scholarly journals Deployment of IoT based smart environment : key issues and challenges

2018 ◽  
Vol 7 (2.14) ◽  
pp. 544
Author(s):  
Deepti Sehrawat ◽  
Nasib Singh Gill

The Internet of Things (IoT) is viewed as a dynamic technological revolution representing future communications and computing in several areas. It introduces physical objects in the sphere of cyber world. IoT is not about a single technology but various complementary technological developments which provides ways to bridge the gap between the real world and the virtual world. A number of wireless sensor technologies are implemented in IoT viz. RFID, ZigBee, actuators, WiFi and wireless sensor networks (WSNs). This paper presents various key technologies involved in IoT and its detailed architecture. IoT architecture explains function of each layer with respect to the technologies and the devices that surround each layer. Each layer has its specific security issues. This paper presents various security threats related to each IoT layer and the specific security requirements. Information security, data protection, and user's privacy are among important key areas in IoT. This paper in the nutshell presents new challenges posed by IoT so that further work can be undertaken in creating a robust, efficient and smart environment for IoT based applications.

Author(s):  
Roumaissa Khelf ◽  
Nacira Ghoualmi-Zine ◽  
Marwa Ahmim

The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.


Author(s):  
G. Ikrissi ◽  
T. Mazri

Abstract. Smart environments provide many benefits to the users including comfort, convenience, energy efficiency, safety, automation, and service quality. The Internet of Things (IoT) has developed to become one of the widely used technologies in smart environments. Many security attacks and threats are generated by security flaws in IoT-based systems and devices, which may affect smart environments applications. As a result, security is one of the most important issues in any smart area or environment based on the IoT model. This paper presents an overview of smart environments based on IoT technology and highlights the main security issues and countermeasures in the four layers of smart environment IoT architecture. It also reviews some of the current solutions that ensure the security of information in smart environments applications.


2019 ◽  
Vol 20 (3) ◽  
pp. 457-484 ◽  
Author(s):  
Syed Rameem Zahra ◽  
Mohammad Ahsan Chishti

The purpose of this paper is to chalk out the criticality of the most important pillar of Internet of Things (IoT),i.e., Security and Privacy (S&P). IoT has seen its journey from implausible and impossible to sustainable and tenable. Its rateof expansion into various grounds from agriculture to sports; personal health to intelligent trac detection; waste managementto smart homes is astonishing, dramatic and unforeseen. With such vast adaptability and functionality, its security remains thebiggest concern because in contrast to the traditional networks, IoT faces huge vulnerabilities some of which are inherent and othersexplicit. The existing security solutions cannot be implemented in IoT because of its unique characteristics. Therefore, there is adire need to develop novel security procedures betting IoT. This paper spots the features that are peculiar to IoT and concurrentlyanalyzes the security threats and challenges they pose. This work also provides a glimpse of the major IoT implementations withtheir particular security requirements and challenges. Moreover, this paper critically evaluates the proposed countermeasures tosecurity attacks on dierent features and why they cannot be used in IoT environments. Also, it is found that most of the securitysolutions used in IoT devices are inspired from Wireless Sensor Networks (WSN) but the striking dierences among the two makethem inadequate in IoT. The security requirements and challenges peculiar to various IoT services are also identied. To assist theresearchers in remaining up-to-date, we for the rst time have thoroughly expressed some of the most famous and practical attacksfaced across the world in the recent past, how much damage they caused, how much nancial losses were faced, etc.


2016 ◽  
Vol 54 (2(108)) ◽  
pp. 22-36
Author(s):  
Christopher Biedermann

PURPOSE/THESIS: The purpose of this paper is to use a recent cyber-attack to highlight the current state of readiness of Internet of Things (IoT) technologies with regard to security vulnerabilities as well as fundamental – in the author’s opinion – changes that will need to take place within these industries and technologies to mitigate the overall cybersecurity risk. APPROACH/METHODS: The analysis of the findings from numerous existing published security studies. RESULTS AND CONCLUSIONS: The following conclusions were reached: (1) in the world becoming more and more interconnected through the web enabled devices (IoT devices), new forms of security threats have been developed; (2) at present IoT devices introduce a high level of vulnerability; (3) many of these risks may be mitigated with already existing technologies; (4) however, due to the fragmented and heterogeneous nature of the IoT devices, the implementation of even basic levels of security is more challenging than in the case of traditional Internet connected devices (e.g. personal computers); (5) the industry needs to face and address three key issues that will in turn help to mitigate the unique security threats posed by IoT devices, namely: the drive towards open standards, the industry cooperation and consolidation, and the improvement of consumer awareness. ORIGINALITY/VALUE: The value of the research is to highlight the security issues related to the Internet of Things and propose solutions that must be implemented to increase the level of security awareness within the IoT environment.


