scholarly journals Defending Iot from Ddos Using Lightweight Authentication

2018 ◽  
Vol 7 (4.6) ◽  
pp. 388
Author(s):  
G. A. Vani ◽  
M. Metilda Florence

The emergence of Internet of things (IoT) is due to its   ability to dutifully transfer the data through a network. Now the concern is that security is not considered as main priority while developing the product. IoT is prone to vulnerabilities where Botnet and DDoS kind of attacks are common and a major issue that has to be considered these days. Since IoT is in no way resistive to attacks, this paper is all about proposing a solution for the Distributed Denial of Services attack that happens on IoT platform. Light weight authentication is necessary for any IoT devices because to reduce the power consumption and increase the processing speed of the device [16]. The experimental setup is built on OS named Contiki with cooja simulator that suits to all the devices that are in the IoT environment.   

2018 ◽  
Vol 7 (2.6) ◽  
pp. 231
Author(s):  
Teyi Yann Cedric Lawson ◽  
Senthilnathan T

Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of “Non-Interactive Zero Knowledge protocol” (NIZKP). This protocol involves two parties: The prover and the Verifier. Prover party should prove to the Verifier that they have the knowledge of something, without revealing what is it. In this paper, a study of Schnorr protocol or ∑- protocol over Elliptic Curves is done and the protocol is implemented in Python using the Python Cryptography Toolkit PyCrypto which is a collection of cryptographic modules implementing various algorithms and protocols. Finally, the results were compared with Elliptic Curve Diffie-Hellmann(ECDH) and present a performance evaluation of the protocols on the Raspberry Pi 3B model, a credit-card sized computer used for the development of IoT devices hence the perfect platforms to test the protocol.  


2021 ◽  
Vol 23 (09) ◽  
pp. 112-125
Author(s):  
Shagun Arora ◽  
◽  
Gurvinder Singh ◽  

The Internet of Things (IoT) is a network of physical devices, software, and hardware that communicate with one another. As the population ages, healthcare resources become scarce, and medical expenses rise, IoT-based solutions must be adapted to meet these issues in healthcare. To enhance the monitoring efficiency of the IoT-based healthcare system, several studies have been conducted. In this paper, the architecture utilized in the IoT, particularly cloud-integrated systems and security in IoT devices is explored. Factors like accuracy and power consumption are major concerns in the Internet of Things, therefore research projects aimed at enhancing the performance of IoT-based healthcare systems are highlighted. In this work, data management strategies in an IoT-based healthcare system with cloud capabilities are thoroughly examined. The performance of the IoT-based healthcare system is examined, as well as its benefits and drawbacks. Moreover, a comparative analysis is also done on some existing technologies that are utilized in healthcare. It has been observed from past studies that IoT protocol such as 6LoWPAN is mostly utilized in the domain of health care. The majority of research studies are effective in detecting many symptoms and accurately predicting illnesses. The IoT-based healthcare system built specifically for the elderly is an effective way to keep track of their medical concerns. High power consumption, a scarcity of resources, and security concerns major drawbacks of current systems are included in the proposed study.


Author(s):  
Anamika A. Mishra ◽  
Krushnalee Surve ◽  
Devika C. Babu ◽  
Upendra Verma

Internet of Things is the extension of Internet connectivity into physical devices, called IoT devices which are connected to Cloud Servers, which help them perform many functions, including, but not limited to security protocols. However, the distance between the Cloud Server and the end device could hamper the connectivity and also risk the security. Authentication is one of the major issues that needs to be taken care of in this scenario. This paper aims to look into this issue as well as to provide a viable solution.


Sensors ◽  
2019 ◽  
Vol 19 (4) ◽  
pp. 833 ◽  
Author(s):  
Ingook Jang ◽  
Donghun Lee ◽  
Jinchul Choi ◽  
Youngsung Son

The traditional Internet of Things (IoT) paradigm has evolved towards intelligent IoT applications which exploit knowledge produced by IoT devices using artificial intelligence techniques. Knowledge sharing between IoT devices is a challenging issue in this trend. In this paper, we propose a Knowledge of Things (KoT) framework which enables sharing self-taught knowledge between IoT devices which require similar or identical knowledge without help from the cloud. The proposed KoT framework allows an IoT device to effectively produce, cumulate, and share its self-taught knowledge with other devices at the edge in the vicinity. This framework can alleviate behavioral repetition in users and computational redundancy in systems in intelligent IoT applications. To demonstrate the feasibility of the proposed concept, we examine a smart home case study and build a prototype of the KoT framework-based smart home system. Experimental results show that the proposed KoT framework reduces the response time to use intelligent IoT devices from a user’s perspective and the power consumption for compuation from a system’s perspective.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4312 ◽  
Author(s):  
Daniel A. F. Saraiva ◽  
Valderi Reis Quietinho Leithardt ◽  
Diandre de Paula ◽  
André Sales Mendes ◽  
Gabriel Villarrubia González ◽  
...  

With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data. Strong but efficient cryptography solutions must be employed to deal with this problem, along with methods to standardize secure communications between these devices. The PRISEC module of the UbiPri middleware has this goal. In this work, we present the performance of the AES (Advanced Encryption Standard), RC6 (Rivest Cipher 6), Twofish, SPECK128, LEA, and ChaCha20-Poly1305 algorithms in Internet of Things (IoT) devices, measuring their execution times, throughput, and power consumption, with the main goal of determining which symmetric key ciphers are best to be applied in PRISEC. We verify that ChaCha20-Poly1305 is a very good option for resource constrained devices, along with the lightweight block ciphers SPECK128 and LEA.


