scholarly journals A Digital Record for Privacy and Security in Internet of Things

Author(s):  
Dr. K. Sai Manoj

For privacy and security, a digital transactional record method plays a major role for its excellent nature of work. This digital method used to solve the check the problems like privacy and protection of data. It also had some unfit things like high bandwidth, computation complexity, latency and restricted scalability which are inadequate for internet of things. This research paper focuses on Efficient Lightweight Integrated Block chain model which is expanded to show the development of internet of things. Especially, this paper presents a model of a digital home which is attempted to prove the various applications used by internet of things. The benefits of this smart home are information transmission, activity of outgoing and incoming in every action. Efficient Lightweight Integrated Block chain model connected with digital transactional method with powerful provided sources to prove privacy and security. Algorithm, Certificate less Cryptography, Distributed Throughput Management schemes and Lightweight Consensus are used to present the Efficient Lightweight Integrated Block Chain model. Various methods are used to prove this model by using time processing, usage of energy and so on. This model saves 60% of time processing while consuming the energy of 0.08 Jm. Many parameters are used to show outcome done by this method.

2019 ◽  
Vol 182 (39) ◽  
pp. 3-8 ◽  
Author(s):  
Zaied Shouran ◽  
Ahmad Ashari ◽  
Tri Kuntoro

2021 ◽  
Vol 20 (Supp01) ◽  
pp. 2140004
Author(s):  
Mohammed Imtyaz Ahmed ◽  
G. Kannan

Radio frequency is the technology which enables smart labels to things. Thus, even physical things can participate in computing process. It is becoming popular due to its technological innovation and ability to overcome line of sight problem. With Internet of Things (IoT) technology, RFID usage became ubiquitous in smart applications or IoT use the cases like smart education, smart homes, smart healthcare and smart cities to mention a few. Integration of digital and physical worlds is made possible with IoT, RFID and host of other technologies and standards. When connected devices and things are uniquely identified using RFID technology, it is essential to know its utility in authentication process and security challenges thrown as well. RFID tag and RFID reader are involved in wireless communication and identification. RFID tags may carry sensitive information and its vulnerabilities if any are exploited by adversaries. Moreover, heavy computation is involved in RFID-based authentication. To overcome issues like privacy, security and overhead improvements have been proposed as found in the literature. Researchers used cryptographic tools, hash functions and symmetric key encryption for secure RFID communications. However, the level of security is still inadequate. In this paper, we proposed a cloud-based remote RFID authentication scheme with smart home as the case study. The proposed scheme has features like forward secrecy, anonymity and untraceability besides being light weight. It can withstand various security attacks. Our simulation study revealed that the proposed system model and the cloud-based remote RFID authentication scheme are effective in providing privacy and security as part of access control system in smart home IoT use case.


2019 ◽  
Vol 8 (2) ◽  
pp. 2274-2279

The technology advancement in Internet of things has benefitted many real time scenario to emerge as a smart applications. The block chain technology is the recent advancement in the current world which facilitates on time operation upgradation to all the nodes. This prohibits the private process execution that leads harm to the application. It also enhances the authorization of work done by any individual and everyone in the network are aware of the job done by others. It is facilitated by the maintenance of the distributed ledger in the block chain system. The consensus and smart contract software is constantly processed by the block chain to prevent the entry of illegal users into the network. Due to cast advantage of blockchain and internet of things towards security and privacy, it is mainly focused to adapt these technologies in the banking, credit card transaction, trading and online applications. With this exploratory study, we focus to integrate the blockchain and internet of things to provide security and privacy to a greater extent. This paper attempts to design a Blockchain Integrated IOT Based Smart Home that effectively monitors the home and arrest the entry of harmful users. The famous private Blockchain software Ethereum blockchain is utilized to implement the smart home architecture and the obtained results are also for implementation and the results are also conferred.


2019 ◽  
Vol 01 (02) ◽  
pp. 31-39 ◽  
Author(s):  
Duraipandian M. ◽  
Vinothkanna R.

The paper proposing the cloud based internet of things for the smart connected objects, concentrates on developing a smart home utilizing the internet of things, by providing the embedded labeling for all the tangible things at home and enabling them to be connected through the internet. The smart home proposed in the paper concentrates on the steps in reducing the electricity consumption of the appliances at the home by converting them into the smart connected objects using the cloud based internet of things and also concentrates on protecting the house from the theft and the robbery. The proposed smart home by turning the ordinary tangible objects into the smart connected objects shows considerable improvement in the energy consumption and the security provision.


Author(s):  
Kanika Gupta ◽  
Aatif Jamshed

: Some unknown cases of pneumonia were communicated to World Health Organization (WHO) on 31 December,2019 in China’s Wuhan state. The higher authorities of China informed novel coronavirus as the root cause and labelled as “nCov-2019”. This virus is lying into the virus’s family which propagates the diseases like cold flu, lungs infection and more serious diseases. It is not detected earlier in human beings as it is considered to be a new patch on life. Many countries have increased their surveillance forces around the globe to detect any new novel coronavirus cases. An efficient and safe network for secure data storage i.e. Block chain is used in several applications such as food market, healthcare applications, finance, operations management, Internet of Things (IoT). In this paper, with the use of this emerging technology, are able to track useful information and accelerate the treatment process of patients. It also preserves the person’s identity. Correct implementation of block chain model has the chances to restrict the coronavirus transmissions and its related mortality rate where there are inadequate facilities of testing. Other infectious diseases will also be curbed by this model. The advantages of this model can reach to various stakeholders who are involved in the healthcare field which helps us to restrict the transmission of various diseases.


2021 ◽  
pp. 126908
Author(s):  
Wonyoung Choi ◽  
Jisu Kim ◽  
SangEun Lee ◽  
Eunil Park

i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 1
Author(s):  
Hilal Çepik ◽  
Ömer Aydın ◽  
Gökhan Dalkılıç

With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.


Sign in / Sign up

Export Citation Format

Share Document