scholarly journals Software Defined Based Pure VPN Protocol for Preventing IP Spoofing Attacks in IOT

Author(s):  
Narendhiran R, Pavithra K, Rakshana P, Sangeetha P

The Internet of things (IoT) is the network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. IoT involves extending Internet connectivity beyond standard devices, such as desktops, laptops, smart phones and tablets, to any range of traditionally dumb or non-internet-enabled physical devices and everyday objects. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled. Traditionally, current internet packet delivery only depends on packet destination IP address and forward devices neglect the validation of packet’s IP source address. It makes attacks can leverage this flow to launch attacks with forge IP source address so as to meet their violent purpose and avoid to be tracked. In order to reduce this threat and enhance internet accountability, many solution proposed in the inter domain and intra domain aspects. Furthermore, most of them faced with some issues hard to cope, i.e., data security, data privacy. And most importantly code cover PureVPN protocol for both inter and intra domain areas. The novel network architecture of SDN possess whole network PureVPN protocol rule instead of traditional SDN switches, which brings good opportunity to solve IP spoofing problems. However, use authentication based on key exchange between the machines on your network; something like IP Security protocol will significantly cut down on the risk of spoofing. This paper proposes a SDN based PureVPN protocol architecture, which can cover both inter and intra domain areas with encrypted format effectively than SDN devices. The PureVPN protocol scheme is significant in improving the security and privacy in SDN for IoT.

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1510 ◽  
Author(s):  
Prakash Veeraraghavan ◽  
Dalal Hanna ◽  
Eric Pardede

The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.


Author(s):  
Zhihui Wang ◽  
Jingjing Yang ◽  
Benzhen Guo ◽  
Xiao Zhang

At present, the internet of things has no standard system architecture. According to the requirements of universal sensing, reliable transmission, intelligent processing and the realization of human, human and the material, real-time communication between objects and things, the internet needs the open, hierarchical, extensible network architecture as the framework. The sensation equipment safe examination platform supports the platform through the open style scene examination to measure the equipment and provides the movement simulated environment, including each kind of movement and network environment and safety management center, turning on application gateway supports. It examines the knowledge library. Under this inspiration, this article proposes the novel security model based on the sparse neural network and wavelet analysis. The experiment indicates that the proposed model performs better compared with the other state-of-the-art algorithms.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
Maria-Dolores Cano ◽  
Antonio Cañavate-Sanchez

The disclosure of personal and private information is one of the main challenges of the Internet of Medical Things (IoMT). Most IoMT-based services, applications, and platforms follow a common architecture where wearables or other medical devices capture data that are forwarded to the cloud. In this scenario, edge computing brings new opportunities to enhance the operation of IoMT. However, despite the benefits, the inherent characteristics of edge computing require countermeasures to address the security and privacy issues that IoMT gives rise to. The restrictions of IoT devices in terms of battery, memory, hardware resources, or computing capabilities have led to a common agreement for the use of elliptic curve cryptography (ECC) with hardware or software implementations. As an example, the elliptic curve digital signature algorithm (ECDSA) is widely used by IoT devices to compute digital signatures. On the other hand, it is well known that dual signature has been an effective method to provide consumer privacy in classic e-commerce services. This article joins both approaches. It presents a novel solution to enhanced security and the preservation of data privacy in communications between IoMT devices and the cloud via edge computing devices. While data source anonymity is achieved from the cloud perspective, integrity and origin authentication of the collected data is also provided. In addition, computational requirements and complexity are kept to a minimum.


2017 ◽  
pp. 189-204
Author(s):  
Sudhosil Panda

The Internet of Things (IoT) aims at connecting a large number of communication and information systems. With the further development of pervasive computing, these systems can be integrated into everyday objects, such as household devices and tools. When complex systems are interconnected, it is complicated to keep track of how secure a system or connection is and to distinguish which devices are connected within the IoT and which devices are not. As to the security, the IoT will be faced with more severe challenges. There are the following reasons: 1) the IoT extends the ‘internet' through the traditional internet, mobile network and sensor network and so on, 2) every ‘thing' will be connected to this ‘internet' and 3) these ‘things' will communicate with each other. Therefore, the new security and privacy problems will arise out of which authentication and access control are the most vital security issues that need to be taken care of. Therefore, we should pay more attention to the issues for confidentiality, authenticity and integrity of data in the IoT.


Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 2926
Author(s):  
Rizwan Majeed ◽  
Nurul Azma Abdullah ◽  
Muhammad Faheem Mushtaq ◽  
Muhammad Umer ◽  
Michele Nappi

Developments in drones have opened new trends and opportunities in different fields, particularly in small drones. Drones provide interlocation services for navigation, and this interlink is provided by the Internet of Things (IoT). However, architectural issues make drone networks vulnerable to privacy and security threats. It is critical to provide a safe and secure network to acquire desired performance. Small drones are finding new paths for progress in the civil and defense industries, but also posing new challenges for security and privacy as well. The basic design of the small drone requires a modification in its data transformation and data privacy mechanisms, and it is not yet fulfilling domain requirements. This paper aims to investigate recent privacy and security trends that are affecting the Internet of Drones (IoD). This study also highlights the need for a safe and secure drone network that is free from interceptions and intrusions. The proposed framework mitigates the cyber security threats by employing intelligent machine learning models in the design of IoT-aided drones by making them secure and adaptable. Finally, the proposed model is evaluated on a benchmark dataset and shows robust results.


2021 ◽  
Vol 8 (4) ◽  
pp. 685-733
Author(s):  
Jennifer Zwagerman

Technology advancements make life, work, and play easier and more enjoyable in many ways. Technology issues are also the cause of many headaches and dreams of living out the copier destruction scene from the movie “Office Space.” Whether it be user error or technological error, one key technology issue on many minds right now is how all the data produced every second of every day, in hundreds of different ways, is used by those that collect it. How much data are we talking about here? In 2018, the tech company Domo estimated that by 2020 “1.7 MB of data will be created every second” for every single person on Earth. In 2019, Domo’s annual report noted that “Americans use 4,416,720 GB of internet data including 188,000,000 emails, 18,100,000 texts and 4,497,420 Google searches every single minute.” And this was before the pandemic of 2020, which saw reliance on remote technology and the internet skyrocket. It is not just social media and working from home that generates data—the “Internet of Things” (“IoT”) is expanding exponentially. From our homes (smart appliances and thermostats), to entertainment (smart speakers and tablets), to what we wear (smartwatches and fitness devices), we are producing data constantly. Over 30 billion devices currently make up the IoT, and that number will double by 2025. The IoT is roughly defined as “devices—from simple sensors to smartphones and wearables—connected together.” That connection allows the devices to “talk” to each other across networks that stretch across the world, sharing information that in turn can be analyzed (alone or combined with data from other users) in ways that may be beneficial to the user or the broader economy. The key word in that last sentence is “may.” When it comes to the data that individuals and businesses across the world produce every second of every day, some of it—perhaps most of it—could be used in ways that are not beneficial to the user or the entire economy. Some data types can be used to cause harm in obvious ways, such as personal identifying information in cases of identity theft. While some data types may seem innocuous or harmful when viewed on their own, when combined with other data from the same user or even other users, it can be used in a wide variety of ways. While I find it beneficial to know how many steps I take in a day or how much time I sleep at night, I am not the only individual or entity with access to that information. The company that owns the device I wear also takes that information and uses it in ways that are beyond my control. Why would a company do that? In many instances, “[t]he data generated by the Internet of Things provides businesses with a wealth of information that—when properly collected, stored, and processed—gives businesses a depth of insight into user behavior never before seen.” Data security and privacy in general are issues that all companies manage as they work to protect the data we provide. Some types of data receive heightened protections, as discussed below, because they are viewed as personal, as private, or as potentially dangerous since unauthorized access to them could cause harm to the user/owner. Some states and countries have taken a step further, focusing not on industry-related data that needs particular types of protection, but in-stead looking at an individual’s overall right to privacy, particularly on the internet. Those protections are summarized below. It makes sense, you might say, to worry about financial or healthcare data remaining private and to not want every website you have ever visited to keep a file of information on you. But why might we care about the use of data in agricultural operations? Depending on who you ask, the answer may be that agricultural data needs no more care or concern than any other type of business data. Some argue that the use of “Big Data” in agriculture provides opportunities for smaller operations and shareholders. These opportunities include increased power in a market driven for many years by the mantra “bigger is better” and increased production of food staples across the world—both in a more environmentally-friendly fashion. While the benefits of technology and Big Data in the agricultural sector unarguably exist, questions remain as to how to best manage data privacy concerns in an industry where there is little specific law or regulation tied to collection, use, and ownership of this valuable agricultural production data. In the following pages, this Article discusses what types of data are currently being gathered in the agricultural sector and how some of that data can and is being used. In addition, it focuses on unique considerations tied to the use of agricultural data and why privacy concerns continue to increase for many producers. As the Article looks at potential solutions to privacy concerns, it summarizes privacy-related legislation that currently exists and ends by looking at whether any of the current privacy-related laws might be used or adapted within the agricultural sector to address potential misuse of agricultural data.