2019 ◽  
Vol 8 (3) ◽  
pp. 2937-2942

Introduction of IoT (Internet of Things) has enjoyed vigorous support from governments and research institutions around the world, and remarkable achievements have been obtained till date. IoT systems collect the voluminous amount of data in real time from hospitals, battlefield and daily living environment which is related to privacy and security of people. So, securing collected sensitive data is one of the major challenges in the development of IoT systems. Authenticating the source of collected data is utmost important because the adversary may act as a source which may lead to a breach in security and privacy of people using the IoT network. IoT devices are resource scarce so lightweight methods for network security and privacy need to develop to achieve future development goals. In this paper, a novel lightweight node to node authentication scheme based on watermark is proposed to solve the contradiction between the security and restricted resources of perception layer. To improve the security, Proposed scheme usage node identity and the number of neighbours as input to generate the watermark and use the watermark to calculate the embedding positions which makes node authentication based on temporal dynamics of sensing network. The generated watermark is embedded in fixed size message digest generated using the variable message as input into a low-cost one-way hashing algorithm LOCHA. The embedded bits of watermark extracted at the receiving node and matched to check the authenticity of the sender node. The security analysis and simulations of the proposed scheme show that it can be a good candidate to ensure the authentication of the resource constraint devices which are integral part of Internet of Things at low cost


Electronics ◽  
2021 ◽  
Vol 10 (18) ◽  
pp. 2310
Author(s):  
Hyungchan Kim ◽  
Sungbum Kim ◽  
Yeonghun Shin ◽  
Wooyeon Jo ◽  
Seokjun Lee ◽  
...  

Recently, the number of Internet of Things (IoT) devices, such as artificial intelligence (AI) speakers and smartwatches, using a Linux-based file system has increased. Moreover, these devices are connected to the Internet and generate vast amounts of data. To efficiently manage these generated data and improve the processing speed, the function is improved by updating the file system version or using new file systems, such as an Extended File System (XFS), B-tree file system (Btrfs), or Flash-Friendly File System (F2FS). However, in the process of updating the existing file system, the metadata structure may be changed or the analysis of the newly released file system may be insufficient, making it impossible for existing commercial tools to extract and restore deleted files. In an actual forensic investigation, when deleted files become unrecoverable, important clues may be missed, making it difficult to identify the culprit. Accordingly, a framework for extracting and recovering files based on The Sleuth Kit (TSK) is proposed by deriving the metadata changed in Ext4 file system journal checksum v3 and XFS file system v5. Thereafter, by comparing the accuracy and recovery rate of the proposed framework with existing commercial tools using the experimental dataset, we conclude that sustained research on file systems should be conducted from the perspective of forensics.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Impact ◽  
2019 ◽  
Vol 2019 (10) ◽  
pp. 61-63 ◽  
Author(s):  
Akihiro Fujii

The Internet of Things (IoT) is a term that describes a system of computing devices, digital machines, objects, animals or people that are interrelated. Each of the interrelated 'things' are given a unique identifier and the ability to transfer data over a network that does not require human-to-human or human-to-computer interaction. Examples of IoT in practice include a human with a heart monitor implant, an animal with a biochip transponder (an electronic device inserted under the skin that gives the animal a unique identification number) and a car that has built-in sensors which can alert the driver about any problems, such as when the type pressure is low. The concept of a network of devices was established as early as 1982, although the term 'Internet of Things' was almost certainly first coined by Kevin Ashton in 1999. Since then, IoT devices have become ubiquitous, certainly in some parts of the world. Although there have been significant developments in the technology associated with IoT, the concept is far from being fully realised. Indeed, the potential for the reach of IoT extends to areas which some would find surprising. Researchers at the Faculty of Science and Engineering, Hosei University in Japan, are exploring using IoT in the agricultural sector, with some specific work on the production of melons. For the advancement of IoT in agriculture, difficult and important issues are implementation of subtle activities into computers procedure. The researchers challenges are going on.


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Scott Monteith ◽  
Tasha Glenn ◽  
John Geddes ◽  
Emanuel Severus ◽  
Peter C. Whybrow ◽  
...  

Abstract Background Internet of Things (IoT) devices for remote monitoring, diagnosis, and treatment are widely viewed as an important future direction for medicine, including for bipolar disorder and other mental illness. The number of smart, connected devices is expanding rapidly. IoT devices are being introduced in all aspects of everyday life, including devices in the home and wearables on the body. IoT devices are increasingly used in psychiatric research, and in the future may help to detect emotional reactions, mood states, stress, and cognitive abilities. This narrative review discusses some of the important fundamental issues related to the rapid growth of IoT devices. Main body Articles were searched between December 2019 and February 2020. Topics discussed include background on the growth of IoT, the security, safety and privacy issues related to IoT devices, and the new roles in the IoT economy for manufacturers, patients, and healthcare organizations. Conclusions The use of IoT devices will increase throughout psychiatry. The scale, complexity and passive nature of data collection with IoT devices presents unique challenges related to security, privacy and personal safety. While the IoT offers many potential benefits, there are risks associated with IoT devices, and from the connectivity between patients, healthcare providers, and device makers. Security, privacy and personal safety issues related to IoT devices are changing the roles of manufacturers, patients, physicians and healthcare IT organizations. Effective and safe use of IoT devices in psychiatry requires an understanding of these changes.


Sign in / Sign up

Export Citation Format

Share Document