scholarly journals Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation

2021 ◽  
Vol 11 (7) ◽  
pp. 3260
Author(s):  
Aarón Echeverría ◽  
Cristhian Cevallos ◽  
Ivan Ortiz-Garces ◽  
Roberto O. Andrade

The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids, and other smart concepts has driven data-driven decision making by managers and automation in each domain. However, the hyper-connectivity generated by IoT networks coupled with limited default security in IoT devices increases security risks that can jeopardize the operations of cities, hospitals, and organizations. Strengthening the security aspects of IoT devices prior to their use in different systems can contribute to minimize the attack surface. This study aimed to model a sequence of seven steps to minimize the attack surface by executing hardening processes. Conducted a systematic literature review using Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) techniques. In this way, we were able to define a proposed methodology to evaluate the security level of an IoT solution by means of a checklist that considers the security aspects in the three layers of the IoT architecture. A risk matrix adapted to IoT is established to evaluate the attack surface. Finally, a process of hardening and vulnerability analysis is proposed to reduce the attack surface and improve the security level of the IoT solution.

Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4034
Author(s):  
Arie Haenel ◽  
Yoram Haddad ◽  
Maryline Laurent ◽  
Zonghua Zhang

The Internet of Things world is in need of practical solutions for its security. Existing security mechanisms for IoT are mostly not implemented due to complexity, budget, and energy-saving issues. This is especially true for IoT devices that are battery powered, and they should be cost effective to be deployed extensively in the field. In this work, we propose a new cross-layer approach combining existing authentication protocols and existing Physical Layer Radio Frequency Fingerprinting technologies to provide hybrid authentication mechanisms that are practically proved efficient in the field. Even though several Radio Frequency Fingerprinting methods have been proposed so far, as a support for multi-factor authentication or even on their own, practical solutions are still a challenge. The accuracy results achieved with even the best systems using expensive equipment are still not sufficient on real-life systems. Our approach proposes a hybrid protocol that can save energy and computation time on the IoT devices side, proportionally to the accuracy of the Radio Frequency Fingerprinting used, which has a measurable benefit while keeping an acceptable security level. We implemented a full system operating in real time and achieved an accuracy of 99.8% for the additional cost of energy, leading to a decrease of only ~20% in battery life.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1598
Author(s):  
Sigurd Frej Joel Jørgensen Ankergård ◽  
Edlira Dushku ◽  
Nicola Dragoni

The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-connected devices which are revolutionizing many domains, such as healthcare, transportation, smart cities, to mention only a few. Along with the unprecedented new opportunities, the IoT revolution is creating an enormous attack surface for potential sophisticated cyber attacks. In this context, Remote Attestation (RA) has gained wide interest as an important security technique to remotely detect adversarial presence and assure the legitimate state of an IoT device. While many RA approaches proposed in the literature make different assumptions regarding the architecture of IoT devices and adversary capabilities, most typical RA schemes rely on minimal Root of Trust by leveraging hardware that guarantees code and memory isolation. However, the presence of a specialized hardware is not always a realistic assumption, for instance, in the context of legacy IoT devices and resource-constrained IoT devices. In this paper, we survey and analyze existing software-based RA schemes (i.e., RA schemes not relying on specialized hardware components) through the lens of IoT. In particular, we provide a comprehensive overview of their design characteristics and security capabilities, analyzing their advantages and disadvantages. Finally, we discuss the opportunities that these RA schemes bring in attesting legacy and resource-constrained IoT devices, along with open research issues.


Author(s):  
Sudhir K. Routray

Internet of things (IoT) is an integral part of modern digital ecosystem. It is available in different forms. Narrowband IoT (NBIoT) is one of the special forms of the IoTs available for deployment. It is popular due to its low power wide area (LPWA) characteristics. For new initiatives such as smart grids and smart cities, a large number of sensors will be deployed and the demand for power is expected to be high for such IoT deployments. NBIoT has the potential to reduce the power and bandwidth required for large IoT projects. In this chapter, different practical aspects of NBIoT deployment have been addressed. The LPWA features of NBIoT can be realized effectively if and only if its deployment is done properly. Due to its large demand, it has been standardized in a very short span of time. However, the 5G deployment of NBIoT will have some new provisions.


