scholarly journals Security Challenges and Countermeasures for the Heterogeneity of IoT Applications

2019 ◽  
Vol 1 (2) ◽  
pp. 16 ◽  
Author(s):  
Deepak Choudhary

The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and household settings. As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems. New security issues arise through the heterogeneity  of  IoT  applications and devices and their large-scale deployment.

2018 ◽  
Vol 28 (5) ◽  
pp. 1705-1711
Author(s):  
Verda Misimi ◽  
Miranda Xhaferi

Communication between people isunavoidable nowadays; sending and receiving information through internet among people is our daily routine which is known as Internet of People. Hence, this kind of communication has grown even more, making possible to communicate not just people but also things which is known as Internet of Things, one of the trendiest technology. The Internet of Things or IoT refers to the billions of physical devices around the world that are now connected to the internet, collecting and sharing data.The increase of population in urban places and their requirements impose the creation of a system that will satisfy all of these requirements. Due to the increasing number of population the numbers of things that people own has grown enormously. Therefore, this fact generated the idea of adding sensors and intelligence to basic objects. Thanks to cheap processors, wireless network,sensors and actuators is possible to turn anything, from a pill to an aeroplane, into part of the Internet of Things. Combining these digital things in the past was very difficult or barely possible simply because the technology was not ready. The IoT integrates the interconnectedness of human culture- our “things” with the interconnectedness of our digital information system- “the internet”.The development of modern technologies and the Internet of Things establishmentmerged the digital and physical worlds, namely adding digital intelligence to devices that would be otherwise dumb, enabling them to communicate.The potential of this tendencyincreases day by day, enabling a very wide usage. The Internet of Things aims to provide a simple interaction between the physical world and virtual world, integrating a large number of devices of the real world to the internet. The Internet of Things promises to make our environment - our homes,offices and vehicles smarter, more measurable and chattier.The benefits of Internet of Things depend on the particular implementation, but the key is that enterprises should have access to more data about their own things and their own internal system and a greater ability to make changes as a result. It is impossible to predict all IoT applications considering the swift progress of technology and the diversely requirements of consumers. Thus, in our paper we will mention some of the most used and most important applications of IoT, as well the benefits of its implementation in different platforms in different environments. In the end, we emphasize the challenges we face during IoT application, moreoverthe common issues in the adoption of IoT on a large scale.


Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


Symmetry ◽  
2018 ◽  
Vol 10 (11) ◽  
pp. 537 ◽  
Author(s):  
Wayne Chiu ◽  
Chunhua Su ◽  
Chuan-Yen Fan ◽  
Chien-Ming Chen ◽  
Kuo-Hui Yeh

The Internet-of-Things (IoT) is an emerging paradigm seamlessly integrating a great number of smart objects ubiquitously connected to the Internet. With the rise in interest in the IoT, industry and academia have introduced a variety of authentication technologies to deal with security challenges. Authentication in IoT involves not only shifting intelligent access control down to the end smart objects, but also user identification and verification. In this paper, we build an authentication system based on brainwave reactions to a chain of events. Brainwaves, as external signals of a functioning brain, provide a glimpse into how we think and react. However, seen another way, we could reasonably expect that a given action or event could be linked back to its corresponding brainwave reaction. Recently, commercial products in the form of wearable brainwave headsets have appeared on the market, opening up the possibility of exploiting brainwaves for various purposes and making this more feasible. In the proposed system, we use a commercially available brainwave headset to collect brainwave data from participants for use in the proposed authentication system. After the brainwave data collection process, we apply a machine learning-based approach to extract features from brainwaves to serve as authentication tokens in the system and support the authentication system itself.


Author(s):  
Karthick G. S. ◽  
Pankajavalli P. B.

