scholarly journals Escalation of Security and Privacy in Internet of Things using Advanced IPv6 Based Security Mechanism

2021 ◽  
Vol 1 (1) ◽  
pp. 43-51
Author(s):  
Sundresan Perumal

Kevin Ashton coined the phrase Internet of Things in 1999 with high performance implementation for corporate and social world. Thanks to the success of high-performing Internet of Things (IoT) whereby the tags and sensors are the foundation for IoT implementation of radio frequency identification with enormous implementation patterns. Real world objects and systems that are remotely managed using program- based tools may be outfitted with RFID tags. Radio frequency recognition devices may identify objects and sense information. Very thin micro-sized RFID chips that can attach remotely are built. The internet of things will cross over USD 267 billion in 2020. According to the report by Gartner, there would be $273 billion linked devices around the world in 2014. The quantity, which is equal to 8.4 billion goods, is 31% more than last year. This study examines security and productivity in the IoT. It is very popular to use Internet of Things (IoT) in robotics because of sensor sensors, advanced wireless technology and use of software programming. Both wireless IP-based systems come with built-in GPS modules. The utility of smart cities and home automation was increasingly accentuated by the appearance of vast databases of smart IP-based sensors. Within the scope of this study, one of the goals is to establish simulation trends that can cover protection weakness of the Internet of Things. In the novel, the simulation processes were implemented through Contiki Cooja and CupCarbon. The modern age is greatly being affected by impossibly sophisticated technical devices. It is treated under the umbrella of Internet of Things (IoT). Several applications are commonly using IoT linked technologies to a broad variety of purposes. IoT contains many other concepts such as universal computing, widespread computing, ambient computing, among several others. The work presents the implementation using high performance framework for the security in the IoT environment using security mechanism on IPv6.

2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 987
Author(s):  
Luciano Tarricone ◽  
Jasmin Grosinger

Radio frequency identification (RFID) is one of the crucial enabling technologies for the Internet of Things (IoT). This is leading to a continuous augmentation of RFID technologies, in terms of sensing capabilities, energetic autonomy, usability, and cost affordability, and this special issue proposes an overview on such a challenging scenario. The proposed results, in terms of cost reduction, miniaturization, and compatibility with complex systems and technologies, as well as the identification of the relevant criticalities, also pave the way to future steps being taken that go beyond the current IoT.


2019 ◽  
Vol 3 (1) ◽  
Author(s):  
Rodrigo Da Rosa Righi ◽  
Márcio Miguel Gomes ◽  
Cristiano Andrá Da Costa ◽  
Helge Parzyjegla ◽  
Hans-Ulrich Heiss

The digital universe is growing at significant rates in recent years. One of the main responsible for this sentence is the Internet of Things, or IoT, which requires a middleware that should be capable to handle this increase of data volume at real-time. Particularly, data can arrive in the middleware in parallel as in terms of input data from Radio-Frequency Identification (RFID) readers as request-reply query operations from the users side. Solutions modeled at software, hardware and/or architecture levels present limitations to handle such load, facing the problem of scalability in the IoT scope. In this context, this arti- cle presents a model denoted Eliot - Elasticity-driven Internet of Things - which combines both cloud and high performance computing to address the IoT scal- ability problem in a novel EPCglobal-compliant architecture. Particularly, we keep the same API but offer an elastic EPCIS component in the cloud, which is designed as a collection of virtual machines (VMs) that are allocated and deallocated on-the-fly in accordance with the system load. Based on the Eliot model, we developed a prototype that could run over any black-box EPCglobal- compliant middleware. We selected the Fosstrak for this role, which is currently one of the most used IoT middlewares. Thus, the prototype acts as an upper layer over the Fosstrak to offer a better throughput and latency performances in an effortless way. The results are encouraging, presenting significant performance gains in terms of response time and request throughput when comparing both elastic (Eliot) and non-elastic (standard Fosstrak) executions.  


2013 ◽  
Vol 756-759 ◽  
pp. 4529-4532 ◽  
Author(s):  
Hao Zeng ◽  
Yan Hui Fu ◽  
Xu Chen

Traditional Radio Frequency Identification (RFID) Tag Equipment has some problems like these: it is difficult to realize if the tag is kept out, destroyed, or taken away abnormally. It cant accurately judge where the area the tag had moved to is. Besides, it is difficult to distinguish the right of the tag in the Tag Management. To solve these issues, this paper serves with a method which is based on the Internet of Things (IOT). It mainly includes as the following: the tag is activated in the Controlled Area, the judgment of the tag access the Controlled Area, whether the tag exists in the Controlled Area or not. These methods can reform the problems that the Traditional RFID Tag Equipment has.


