Security Privacy in Internet of Things(IOT)

Author(s):  
Samruddhi S. Burhade ◽  
Sonal N. Deshmukh

The Internet Of Things(IOT) is interconnection between identifiable embedded computing devices. Internet of Things is highly on the rise from smart cities, environment, health, energy, vehicle, transport, public safety to our daily essentials. Internet of Things has completely revitalized these areas. IOT expect the advanced connectivity with devices services. This paper highlighted the security and privacy aspect of IOT and various security threats which are given in each concept related to IOT. Various techniques are used for security and privacy of IOT devices and easy to adapt by users.

Author(s):  
Edward T. Chen

The Internet of Things (IoT) has the potential to increase quality of life, heighten performance of systems and processes, and save valuable time for businesses and people. Common objects and devices are being linked with Internet connectivity and have capabilities for data analytics that affect day-to-day experiences of both individuals and businesses. The notions of Smart Health, Smart Cities, and Smart Living come into play as the Internet of Things plays a role in today's world. This chapter presents IoT devices and application examples as well as descriptions of the benefits and limitations alongside an assessment of each respective technology's potential for success in the future. Security and privacy are important factors that need to be addressed within the different domains. This chapter addresses these potentials, issues, and challenges for managers to be prepared for the new wave brought forth by the IoT.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


Author(s):  
Rahul Verma

The internet of things (IoT) is the new buzzword in technological corridors with most technology companies announcing a smart device of sorts that runs on internet of things (IoT). Cities around the world are getting “smarter” every day through the implementation of internet of things (IoT) devices. Cities around the world are implementing individual concepts on their way to becoming smart. The services are automated and integrated end to end using internet of things (IoT) devices. The chapter presents an array of internet of things (IoT) applications. Also, cyber physical systems are becoming more vulnerable since the internet of things (IoT) attacks are common and threatening the security and privacy of such systems. The main aim of this chapter is to bring more research in the application aspects of smart internet of things (IoT).


Author(s):  
G Kannan ◽  
N Manoharan

<span lang="EN-US">The present-day Battlefield environment depicts a scenario wherein various heterogeneous warfighting vehicles/equipment are conglomerated, and the high command takes a decision based on the different inputs and data received from the warfighting entities.  This aspect generates voluminous data and communication directives occupying the complete frequency spectrum and moving up and down. This paper proposes a scheme based on the Internet of Things (IoT) philosophy.  The primary focus will be to deploy ubiquitous sensing enabled technologies (IoT) in all the battlefield fighting entities. This medium in effect means the interconnection of uniquely identifiable embedded computing-like devices and formulation of an internet infrastructure. The newly proposed IoT devices in all the battlefield fighting entities will gather, infer and understand in-situ commands and data and in turn pass on to the highest decision-making authority. A simple IoT based model will be deployed in the battlefield scenario enhancing the force multiplier effect.</span>


2020 ◽  
Vol 25 (6) ◽  
pp. 737-745
Author(s):  
Subba Rao Peram ◽  
Premamayudu Bulla

To provide secure and reliable services using the internet of things (IoT) in the smart cities/villages is a challenging and complex issue. A high throughput and resilient services are required to process vast data generated by the smart city/villages that felicitates to run the applications of smart city. To provide security and privacy a scalable blockchain (BC) mechanism is a necessity to integrate the scalable ledger and transactions limit in the BC. In this paper, we investigated the available solutions to improve its scalability and efficiency. However, most of the algorithms are not providing the better solution to achieve scalability for the smart city data. Here, proposed and implemented a hybrid approach to improve the scalability and rate of transactions on BC using practical Byzantine fault tolerance and decentralized public key algorithms. The proposed Normachain is compares our results with the existing model. The results show that the transaction rate got improved by 6.43% and supervision results got improved by 17.78%.


