation. IOT is a very growing area and having wide scope for research. Integration of WSNs into IoT is today’s need. Adoptions to cloud computing, increasing use of automation of tools, Integration of internet into most activities of human had reached to the stage where Internet of Things based applications are becoming more popular today. Many new applications are now being developed in the field of IoT. The broad areas of application are Home automation, Smart cities, Retail, Agriculture, Manufacturing, Healthcare, Habitat Monitoring, Security and Surveillance etc. With this wide scope the applications are prone to many security threats. Providing Security for IoT and Fog computing-based applications is a Research Challenge. This paper tries to discuss with the common security attacks, Reasons, their counter measures and research directions. We are also proposing a Trust based Security model for implementing application layer level security in IoT and fog.  

Author(s):  
Ganesh Khekare ◽  
Pushpneel Verma ◽  
Urvashi Dhanre ◽  
Seema Raut ◽  
Ganesh Yenurkar

The internet of things (IoT) is transpiring technology. In the last decade, demand of IoT has been increased due to various things like the use of smart devices; increased demand for voice-based services; the concept of smart cities has been evolved; more requirements of processed data in fields of artificial intelligence and machine learning; fog computing, deep learning, etc. IoT is expected to reach the milestone of 30 billion IoT units at the end of the year 2020. Internet of things is the network of statutory things like houses, private companies, automobiles, and various objects integrated with sensors, actuators, software, electronic equipment, and internet availability that provides the facility to devices to interchange their data. The main contribution of this article is to provide state of art about the characteristics, functionalities, and challenges of the internet of things and the journey of IoT right from start to how it will make an impact on people's quality of life throughout the world in the near future.


Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 772 ◽  
Author(s):  
Houshyar Honar Pajooh ◽  
Mohammad Rashid ◽  
Fakhrul Alam ◽  
Serge Demidenko

The proliferation of smart devices in the Internet of Things (IoT) networks creates significant security challenges for the communications between such devices. Blockchain is a decentralized and distributed technology that can potentially tackle the security problems within the 5G-enabled IoT networks. This paper proposes a Multi layer Blockchain Security model to protect IoT networks while simplifying the implementation. The concept of clustering is utilized in order to facilitate the multi-layer architecture. The K-unknown clusters are defined within the IoT network by applying techniques that utillize a hybrid Evolutionary Computation Algorithm while using Simulated Annealing and Genetic Algorithms. The chosen cluster heads are responsible for local authentication and authorization. Local private blockchain implementation facilitates communications between the cluster heads and relevant base stations. Such a blockchain enhances credibility assurance and security while also providing a network authentication mechanism. The open-source Hyperledger Fabric Blockchain platform is deployed for the proposed model development. Base stations adopt a global blockchain approach to communicate with each other securely. The simulation results demonstrate that the proposed clustering algorithm performs well when compared to the earlier reported approaches. The proposed lightweight blockchain model is also shown to be better suited to balance network latency and throughput as compared to a traditional global blockchain.


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2020 ◽  
Author(s):  
Tanweer Alam

<p>The fog computing is the emerging technology to compute, store, control and connecting smart devices with each other using cloud computing. The Internet of Things (IoT) is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. <a>This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secured technology that can be a boon for the next generation computing. The combination of fog, blockchains, and IoT creates a new opportunity in this area. In this research, the author presents a middleware framework based on the blockchain, fog, and IoT. The framework is implemented and tested. The results are found positive. </a></p>


2020 ◽  
Vol 60 (11) ◽  
pp. 16-20
Author(s):  
Vugar Hajimahmud Abdullayev ◽  
◽  
Vusala Alyag Abuzarova ◽  

The article is devoted to the study of cyber security problems in the Smart Cities system. The development of the IT industry has led to the introduction of new technologies into our lives. One of these technologies is the Internet of Things technology. The application of IoT technology has increased in recent years. One of the most important areas in which Internet of Things technology is applied is the Smart Cities system. The main difference between smart cities and other cities is that their components are connected to each other via the Internet. All these smart devices create a smart city system in general. One of the biggest and most important problems in many areas where the Internet is used is security. The article looks at possible security problems in the system of smart cities and solutions to ensure cyber security. Key words: Smart city; Internet of Things; Information technologies; Security; Cyber security


2017 ◽  
pp. 88-111 ◽  
Author(s):  
Cristina Elena Turcu ◽  
Corneliu Octavian Turcu

This chapter presents a future vision for healthcare, which will involve smart devices, Internet of Things, and social networks, that make this vision a reality. The authors present the necessary background by introducing the Social Internet of Things paradigm. Agent technology seems to be a promising approach in the adoption of the Social Internet of Things in collaborative environments with increased autonomy and agility, like healthcare is. Also, it is examined challenges to the adoption of the Social Internet of Things in healthcare in order to facilitate new applications and services in more effective and efficient ways.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 700
Author(s):  
N. Koteswara Rao ◽  
Gandharba Swain

The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things. 


2020 ◽  
Vol 1 (1) ◽  
pp. 7-13
Author(s):  
Bayu Prastyo ◽  
Faiz Syaikhoni Aziz ◽  
Wahyu Pribadi ◽  
A.N. Afandi

Internet use in Banyumas Regency is now increasingly diverse according to the demands of the needs. The development of communication technology raises various aspects that also develop. For example, the use of the internet for a traffic light control system so that it can be adjusted according to the settings and can be monitored in real time. In the development of communication technology, the term Internet of Things (IoT) emerged as the concept of extending the benefits of internet communication systems to give impulses to other systems. In other words, IoT is used as a communication for remote control and monitoring by utilizing an internet connection. The Internet of Things in the era is now being developed to create an intelligent system for the purposes of controlling various public needs until the concept of the smart city emerges. Basically, smart cities utilize internet connections for many purposes such as controlling CCTV, traffic lights, controlling arm robots in the industry and storing data in hospitals. If the system is carried out directly from the device to the central server, there will be a very long queue of data while the system created requires speed and accuracy of time so that a system is needed that allows sufficient data control and processing to be carried out on network edge users. Then fog Computing is used with the hope that the smart city system can work with small latency values ​​so that the system is more real-time in sending or receiving data.


2020 ◽  
Vol 1 (2) ◽  
pp. 6-13
Author(s):  
Bayu Prastyo ◽  
Faiz Syaikhoni Aziz ◽  
Wahyu Pribadi ◽  
A.N. Afandi

Internet use in Banyumas Regency is now increasingly diverse according to the demands of the needs. The development of communication technology raises various aspects that also develop. For example, the use of the internet for a traffic light control system so that it can be adjusted according to the settings and can be monitored in real time. In the development of communication technology, the term Internet of Things (IoT) emerged as the concept of extending the benefits of internet communication systems to give impulses to other systems. In other words, IoT is used as a communication for remote control and monitoring by utilizing an internet connection. The Internet of Things in the era is now being developed to create an intelligent system for the purposes of controlling various public needs until the concept of the smart city emerges. Basically, smart cities utilize internet connections for many purposes such as controlling CCTV, traffic lights, controlling arm robots in the industry and storing data in hospitals. If the system is carried out directly from the device to the central server, there will be a very long queue of data while the system created requires speed and accuracy of time so that a system is needed that allows sufficient data control and processing to be carried out on network edge users. Then fog Computing is used with the hope that the smart city system can work with small latency values ​​so that the system is more real-time in sending or receiving data


Sign in / Sign up

Export Citation Format

Share Document