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


Author(s):  
Naseer Ali Hussien ◽  
Saif Abd alradha Alsaidi ◽  
Iman Kadhim Ajlan ◽  
Mohamed Fazil Mohamed Firdhous ◽  
Haider TH. Salim Alrikabi

<p>The Internet of Things (IoT) incorporates most extensive number of innovations and imagines a mixture of things or questions around us that, through one of a kind tending to plans and standard correspondence conventions, consume the ability to connect through one another's also collaborate by their neighbors in the direction of attain regular purposes. The misuse of such a standard has been broadly explored in Internet-related investigates. As a result, a few plans have been suggested that utilization informal organizations to hunt Internet assets, to course activity, or to choose powerful strategies for substance dissemination. The essential understood this knowledge remains persistent locality everywhere us as a diverse carrier of things or articles – i.e. Radio-Frequency identification (RFID) sensors, labels, cellular telephones, actuators, and more – that finished novel inclining to ideas, consume the ability to subordinate through one another besides chip in through their neighbors to realize normal objectives of shopping situation in business sector. Web of Things (IoT) overpowered standard imperfection for structure code, which backing to shopping in business sector or undertaking gathering of most prominent concern and examinant.</p><p> </p>


2020 ◽  
Vol 25 (6) ◽  
pp. 737-745
Author(s):  
Subba Rao Peram ◽  
Premamayudu Bulla

To provide secure and reliable services using the internet of things (IoT) in the smart cities/villages is a challenging and complex issue. A high throughput and resilient services are required to process vast data generated by the smart city/villages that felicitates to run the applications of smart city. To provide security and privacy a scalable blockchain (BC) mechanism is a necessity to integrate the scalable ledger and transactions limit in the BC. In this paper, we investigated the available solutions to improve its scalability and efficiency. However, most of the algorithms are not providing the better solution to achieve scalability for the smart city data. Here, proposed and implemented a hybrid approach to improve the scalability and rate of transactions on BC using practical Byzantine fault tolerance and decentralized public key algorithms. The proposed Normachain is compares our results with the existing model. The results show that the transaction rate got improved by 6.43% and supervision results got improved by 17.78%.


2020 ◽  
Vol 17 (6) ◽  
pp. 2552-2556
Author(s):  
Sarita Simaiya ◽  
Umesh Kumar Lilhore ◽  
Sanjeev Kumar Sharma ◽  
Kamali Gupta ◽  
Vidhu Baggan

A revolutionary technology well into the world of technology has been in the modern world of technology the Internet of Things. Due to continuing increases as nothing more than a consequence of either the rapid development of computing Internet of things-based applications implementations. Many technologies become increasingly embraced throughout compatible devices such as home automation and also smart cities. These IoT applications become operated on both the Internet, whereby information becomes transported publicly between a network to the next, therefore flowing information requires a great deal of further privacy consideration to guarantee IoT applications become reliable Internet of things technologies have been using various techniques of data protection of security and privacy. However, all such modern security systems have always been sufficient to ensure the Internet of things perceived safety. A Blockchain has become a revolutionary authoritative digital technology that really transforms commercial transactions absolutely. This is also a collaborative service that facilitates it uses a variety of features of cybersecurity. Blockchain technology seems to be the missing piece of the puzzle throughout the IoT to address problems of usability, anonymity, including security. Block chain’s crypto algorithms must enable transparency from customers very confidential. Throughout this research article, we introduce an analysis of IoT security concerns; blockchain gets addressed briefly as well as later addresses the security of IoT applications dependent on blockchain technologies.


2018 ◽  
Vol 27 (12) ◽  
pp. 1830007 ◽  
Author(s):  
S. P. Raja ◽  
T. Dhiliphan Rajkumar ◽  
Vivek Pandiya Raj

Internet of Things (IoT) can be defined as a thing or device, physical and virtual, connected and communicating together, and integrated to a network for a specific purpose. The IoT uses technologies and devices such as sensors, radio-frequency identification (RFID) and actuators to collect data. IoT is not only about collecting data generated from sensors, but also about analyzing it. IoT applications must, of necessity, keep out all attackers and intruders so as to thwart attacks. IoT must allow for information to be shared, with every assurance of confidentiality, and is about a connected environment where people and things interact to enhance the quality of life. IoT infrastructure must be an open source, without ownership, meaning that anyone can develop, deploy and use it. The objective of this paper is to discuss the various challenges, issues and applications confronting the Internet of Things.


Sign in / Sign up

Export Citation Format

Share Document