2021 ◽  
Vol 15 (02) ◽  
pp. 19-24
Author(s):  
Vishv Patel ◽  
Devansh Shah ◽  
Nishant Doshi

The large deployment of the Internet of Things (IoT) is empowering Smart City tasks and activities everywhere throughout the world. Items utilized in day-by-day life are outfitted with IoT devices and sensors to make them interconnected and connected with the internet. Internet of Things (IoT) is a vital piece of a smart city that tremendously impact on all the city sectors, for example, governance, healthcare, mobility, pollution, and transportation. This all connected IoT devices will make the cities smart. As different smart city activities and undertakings have been propelled in recent times, we have seen the benefits as well as the risks. This paper depicts the primary challenges and weaknesses of applying IoT innovations dependent on smart city standards. Moreover, this paper points the outline of the technologies and applications of the smart cities.


2021 ◽  
pp. 218-228
Author(s):  
Kieron O’Hara

The Internet of Things is created by giving Internet connections to objects embedded in the environment, including wearable items. When IoT devices are connected and coordinated in an urban environment, smart cities are created, which can allow control of the environment, for example to improve carbon emissions or traffic flow. Instrumentation of the environment creates problems of consent, privacy, security, safety, and trust. The status of the IoT with respect to Internet ideology is discussed. The Silicon Valley Open Internet supports citizen-centric development, but may lack coordination at scale. The DC Commercial Internet creates great power for platforms. The Brussels Bourgeois Internet values rights and privacy, which may suppress innovation. In China, India, and elsewhere, smart cities are seen as key to developing a paternal social vision under digital modernity. Given its key role in the IoT, this is where America’s battle against Huawei may be most consequential.


2020 ◽  
Vol 17 (6) ◽  
pp. 2552-2556
Author(s):  
Sarita Simaiya ◽  
Umesh Kumar Lilhore ◽  
Sanjeev Kumar Sharma ◽  
Kamali Gupta ◽  
Vidhu Baggan

A revolutionary technology well into the world of technology has been in the modern world of technology the Internet of Things. Due to continuing increases as nothing more than a consequence of either the rapid development of computing Internet of things-based applications implementations. Many technologies become increasingly embraced throughout compatible devices such as home automation and also smart cities. These IoT applications become operated on both the Internet, whereby information becomes transported publicly between a network to the next, therefore flowing information requires a great deal of further privacy consideration to guarantee IoT applications become reliable Internet of things technologies have been using various techniques of data protection of security and privacy. However, all such modern security systems have always been sufficient to ensure the Internet of things perceived safety. A Blockchain has become a revolutionary authoritative digital technology that really transforms commercial transactions absolutely. This is also a collaborative service that facilitates it uses a variety of features of cybersecurity. Blockchain technology seems to be the missing piece of the puzzle throughout the IoT to address problems of usability, anonymity, including security. Block chain’s crypto algorithms must enable transparency from customers very confidential. Throughout this research article, we introduce an analysis of IoT security concerns; blockchain gets addressed briefly as well as later addresses the security of IoT applications dependent on blockchain technologies.


Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 111 ◽  
Author(s):  
Daniel Oliveira ◽  
Miguel Costa ◽  
Sandro Pinto ◽  
Tiago Gomes

Undeniably, the Internet of Things (IoT) ecosystem continues to evolve at a breakneck pace, exceeding all growth expectations and ubiquity barriers. From sensor to cloud, this giant network keeps breaking technological bounds in several domains, and wireless sensor nodes (motes) are expected to be predominant as the number of IoT devices grows towards the trillions. However, their future in the IoT ecosystem still seems foggy, where several challenges, such as (i) device’s connectivity, (ii) intelligence at the edge, (iii) security and privacy concerns, and (iv) growing energy needs, keep pulling in opposite directions. This prospective paper offers a succinct and forward-looking review of recent trends, challenges, and state-of-the-art solutions of low-end IoT motes, where reconfigurable computing technology plays a key role in tomorrow’s IoT devices.


Sign in / Sign up

Export Citation Format

Share Document