The internet of things (IoT) is aimed at modifying the life of people by adopting the possible computing techniques to the physical world, and thus transforming the computing environment from centralized form to decentralized form. Most of the smart devices receive the data from other smart devices over the network and perform actions based on their implemented programs. Thus, testing becomes an intensive process in the IoT that will require some normalization too. The composite architecture of IoT systems and their distinctive characteristics require different variants of testing to be done on the components of IoT systems. This chapter will discuss the necessity for IoT testing in terms of various criteria of identifying and fixing the problems in the IoT systems. In addition, this chapter examines the core components to be focused on IoT testing and testing scope based on IoT device classification. It also elaborates the various types of testing applied on healthcare IoT applications, and finally, this chapter summarizes the various challenges faced during IoT testing.


2022 ◽  
pp. 571-601
Author(s):  
Karthick G. S. ◽  
Pankajavalli P. B.

The internet of things (IoT) is aimed at modifying the life of people by adopting the possible computing techniques to the physical world, and thus transforming the computing environment from centralized form to decentralized form. Most of the smart devices receive the data from other smart devices over the network and perform actions based on their implemented programs. Thus, testing becomes an intensive process in the IoT that will require some normalization too. The composite architecture of IoT systems and their distinctive characteristics require different variants of testing to be done on the components of IoT systems. This chapter will discuss the necessity for IoT testing in terms of various criteria of identifying and fixing the problems in the IoT systems. In addition, this chapter examines the core components to be focused on IoT testing and testing scope based on IoT device classification. It also elaborates the various types of testing applied on healthcare IoT applications, and finally, this chapter summarizes the various challenges faced during IoT testing.


Author(s):  
Kamalendu Pal

The internet of things (IoT) is ushering a new age of technology-driven automation of information systems into the manufacturing industry. One of the main concerns with IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the safety of the data. Many security issues arise because of the centralized architecture of IoT-based information systems. Another concern is the lack of appropriate authentication and access control schemes to moderate the access to information generated by the IoT devices in the manufacturing industry. Hence, the question that arises is how to ensure the identity of the manufacturing machinery or the communication nodes. This chapter presents the advantages of blockchain technology to secure the operation of the modern manufacturing industry in a trustless environment with IoT applications. The chapter reviews the challenges and threats in IoT applications and how integration with blockchain can resolve some of the manufacturing enterprise information systems (EIS).


Author(s):  
Sreelakshmi K. K. ◽  
Ashutosh Bhatia ◽  
Ankit Agrawal

The internet of things (IoT) has become a guiding technology behind automation and smart computing. One of the major concerns with the IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the security of the data. A majority of security issues arise because of the centralized architecture of IoT systems. Another concern is the lack of proper authentication and access control schemes to moderate access to information generated by the IoT devices. So the question that arises is how to ensure the identity of the equipment or the communicating node. The answer to secure operations in a trustless environment brings us to the decentralized solution of Blockchain. A lot of research has been going on in the area of convergence of IoT and Blockchain, and it has resulted in some remarkable progress in addressing some of the significant issues in the IoT arena. This work reviews the challenges and threats in the IoT environment and how integration with Blockchain can resolve some of them.


Fog Computing ◽  
2018 ◽  
pp. 25-53 ◽  
Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 545
Author(s):  
Risabh Mishra ◽  
M Safa ◽  
Aditya Anand

Recent advances in wireless communication technologies and automobile industry have triggered a significant research interest in the field of Internet of Vehicles over the past few years.The advanced period of the Internet of Things is guiding the development of conventional Vehicular Networks to the Internet of Vehicles.In the days of Internet connectivity there is need to be in safe and problem-free environment.The Internet of Vehicles (IoV) is normally a mixing of three networks: an inter-vehicleNetwork, an intra-vehicle network, and a vehicle to vehicle network.Based on  idea of three networks combining into one, we define  Internet of Vehicles as a large-scale distributed system to wireless communication and information exchange between vehicle2X (X: vehicle, road, human and internet).It is a combined   network for supporting intelligent traffic management, intelligent dynamic information service, and intelligent vehicle control, representation of an application of the Internet of Things (IoT) technology for intelligent transportation system (ITS).  


Sign in / Sign up

Export Citation Format

Share Document