Author(s):  
Ahmed Maarof ◽  
Mohamed Senhadji ◽  
Zouheir Labbi ◽  
Mostafa Belkasmi

In this chapter, the authors present a review of security requirements for IoT and provide an analysis of the possible attacks, security issues, and major security threats from the perspective of layers that comprise IoT. To overcome these limitations, the authors describe a security implementation challenges in IoT security. This chapter serves as a manual of security threats and issues of the IoT and proposes possible solutions and recommendations for improving security in the IoT environment.


Author(s):  
Christian Wittke ◽  
Kai Lehniger ◽  
Stefan Weidling ◽  
Mario Schoelzel

With the growing number of wireless devices in the internet of things (IoT), maintenance and management of these devices has become a key issue. In particular, the ability to wirelessly update devices is a must in order to fix security issues and software bugs, or to extend firmware functionality. Code update mechanisms in wireless sensor networks (WSNs), a subset of IoT networks, must handle limited resources and strict constraints. Also, over-the-air (OTA) code updates in the context of an IoT ecosystem may open new security vulnerabilities. An IoT security framework should therefore be extended with additional mechanisms to secure the OTA code update functionality. The chapter presents an overview of various OTA code update techniques for WSNs and their security flaws along with some existing attacks and possible countermeasures. It is discussed which attacks can be used more easily with the code update functionality. Countermeasures are compared as to whether they secure the weakened security objectives, giving a guideline to choose the right combination of countermeasures.


Author(s):  
Alekha Kumar Mishra

Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3907 ◽  
Author(s):  
Guang Yang ◽  
Lie Dai ◽  
Zhiqiang Wei

With the advances in technology, there has been an increasing interest from researchers and industrial institutions in the use of underwater wireless sensor networks (UWSNs). Constrained by the open acoustic channel, harsh underwater environment, and their own particularities, UWSNs are vulnerable to a wide class of security threats and malicious attacks. However, most existing research into UWSNs has not taken security into consideration. Moreover, the existing relatively mature security mechanisms for WSNs cannot be directly utilized in UWSNs. For these reasons, this article aims to present a comprehensive overview of the particularities, constraints, attacks, challenges and current security mechanisms of UWSNs. In addition, challenging, open and hot research topics are outlined.


2019 ◽  
Vol 1 (2) ◽  
pp. 15
Author(s):  
Huang Jie

Security threats and shows abnormality about security, safety, privacy and trust as network security-related data, in short, security-related data. Apparently, the first step to detect network attacks and intrusions is to collect the security-related data. In this paper, we will present a lot of approaches to solving Networks and Information Security issues. We survey network security in LTE technologies, Vehicular Ad-Hoc Network, and security in Wireless Sensor Network. Internet of Things. In this paper, we describe many methods in Information Security. Is consist of Information Security in Big Data and Cloud Computing.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Irfan Ahmad ◽  
Taj Rahman ◽  
Asim Zeb ◽  
Inayat Khan ◽  
Inam Ullah ◽  
...  

Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both researchers and the industrial side. Due to the harsh underwater environment, own capabilities, and open acoustic channel, it is also vulnerable to malicious attacks and threats. Attackers can easily take advantage of these characteristics to steal the data between the source and destination. Many review articles are addressed some of the security attacks and taxonomy of the Underwater Wireless Sensor Networks. In this study, we have briefly addressed the taxonomy of the UWSNs from the most recent research articles related to the well-known research databases. This paper also discussed the security threats on each layer of the Underwater Wireless sensor networks. This study will help the researchers design the routing protocols to cover the known security threats and help industries manufacture the devices to observe these threats and security issues.


Sign in / Sign up

Export Citation Format

Share Document