2020 ◽  
Vol 10 (2) ◽  
pp. 255-259 ◽  
Author(s):  
Philip James ◽  
Ronnie Das ◽  
Agata Jalosinska ◽  
Luke Smith

This commentary describes the rapid development of a COVID-19 data dashboard utilising existing Urban Observatory Internet of Things (IoT) data and analytics infrastructure. Existing data capture systems were rapidly repurposed to provide real-time insights into the impacts of lockdown policy on urban governance.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 972 ◽  
Author(s):  
Yasin Kabalci ◽  
Ersan Kabalci ◽  
Sanjeevikumar Padmanaban ◽  
Jens Bo Holm-Nielsen ◽  
Frede Blaabjerg

Energy Internet (EI) has been recently introduced as a new concept, which aims to evolve smart grids by integrating several energy forms into an extremely flexible and effective grid. In this paper, we have comprehensively analyzed Internet of Things (IoT) applications enabled for smart grids and smart environments, such as smart cities, smart homes, smart metering, and energy management infrastructures to investigate the development of the EI based IoT applications. These applications are promising key areas of the EI concept, since the IoT is considered one of the most important driving factors of the EI. Moreover, we discussed the challenges, open issues, and future research opportunities for the EI concept based on IoT applications and addressed some important research areas.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Sabeeh Ahmad Saeed ◽  
Farrukh Zeeshan Khan ◽  
Zeshan Iqbal ◽  
Roobaea Alroobaea ◽  
Muneer Ahmad ◽  
...  

Internet of Things (IoT) is considered one of the world’s ruling technologies. Billions of IoT devices connected together through IoT forming smart cities. As the concept grows, it is very challenging to design an infrastructure that is capable of handling large number of devices and process data effectively in a smart city paradigm. This paper proposed a structure for smart cities. It is implemented using a lightweight easy to implement network design and a simpler data format for information exchange that is suitable for developing countries like Pakistan. Using MQTT as network protocol, different sensor nodes were deployed for collecting data from the environment. Environmental factors like temperature, moisture, humidity, and percentage of CO2 and methane gas were recorded and transferred to sink node for information sharing over the IoT cloud using an MQTT broker that can be accessed any time using Mosquitto client. The experiment results provide the performance analysis of the proposed network at different QoS levels for the MQTT protocol for IoT-based smart cities. JSON structure is used to formulate the communication data structure for the proposed system.


Internet of Things (IoT) is efficiently plays vital role in development of several sectors by offering many opportunities to grow the economy and improve the life standard through connecting billions of “Things” which provides business opportunities in different sectors and encounter many technical and application challenges. This paper emphasizes the role of Dynamic bandwidth allocation and protocols standards in various IoT sectors such as healthcare, education, agriculture, industrial, transportation, smart cities etc., and focuses on the challenges in providing uninterrupted bandwidth to all IoT devices with existing infrastructure, which depends on standardized protocols and network devices to establish connection with heterogeneous IoT devices. This paper covers Enhanced Dynamic Bandwidth Techniques, protocol standards and policies in IoT network technologies to Improve QoS in IoT devices.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Runnan Zhang ◽  
Gang Liu ◽  
Shancang Li ◽  
Yongheng Wei ◽  
Quan Wang

Smart cities require new access control models for Internet of Things (IoT) devices that preserve user privacy while guaranteeing scalability and efficiency. Researchers believe that anonymous access can protect the private information even if the private information is not stored in authorization organization. Many attribute-based access control (ABAC) models that support anonymous access expose the attributes of the subject to the authorization organization during the authorization process, which allows the authorization organization to obtain the attributes of the subject and infer the identity of the subject. The ABAC with anonymous access proposed in this paper called ABSAC strengthens the identity-less of ABAC by combining homomorphic attribute-based signatures (HABSs) which does not send the subject attributes to the authorization organization, reducing the risk of subject identity re-identification. It is a secure anonymous access framework. Tests show that the performance of ABSAC implementation is similar to ABAC’s performance.


2021 ◽  
Vol 5 (2) ◽  
pp. 105
Author(s):  
Wasswa Shafik ◽  
S. Mojtaba Matinkhah ◽  
Mamman Nur Sanda ◽  
Fawad Shokoor

In recent years, the IoT) Internet of Things (IoT) allows devices to connect to the Internet that has become a promising research area mainly due to the constant emerging of the dynamic improvement of technologies and their associated challenges. In an approach to solve these challenges, fog computing came to play since it closely manages IoT connectivity. Fog-Enabled Smart Cities (IoT-ESC) portrays equitable energy consumption of a 7% reduction from 18.2% renewable energy contribution, which extends resource computation as a great advantage. The initialization of IoT-Enabled Smart Grids including (FESC) like fog nodes in fog computing, reduced workload in Terminal Nodes services (TNs) that are the sensors and actuators of the Internet of Things (IoT) set up. This paper proposes an integrated energy-efficiency model computation about the response time and delays service minimization delay in FESC. The FESC gives an impression of an auspicious computing model for location, time, and delay-sensitive applications supporting vertically -isolated, service delay, sensitive solicitations by providing abundant, ascendable, and scattered figuring stowage and system associativity. We first reviewed the persisting challenges in the proposed state-of-the models and based on them. We introduce a new model to address mainly energy efficiency about response time and the service delays in IoT-ESC. The iFogsim simulated results demonstrated that the proposed model minimized service delay and reduced energy consumption during computation. We employed IoT-ESC to decide autonomously or semi-autonomously whether the computation is to be made on Fog nodes or its transfer to the cloud.


Sign in / Sign up

Export Citation Format

Share Document