Author(s):  
Sudhosil Panda

The Internet of Things (IoT) aims at connecting a large number of communication and information systems. With the further development of pervasive computing, these systems can be integrated into everyday objects, such as household devices and tools. When complex systems are interconnected, it is complicated to keep track of how secure a system or connection is and to distinguish which devices are connected within the IoT and which devices are not. As to the security, the IoT will be faced with more severe challenges. There are the following reasons: 1) the IoT extends the ‘internet' through the traditional internet, mobile network and sensor network and so on, 2) every ‘thing' will be connected to this ‘internet' and 3) these ‘things' will communicate with each other. Therefore, the new security and privacy problems will arise out of which authentication and access control are the most vital security issues that need to be taken care of. Therefore, we should pay more attention to the issues for confidentiality, authenticity and integrity of data in the IoT.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 341
Author(s):  
Dr E. Suresh Babu ◽  
V Bhargav Raj ◽  
M Manogna Devi ◽  
K Kirthana

This papers reviews and surveys the security issues, mechanism of internet of things (IoT) proposed in the literature. As IoT is a computing concept that describes the idea of everyday physical objects being connected to the internet and being able to identify themselves to other devices. The main advantages of IoT improve the resource utilization ratio and relationship between human and nature. In addition, it possesses various characteristics like sensing, heterogeneity, connectivity, dynamic nature and intelligence. However, it possesses several challenges like connectivity, compatibility, longevity, privacy and security. Specifically, Security and privacy are the crucial issues that need to be solved for successful deployment of IoT. Moreover, some of the data collected from the IoT are very sensitive and should not be revealed to third parties. Such data needs to be protected by some provided legislations. We reviewed some of the security challenges of IoT like secure communication, data privacy and integrity, authorizing and authenticating the devices.  


Metahumaniora ◽  
2018 ◽  
Vol 8 (3) ◽  
pp. 300
Author(s):  
Tania Intan ◽  
Trisna Gumilar

