scholarly journals A conceptual model to support security analysis in the internet of things

2017 ◽  
Vol 14 (2) ◽  
pp. 557-578 ◽  
Author(s):  
Orestis Mavropoulos ◽  
Haralambos Mouratidis ◽  
Andrew Fish ◽  
Emmanouil Panaousis ◽  
Christos Kalloniatis

This paper proposes a conceptual model to support decision makers during security analysis of Internet of Things (IoT) systems. The world is entering an era of ubiquitous computing with IoT being the main driver. Taking into account the scale of IoT, the number of security issues that are arising are unprecedented. Both academia and industry require methodologies that will enable reasoning about security in IoT system in a concise and holistic manner. The proposed conceptual model addresses a number of challenges in modeling IoT to support security analysis. The model is based on an architecture-oriented approach that incorporates sociotechnical concepts into the security analysis of an IoT system. To demonstrate the usage of the proposed conceptual model, we perform a security analysis on a small scale smart home example.

Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


Author(s):  
Volodymyr Bazylevych ◽  
◽  
Marina Maltseva ◽  
Taras Petrenko ◽  
Lesia Chernysh ◽  
...  

Urgency of the research. Today, the Internet of Things (IoT) is firmly entrenched in the lives of billions of people around the world. IoT is used in many areas of human activity - industry, everyday life, medicine, education, urban management and others. However, the increase in the number of connected devices leads to an increase in safety risks - from causing physical harm to humans with these devices to damage to complex technological equipment. That is why the issues of ensuring the protection of IoT systems are relevant. Target setting. Comprehensive protection of IoT systems is possible only with reliable network, software and technical protection of devices, equipment and communications of which these systems consist. Given that the above objects and methods of their protection can be combined into a separate secure system of a smart home, its development is an important theoretical and practical task of cybersecurity. Actual scientific researches and issues analysis. Today, there are many publications that analyze IoT security issues and suggest ways to solve them, but there is no work that would develop a separate model of IoT protection on the example of a smart home. Uninvestigated parts of general matters defining. Analyzing the multilevel architecture of IoT systems and features of cloud platforms of the Internet of Things, highlighting potentially vulnerable components of these complex solutions (access control system to IoT device and cloud platform; clouds, mobile applications and web interfaces of devices; software updates; device memory ; local data warehouses; hardware and software interfaces of devices; network services of devices; ecosystem of communications, including network traffic) it can be argued that building a secure system of a smart home using IoT will increase the level of security of these systems. . The research objective of this article is to build a secure system using IoT on the example of a smart home. The statement of basic materials. The basic concepts of IoT are defined, the main spheres of IoT use are investigated, the secure system of smart house with use of IoT in which the basic ways of protection of the information which is expedient to implement in networks of smart house - VPN, firewall, ACL and passwords for reliable protection is developed. The main IoT vulnerabilities and ways to eliminate them are analyzed. Different architectures of IoT systems are considered. An algorithm for setting up a secure smart home system using IoT is proposed Conclusions. The work developed a secure system using the Internet of Things on the example of a smart home. The advantages and disadvantages of using the Internet of Things are identified. It has been studied that the popularity of the Internet of Things is growing every second, so it is necessary to pay more attention to their protection. The main vulnerabilities of IoT can be considered the lack of standardization, traffic encryption, default passwords. The scheme of a secure system of a smart home using the Internet of Things built in Cisco Packet Tracer and a step-by-step algorithm for debugging its protection system using the ASA5505 firewall to filter incoming traffic were proposed. Strong passwords have been created for IoT device accounts. WPA2 / 3-PSK wireless protocols using the AES algorithm ensure the security of wireless data transmission. The home controller has a unique SSID. The created system can be implemented and safely used in homes and offices.


Author(s):  
Anjum Nazir Qureshi Sheikh ◽  
Asha Ambhaikar ◽  
Sunil Kumar

The internet of things is a versatile technology that helps to connect devices with other devices or humans in any part of the world at any time. Some of the researchers claim that the number of IoT devices around the world will surpass the total population on the earth after a few years. The technology has made life easier, but these comforts are backed up with a lot of security threats. Wireless medium for communication, large amount of data, and device constraints of the IoT devices are some of the factors that increase their vulnerability to security threats. This chapter provides information about the attacks at different layers of IoT architecture. It also mentions the benefits of technologies like blockchain and machine learning that can help to solve the security issues of IoT.


2019 ◽  
Vol 8 (3) ◽  
pp. 6736-6743

WSN include Internet Protocol (IP) which extends the Internet of Things (IoT) related to routine life. Security is main thing in emerging technology for IOT application. Therefore, WSN has lot of issues which include: (i) To promote the sensor devices efficiently during the transmission of data for consuming low energy (ii) To resolve the security issues of data faced at the time of transmission through large area of networks. In this paper, to overcome the above issues the novel scheme is proposed. A Secure based smart home automation system in IOT application is built for this study. Furthermore, the data transmission utilizes the energy using Low power consumption protocol using RPLS and to secure the data a data security scheme ECPABE have been proposed here. The performance of proposed protocol shows the limited energy consumes and proposed ECPABE provides better security level to IoT data than the existing schemes. The results show the proposed scheme security analysis is efficient as well as secure


2019 ◽  
Vol 01 (02) ◽  
pp. 31-39 ◽  
Author(s):  
Duraipandian M. ◽  
Vinothkanna R.

The paper proposing the cloud based internet of things for the smart connected objects, concentrates on developing a smart home utilizing the internet of things, by providing the embedded labeling for all the tangible things at home and enabling them to be connected through the internet. The smart home proposed in the paper concentrates on the steps in reducing the electricity consumption of the appliances at the home by converting them into the smart connected objects using the cloud based internet of things and also concentrates on protecting the house from the theft and the robbery. The proposed smart home by turning the ordinary tangible objects into the smart connected objects shows considerable improvement in the energy consumption and the security provision.


2020 ◽  
Vol 9 (2) ◽  
pp. 136-138 ◽  
Author(s):  
Md. Siddikur Rahman ◽  
Noah C. Peeri ◽  
Nistha Shrestha ◽  
Rafdzah Zaki ◽  
Ubydul Haque ◽  
...  

2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2017 ◽  
Vol 5 (1) ◽  
pp. 230-238
Author(s):  
Sayantan Gupta

The technology of Quantum Green Computing has been discussed in this paper. It also discusses the need of the many implementation techniques and approaches in relation with Fog-Cloud Computing. Moreover, we would like to introduce the latest algorithms like Stack Algorithm, Address Algorithm and many others which will help in the analysis of Green-Quantum Computing Technology in the modern society and would create a technological revolution. With the Internet of Things rising in the modern world time, new security issues have also been developed. So, our proposed Model the Fog-Things Model will help us to determine the security issues and indeed secure the entire IoT network.


Sign in / Sign up

Export Citation Format

Share Document