scholarly journals IoT Security Mechanisms in the Example of BLE

Computers ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 162
Author(s):  
Evgeny Kalinin ◽  
Danila Belyakov ◽  
Dmitry Bragin ◽  
Anton Konev

In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency.

IOT enables devices to be managed and monitored anywhere from internet. With IOT gaining popularity, billions of devices are connected to internet and they are being used for many applications like home automation, public safety, smart city, traffic monitoring etc. IOT interconnectivity to internet based on mesh network is the most used topology due to effectiveness in scalability and reliability. The mesh network must be optimized in terms of QOS, energy efficiency for the case of nature of traffic from IOT devices. Towards this end, this work proposes an energy efficient QOS guaranteed cross layer solution for mesh backbone based IOT network. The proposed cross layer solution applies changes at Application, session, network layer to achiness a better QOS and energy efficiency than existing solutions discussed in literature.


Author(s):  
K. O. Toka ◽  
Y. Dikilitaş ◽  
T. Oktay ◽  
A. Sayar

Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most of the security deficiencies of heavily IoT based systems. The Hyperledger Fabric blockchain network used in this study provides confidentiality, data integrity, authentication, and data security for data obtained from IoT devices. Widely used IoT data transfer MQTT protocol is included in the proposed approach. The approach is demonstrated in a simple demo Hyperledger network with simulated IoT devices. The proposed approach is discussed in terms of network security dimensions. Based on the features of the Hyperledger Blockchain network, it is displayed that the IoT security deficiencies can largely be remedied with the proposed approach.


Internet of Things (IoT) is growing rapidly in recent days and increasing of IoT devices day by day producing vast amount of data, to store this data security is a major challenge in IoT. To avoid these security challenges, blockchain is the perfect solution. With its security by design, immutable nature, transparent nature and encryption methodology blockchain will solve architectural issues of IoT. In these days, the energy meters in our homes are not able send the information to the cloud and man power also needed to update readings every month, and manually errors also taken place some times to avoid these, in the paper a smart energy meter is proposed, that will measure the power consumption and that readings will be stored in to the blockchain to secure the data from the fraudsters and also to make the payment without any third parties like banks, in the blockchain technology amount can be transferred from one to one without any third parties using crypto currencies like bitcoin, ether.., etc. The user will be able to check the bills in the blockchain and do the payments. By using the blockchain technology the user data will be more secure and the IoT security issues also solvable.


Symmetry ◽  
2021 ◽  
Vol 13 (5) ◽  
pp. 855
Author(s):  
Tzung-Her Chen ◽  
Wei-Bin Lee ◽  
Hsing-Bai Chen ◽  
Chien-Lung Wang

Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of the constructor’s private key. From a different perspective on the subliminal channel, we find the new concept named the chamber of secrets in blockchains. The found concept, whereby the secret is hidden and later recovered by the constructor from the common transactions in a blockchain, highlights a new way to encourage implementing various applications to benefit efficiency and security. Thus, the proposed scheme benefits from the following advantages: (1) avoiding the high maintenance cost of certificate chain of certificate authority, or public key infrastructure, and (2) seamlessly integrating with blockchains using the property of chamber of secrets. In order to easily understand the superiority of this new concept, a remote authentication scenario is taken as a paradigm of IoT to demonstrate that the further advantages are achieved: (1) avoiding high demand for storage space in IoT devices, and (2) avoiding maintaining a sensitive table in IoT server.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


Webology ◽  
2021 ◽  
Vol 18 (Special Issue 04) ◽  
pp. 733-751
Author(s):  
D.M. Sheeba

Internet of Things enables many industries to connect to end customers and provide seamless products and services delivery. Due to easy access to network, availability of devices, penetration of IoT services exponentially Growing. Meanwhile, Ensuring the Data Security and Integrity of devices connected to network is paramount. In this work, we bring the efficient way of implementing Secure Algorithm for low powered devices and enhancing the encryption and decryption process. In addition to the data security, to enhance node integrity with less power, Authenticator and intermediate network manager introduced which will acts as a firewall and manager of data flow. To demonstrate the approach, same is implemented using low cost Arduino Uno, Raspberry Pi boards. Arduino Uno used to demonstrate low powered encryption process using EDIA Algorithm and raspberry pi used as nodal manager to manage the integrity of nodes in a low-powered environment. Data Security and Integrity is ensured by the way of enhanced Algorithm and Integrity through BlockChain and results are provided and discussed. Finally result and future enhancement are explained.


Author(s):  
Anju Gupta ◽  
R K Bathla

With so many people now wearing mobile devices with sensors (such as smartphones), utilizing the immense capabilities of these business mobility goods has become a prospective skill to significant behavioural and ecological sensors. A potential challenge for pervasive context assessment is opportunistic sensing, has been effectively used to a wide range of applications. The sensor cloud combines cloud technology with a wireless sensor, resulting in a scalable and cost-effective computing platform for real-time applications. Because the sensor's battery power is limited and the data centre’s servers consume a significant amount of energy to supply storage, a sensor cloud must be energy efficient. This study provides a Fog-based semantic for enabling these kinds of technologies quickly and successfully. The suggested structure is comprised of fundamental algorithms to help set up and coordinate the fog sensing jobs. It creates effective multihop routes for coordinating relevant devices and transporting acquired sensory data to fog sinks. It was claimed that energy-efficient sensor cloud approaches were categorized into different groups and that each technology was examined using numerous characteristics. The outcomes of a series of thorough test simulation in NS3 to define the practicality of the created console, as well as the proportion of each parameter utilized for each technology, are computed.


Sign in / Sign up

Export Citation Format

Share Document