scholarly journals Intelligent Cyber-Security System for IoT-Aided Drones Using Voting Classifier

Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 2926
Author(s):  
Rizwan Majeed ◽  
Nurul Azma Abdullah ◽  
Muhammad Faheem Mushtaq ◽  
Muhammad Umer ◽  
Michele Nappi

Developments in drones have opened new trends and opportunities in different fields, particularly in small drones. Drones provide interlocation services for navigation, and this interlink is provided by the Internet of Things (IoT). However, architectural issues make drone networks vulnerable to privacy and security threats. It is critical to provide a safe and secure network to acquire desired performance. Small drones are finding new paths for progress in the civil and defense industries, but also posing new challenges for security and privacy as well. The basic design of the small drone requires a modification in its data transformation and data privacy mechanisms, and it is not yet fulfilling domain requirements. This paper aims to investigate recent privacy and security trends that are affecting the Internet of Drones (IoD). This study also highlights the need for a safe and secure drone network that is free from interceptions and intrusions. The proposed framework mitigates the cyber security threats by employing intelligent machine learning models in the design of IoT-aided drones by making them secure and adaptable. Finally, the proposed model is evaluated on a benchmark dataset and shows robust results.

The Internet of Things (IoT) has been growing to market from the past several years with great potential. Many several devices have been now available in the market based on IoT, which enables it to connect with your smart phones or with any other kind of smart resources, and then that device is ready to perform smart work via the Internet. With the help of IoT, we are now able to make our devices connect with the internet and then can be operated from anywhere from the geo location as well as it can store and retrieve a large amount of data for better communication between the end-user and the device. IoT also has a wide range of applications that are being used on many platforms. However, this great technology also has to face many problems and among all the problems the main issue arises with its security aspects. The major concern on using IoT security is the hacker wants to enter into the large network system using a particular device as all the devices are connected over the network. Not only this, many other security threats and malware are also a major concern in IoT. So taking these security aspects as a major concern this research paper reviews several security issues and challenges that occur in IoT. As there in every field when it comes to cyber security for any kind of data, we need to follow CIA Security Triangle i.e., Confidentiality, Integrity, and Availability of data. CIA security triangle is the most important concept in terms of security and also must be taken into consideration in the IoT domain. Therefore, considering all these facts and reviewing some of the latest documents as well as researches in the field of IoT, this paper has been based on all the facts related to IoT security issues and its desirable solution which is needed to be done and should follow the security triangle to an extent.


Author(s):  
Jonika Lamba ◽  
Esha Jain

Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.


Author(s):  
Xichen Zhang ◽  
Ali A. Ghorbani

Over recent years, the extensive development of information technology has dramatically advanced the way that people use the internet. The fast growth of the internet of things and mobile crowdsensing applications raise challenging security and privacy issues for the society. More often than before, malicious attackers exploit human vulnerability as the weakest link to launch cyberattacks and conduct fraudulent online activities. How to profile users' daily behavior becomes an essential component for identifying users' vulnerable/malicious level and predicting the potential cyber threats. In this chapter, the authors discuss human factors and their related issues in cyber security and privacy. Three categories of human behaviors—desktop behavior, mobile behavior, and online behavior—and their corresponding security and privacy issues are demonstrated in detail to estimate the vulnerabilities of internet users. Some future directions related to human-factor based security and privacy issues are proposed at the end of this chapter.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Author(s):  
Sébastien Ziegler ◽  
Cédric Crettaz ◽  
Eunah Kim ◽  
Antonio Skarmeta ◽  
Jorge Bernal Bernabe ◽  
...  

Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.


Author(s):  
Tim Unwin

Technology is all too often seen as being inherently good, and there are powerful interests limiting the amount of attention paid to the darker side of ICTs and Internet access in particular. However, these darker aspects are crucial to understanding ICT4D, especially since they can more seriously impact the poor, both countries and people, than the rich. The following main challenges are covered in the chapter: privacy and security; the Surface Web and the Dark Web; cyber-security and resilience; negative aspects of the exploitation of Big Data and the abuse of people through social media; and the increasing dehumanization of people through the use of ICTs and the Internet of Things.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2042 ◽  
Author(s):  
Yiming Jiang ◽  
Chenxu Wang ◽  
Yawei Wang ◽  
Lang Gao

With the rapid development of the internet of things (IoT), traditional industries are setting off a massive wave of digitization. In the era of the Internet of Everything, millions of devices and links in IoT pose more significant challenges to data management. Most existing solutions employ centralized systems to control IoT devices, which brings about the privacy and security issues in IoT data management. Recently, blockchain has attracted much attention in the field of IoT due to its decentralization, traceability, and non-tamperability. However, it is non-trivial to apply the current blockchain techniques to IoT due to the lack of scalability and high resource costs. Different blockchain platforms have their particular advantages in the scenario of IoT data management. In this paper, we propose a cross-chain framework to integrate multiple blockchains for efficient and secure IoT data management. Our solution builds an interactive decentralized access model which employs a consortium blockchain as the control station. Other blockchain platforms customized for specific IoT scenarios run as the backbone of all IoT devices. It is equivalent to opening the off-chain channels on the consortium blockchain. Our model merges transactions in these channels for confirmation based on the notary mechanism. Finally, we implement a prototype of the proposed model based on hyperledge Fabric and IOTA Tangle. We evaluate the performance of our method through extensive experiments. The results demonstrate the effectiveness and efficiency of our framework.


