scholarly journals Multifactor Authentication

2014 ◽  
Author(s):  
Ionuţ-Daniel BARBU ◽  
Gabriel PETRICĂ

With the advent of Internet of Things, large number of devices became connected to the cloud via various services. From an Information Security perspective, this aspect adds additional tasks to the defense in depth layers. This article tackles the authentication level and its options. This topic has been chosen, as user/password authentication is obsolete and no longer secure. Despite the increased complexity of the passwords, the use of rainbow tables and the large processing power available, the systems are vulnerable to brute force attacks.

Author(s):  
Hristo Terziev

Internet of Things is a new world for connecting object space in the real world with virtual space in a computer environment. To build IoT as an effective service platform, end users need to trust the system. With the growing quantity of information and communication technologies, the need to ensure information security and improve data security is increasing. One of the potential solutions for this are steganographic methods. Steganography based on the least significant bit (LSB) is a popular and widely used method in the spatial domain.


Heliyon ◽  
2021 ◽  
Vol 7 (3) ◽  
pp. e06522
Author(s):  
Kwesi Hughes-Lartey ◽  
Meng Li ◽  
Francis E. Botchey ◽  
Zhen Qin

Internet of things (IoT) is an emerging concept which aims to connect billions of devices with each other anytime regardless of their location. Sadly, these IoT devices do not have enough computing resources to process huge amount of data. Therefore, Cloud computing is relied on to provide these resources. However, cloud computing based architecture fails in applications that demand very low and predictable latency, therefore the need for fog computing which is a new paradigm that is regarded as an extension of cloud computing to provide services between end users and the cloud user. Unfortunately, Fog-IoT is confronted with various security and privacy risks and prone to several cyberattacks which is a serious challenge. The purpose of this work is to present security and privacy threats towards Fog-IoT platform and discuss the security and privacy requirements in fog computing. We then proceed to propose an Intrusion Detection System (IDS) model using Standard Deep Neural Network's Back Propagation algorithm (BPDNN) to mitigate intrusions that attack Fog-IoT platform. The experimental Dataset for the proposed model is obtained from the Canadian Institute for Cybersecurity 2017 Dataset. Each instance of the attack in the dataset is separated into separate files, which are DoS (Denial of Service), DDoS (Distributed Denial of Service), Web Attack, Brute Force FTP, Brute Force SSH, Heartbleed, Infiltration and Botnet (Bot Network) Attack. The proposed model is trained using a 3-layer BP-DNN


Author(s):  
Abhishek Rajeshkumar Mehta ◽  
Trupti Pravinsinh Rathod

Internet of things (IoT) is a typical thing (object) in this day and age, which fills in as a component of our standard life exercises. In spite of the fact that it benefits the private region in a few different ways, different difficulties, for example information classification and protection, are made. Web of things (IoT) is all over the place and utilized in a lot more advantageous functionality. It is utilized in our homes, clinics, fire counteraction, and announcing and controlling of ecological changes. Information security is an urgent prerequisite for IoT since the number of late advances in various spaces is expanding step by step. Different endeavors have been set to sate the client's expectations for greater security and protection.


2019 ◽  
Vol 265 ◽  
pp. 07014
Author(s):  
Alexander Shiler ◽  
Elizaveta Stepanova

At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. In connection with the constant increase in the number of attacks on IoT-devices, the issue of standardization of this technology is quite acute. The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security.


Sign in / Sign up

Export Citation Format

Share Document