Security Challenges and Future Applications of Smart Devices Based on Internet of Things

2020 ◽  
Author(s):  
Ankit Narendrakumar Soni
Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6163
Author(s):  
Wencheng Yang ◽  
Song Wang ◽  
Nor Masri Sahri ◽  
Nickson M. Karie ◽  
Mohiuddin Ahmed ◽  
...  

The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.


Author(s):  
Shahzadi Tayyaba ◽  
Salman Ayub Khan ◽  
Muhammad Tariq ◽  
Muhammad Waseem Ashraf

Information security is the most critical component of the information system. It is also a challenge of the organizations to build a secure network. Every organization that developed its organizational network has faced security attacks, security risks, and vulnerabilities. Internet of things (IoT) is based on smart devices that connect with each other to formulate a complex network. Therefore, in order to build a secure traditional network and IoT network, understanding the basics of the network layers, network security, and different types of network attacks is essential for network security beginners who are interested in working in the field of information security. In this chapter, the authors reviewed the essential and most important concepts of information security, IoT, and explained these topics in an easy-to-understand way. Furthermore, the chapter discussed the basic level of information security challenges to familiarize the undergraduates and postgraduate students and IoT information security practitioners about it.


Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 772 ◽  
Author(s):  
Houshyar Honar Pajooh ◽  
Mohammad Rashid ◽  
Fakhrul Alam ◽  
Serge Demidenko

The proliferation of smart devices in the Internet of Things (IoT) networks creates significant security challenges for the communications between such devices. Blockchain is a decentralized and distributed technology that can potentially tackle the security problems within the 5G-enabled IoT networks. This paper proposes a Multi layer Blockchain Security model to protect IoT networks while simplifying the implementation. The concept of clustering is utilized in order to facilitate the multi-layer architecture. The K-unknown clusters are defined within the IoT network by applying techniques that utillize a hybrid Evolutionary Computation Algorithm while using Simulated Annealing and Genetic Algorithms. The chosen cluster heads are responsible for local authentication and authorization. Local private blockchain implementation facilitates communications between the cluster heads and relevant base stations. Such a blockchain enhances credibility assurance and security while also providing a network authentication mechanism. The open-source Hyperledger Fabric Blockchain platform is deployed for the proposed model development. Base stations adopt a global blockchain approach to communicate with each other securely. The simulation results demonstrate that the proposed clustering algorithm performs well when compared to the earlier reported approaches. The proposed lightweight blockchain model is also shown to be better suited to balance network latency and throughput as compared to a traditional global blockchain.


2018 ◽  
Vol 22 (Suppl 2) ◽  
pp. S76-82 ◽  
Author(s):  
Minhee Kang ◽  
Eunkyoung Park ◽  
Baek Hwan Cho ◽  
Kyu-Sung Lee

Sign in / Sign up

Export Citation Format

Share Document