2013 ◽  
Vol 748 ◽  
pp. 910-914
Author(s):  
Zhong Wei Zhou ◽  
Lei Shi

With the development of Internet of things, the security has become moreand more important. In order to make clear the internet of things existing security threats, provide a theoretical reference for Internet of things Security and privacy protection, this paper summarizes the internet of things security threat and the measures. According to the Internet of things main system frame, research the perception layer, transport layer and application layer seperately, analysis of the network security needs issues, research networking security model, and discuss the content of network security mechanisms, gives the corresponding safety measures and recommendations for all kinds of security threats.


2021 ◽  
Vol 8 (4) ◽  
pp. 685-733
Author(s):  
Jennifer Zwagerman

Technology advancements make life, work, and play easier and more enjoyable in many ways. Technology issues are also the cause of many headaches and dreams of living out the copier destruction scene from the movie “Office Space.” Whether it be user error or technological error, one key technology issue on many minds right now is how all the data produced every second of every day, in hundreds of different ways, is used by those that collect it. How much data are we talking about here? In 2018, the tech company Domo estimated that by 2020 “1.7 MB of data will be created every second” for every single person on Earth. In 2019, Domo’s annual report noted that “Americans use 4,416,720 GB of internet data including 188,000,000 emails, 18,100,000 texts and 4,497,420 Google searches every single minute.” And this was before the pandemic of 2020, which saw reliance on remote technology and the internet skyrocket. It is not just social media and working from home that generates data—the “Internet of Things” (“IoT”) is expanding exponentially. From our homes (smart appliances and thermostats), to entertainment (smart speakers and tablets), to what we wear (smartwatches and fitness devices), we are producing data constantly. Over 30 billion devices currently make up the IoT, and that number will double by 2025. The IoT is roughly defined as “devices—from simple sensors to smartphones and wearables—connected together.” That connection allows the devices to “talk” to each other across networks that stretch across the world, sharing information that in turn can be analyzed (alone or combined with data from other users) in ways that may be beneficial to the user or the broader economy. The key word in that last sentence is “may.” When it comes to the data that individuals and businesses across the world produce every second of every day, some of it—perhaps most of it—could be used in ways that are not beneficial to the user or the entire economy. Some data types can be used to cause harm in obvious ways, such as personal identifying information in cases of identity theft. While some data types may seem innocuous or harmful when viewed on their own, when combined with other data from the same user or even other users, it can be used in a wide variety of ways. While I find it beneficial to know how many steps I take in a day or how much time I sleep at night, I am not the only individual or entity with access to that information. The company that owns the device I wear also takes that information and uses it in ways that are beyond my control. Why would a company do that? In many instances, “[t]he data generated by the Internet of Things provides businesses with a wealth of information that—when properly collected, stored, and processed—gives businesses a depth of insight into user behavior never before seen.” Data security and privacy in general are issues that all companies manage as they work to protect the data we provide. Some types of data receive heightened protections, as discussed below, because they are viewed as personal, as private, or as potentially dangerous since unauthorized access to them could cause harm to the user/owner. Some states and countries have taken a step further, focusing not on industry-related data that needs particular types of protection, but in-stead looking at an individual’s overall right to privacy, particularly on the internet. Those protections are summarized below. It makes sense, you might say, to worry about financial or healthcare data remaining private and to not want every website you have ever visited to keep a file of information on you. But why might we care about the use of data in agricultural operations? Depending on who you ask, the answer may be that agricultural data needs no more care or concern than any other type of business data. Some argue that the use of “Big Data” in agriculture provides opportunities for smaller operations and shareholders. These opportunities include increased power in a market driven for many years by the mantra “bigger is better” and increased production of food staples across the world—both in a more environmentally-friendly fashion. While the benefits of technology and Big Data in the agricultural sector unarguably exist, questions remain as to how to best manage data privacy concerns in an industry where there is little specific law or regulation tied to collection, use, and ownership of this valuable agricultural production data. In the following pages, this Article discusses what types of data are currently being gathered in the agricultural sector and how some of that data can and is being used. In addition, it focuses on unique considerations tied to the use of agricultural data and why privacy concerns continue to increase for many producers. As the Article looks at potential solutions to privacy concerns, it summarizes privacy-related legislation that currently exists and ends by looking at whether any of the current privacy-related laws might be used or adapted within the agricultural sector to address potential misuse of agricultural data.


Sign in / Sign up

Export Citation Format

Share Document