scholarly journals A Study on Security Issues in the Internet of Things (IoT)

Author(s):  
K. Ravikumar ◽  
S. Ramesh Praksh

Remote correspondence systems are exceedingly inclined to security dangers. The actual uses of remote correspondence systems come in military, business, medicinal services, retail, furthermore, transportations. These frameworks utilize wired, cell, or adhoc systems. Our methodology depends upon vitality mindful types of the IoT application's plan in the BIP (Behavior, Interaction, Priority) segment system. This takes into account a nitty gritty formal portrayal of the framework's conduct and its resulting approval, consequently giving input to improvements in the pre-arrangement or pre-creation stages. The structure and advancement of a property security framework, in light of human movement identification and remotely checking innovation, to affirm guest personality and to manage Door openness has been accounted for in this paper. This paper portrays in regards to the execution and sending of remote control framework and openness directly into a property situation for confirmed individuals because it were. A PIR movement sensor and Camera module are utilized to identify movement and catch pictures separately are dedicatedly make the security framework alive as per the solicitation. Electromagnetic entryway lock module work the entryway openness, has been structured and created.

Author(s):  
Yash Choudhary ◽  
B Umamaheswari ◽  
Vijeta Kumawat

IoT or the Internet of things refers to all the physical devices connected to the internet. IoT consists of computing devices that are web-enabled and have the capability of sensing, collecting, and sending data. IoT provides the ability to remote control appliances and has many more applications. Since IoT is becoming a big part of society, it is necessary to ensure that these devices provide adequate security measures. This paper discusses various security issues in IoT systems like threats, vulnerabilities and some countermeasures which can be used to provide some security. Developing a secure device is now more important than ever, as with the increase in digitization, much of a user’s data is available on these devices. Securing data is a primary concern in any system, as internet-enabled devices are easier to hack. The idea of this paper is to spread awareness and improve the security of IoT devices.


Author(s):  
Ghazi Hussein Shakah

<span>At the moment, all observed forms of communication are reduced either to a person-to-person scheme or person-to-device. But the Internet of Things (IoT) offers us a tremendous Internet future, in which will appear the communication type machine-machine (M2M). This makes it possible to integrate all communications into a common infrastructure, allowing not only to manage everything that is around us but also providing information about the state of these things. The purpose of this paper is to create the client part of the client-server system for remote control of home appliances using cloud services through commands entered using handwritten words. For this, we develop algorithms and methods for handwriting recognition using neural networks and implement a mobile application on the Android platform, which allows remote control of devices via cloud services based on commands entered using handwritten words. Anyway, this article will give a good understanding to other researchers who want to start their research on the IoT and will contribute to the effective accumulation of knowledge.</span>


Author(s):  
Issmat Shah Masoodi ◽  
Bisma Javid

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


2015 ◽  
Vol 9 (16) ◽  
pp. 3083-3094 ◽  
Author(s):  
Xin Huang ◽  
Paul Craig ◽  
Hangyu Lin ◽  
Zheng Yan

Author(s):  
D. R. Kolisnyk ◽  
◽  
K. S. Misevych ◽  
S. V. Kovalenko

The article considers the issues of system architecture IoT-Fog-Cloud, considers the interaction between the three levels of IoT, Fog and Cloud for the effective implementation of programs for big data analysis and cybersecurity. The article also discusses security issues, solutions and directions for future research in the field of the Internet of Things and nebulous computing.


2020 ◽  
Author(s):  
Shamim Muhammad ◽  
Inderveer Chana ◽  
Supriya Thilakanathan

Edge computing is a technology that allows resources to be processed or executed close to the edge of the internet. The interconnected network of devices in the Internet of Things has led to an increased amount of data, increasing internet traffic usage every year. Also, edge computing is driving applications and computing power away from the integrated points to areas close to users, leading to improved performance of the application. Despite the explosive growth of the edge computing paradigm, there are common security vulnerabilities associated with the Internet of Things applications. This paper will evaluate and analyze some of the most common security issues that pose a serious threat to the edge computing paradigm.


Sign in / Sign up

Export Citation Format

Share Document