AbstrakPenelitian ini bertujuan untuk (1) mendekripsikan tanggapan pembaca terhadap novel Le Petit Prince (2) mendeskripsikan horizon harapan pembaca terhadap novel Le Petit Prince, dan (3) mendeskripsikan faktor-faktor penyebab perbedaan tanggapan dan horizon harapan pembaca. Penelitian ini termasuk jenis penelitian deskriptif kualitatif. Data penelitian berupa teks yang memuat tanggapan pembaca novel Le Petit Princeyang terdiri dari 20 orang, sedangkan sumber datanya berupa artikel dan makalah yang dimuat di media massa cetak dan elektronik termasuk internet. Instrumen penelitian berupa seperangkat konsep tentang pembaca, tanggapan pembaca, dan horizon harapan. Teknik pengumpulan data dengan cara observasi dan data dianalisis dengan menggunakan teknik deskriptif kualitatif. Hasil penelitian yang didapat sebagai berikut. (1) Seluruh pembaca menanggapi atau menilai positif unsur tema, alur, tokoh, latar, sudut pandang, gaya bahasa, teknik penceritaan, bahasa, dan isi novel Le Petit Prince. (2) Harapan sebagian besar pembaca sebelum membaca novel Le Petit Prince sesuai dengan kenyataan ke sembilan unsur di dalam novel Le Petit Prince, sehingga pembaca dapat dengan mudah menerima dan memberikan pujian pada novel Le Petit Prince. (3) Faktor penyebab perbedaan tanggapan dan horizon harapan pembaca selain perbedaan stressing unsur yang ditanggapi juga karena perbedaan pengetahuan tentang sastra, pengetahuan tentang kehidupan, dan pengalaman membaca karya sastra.Kata kunci: tanggapan pembaca, horizon harapan, Le Petit PrinceAbstractThis study aims to (1) describe reader’s responses to the novel Le Petit Prince (2) to describe the reader's expectations horizon of Le Petit Prince's novel, and (3) to describe the factors causing differences in responses and the horizon of readers' expectations. This research is a descriptive qualitative research type. The research data consist of a set of paragraphs that contains readers' responses to Le Petit Prince's novel, while the data sources are articles and papers published in print and electronic mass media including the internet. The research instruments are a set of reader concepts, reader responses, and expectations horizon. The technique of collecting data is observation and data are analyzed by using qualitative descriptive technique. The results obtained are as follow: (1) All readers respond and valuethe theme elements,plots, characters, background, point of view, language, titles, storytelling techniques, language, and extrinsic novel Le Petit Prince positively. (2) The expectations of most readers before reading Le Petit Prince's novels are in accordance with the nine facts in Le Petit Prince's novel, so readers can easily accept and give prise to Le Petit Prince's novel. (3) Factors causing differences in responses and horizon of readers' expectations other than the stressing differences of the elements being addressed also due to the differences in knowledge of literature, knowledge of life and literary reading experience. Keywords: readers responses, expectations horizon, Le Petit Prince


Author(s):  
Naomi Wanja Ireri ◽  
Gladys Kimutai

Commercial banks in Kenya have embraced alternative banking channels which represent a shift in delivery of banking and financial services since the alternative banking have become synonymous with commercial banks in Kenya. While banks have succeeded in leveraging available technology and provide alternative avenues to customers for banking services, the challenge it faces today is optimizing the usage of these channels so as to improve on their performance. The general objective of this study was to investigate the effects of financial innovations on the performance of commercial banks in Kenya. The specific objectives of the study were to examine the influence of internet banking, mobile banking, agency banking and ATM banking on the performance of commercial banks in Kenya. The study was guided by agency theory, balanced score card and diffusion of innovation theory. This study employed a descriptive research design. The study targeted44 commercial banks in Kenya as at 2017. The 16 banks which embrace all the four financial innovations from 2013 to 2017were selected using purposive sampling method. The sample size was 80 respondents who comprised of 5 senior management employees in each of the selected banks.This study used questionnaire to collect primary data from the respondents. Content analysis technique was used to analyze qualitative data collected from open ended questions in and reported in narrative form. Descriptive statistics such as mean and standard deviation were used to analyse the quantitative data. Multiple regression analysis was used to show the relationship between independent variables against dependent variable. The study revealed that internet banking, mobile banking, agency banking and ATM banking had a positive and significant effect on the performance of commercial banks. Thisstudy concludes that the banking industry has benefited tremendously from the development of the Internet. The Internet fundamentally changed the way in which banking networks are designed to meet the client demands and expectations. Mobile banking provides a good opportunity to commercial banks in Kenya to reach many mobile phone subscribers in Kenya who had remained unbanked and unreached due to limited access to bank branch networks in the country. The access to the large masses through mobile banking of the population gives banks the opportunity to grow by reaching the unbanked population. Agency banking has led to accessibility of financial service to many customer in remote areas and hence an increase in effectiveness and efficiency in service delivery. Customers are satisfied with the automated teller machine services because of ease of use, transaction cost and service security but not satisfy with automated teller machine dispense of cash. The study recommends that the public and businesses must be encouraged to use Internet banking in their daily activities, including deposits, payments and money transfers. Commercial banks in Kenya should ensure convenience and security of mobile banking through written guidelines on convenience and security of mobile banking. Commercial banks in Kenya should increase the number of agents in estates and in the rural areas. This can be done by reducing the requirements of becoming a bank agent. The banks should employ customized software that records relevant information on automated teller machine cards so that banks can establish whether unauthorized transaction has taken place or not.


Sign in / Sign up

Export Citation Format

Share Document