scholarly journals A Framework for Constructing a Secure Domain of Sensor Nodes

Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2797 ◽  
Author(s):  
Furtak ◽  
Zieliński ◽  
Chudzikiewicz

Application of the Internet of Things (IoT) in some critical areas (e.g., military) is limited mainly due to the lack of robust, secure, and trusted measures needed to ensure the availability, confidentiality, and integrity of information throughout its lifecycle. Considering the mostly limited resources of IoT devices connected by wireless networks and their dynamic placement in unsupervised or even hostile environments, security is a complex and considerable issue. In this paper, a framework which encompasses an approach to integrate some security measures to build a so-called “secure domain of sensors nodes” is proposed. The framework is based on the use of the Trusted Platform Modules (TPMs) in wireless sensor nodes. It encompasses an architecture of sensor nodes, their roles in the domain, and the data structures as well as the developed procedures which could be applied to generate the credentials for the sensor nodes, and subsequently, to build a local trust structure of each node as well as to build a trust relationship between a domain’s nodes. The proposed solution ensures the authentication of sensor nodes and their resistance against unauthorized impact with the hardware/software configuration allowing protection against malware that can infect the software. The usefulness of the presented framework was confirmed experimentally.

IoT ◽  
2020 ◽  
Vol 1 (1) ◽  
pp. 5-20 ◽  
Author(s):  
Petros Spachos

Precision Agriculture (PA) is an ever-expanding field that takes modern technological advancements and applies it to farming practices to reduce waste and increase output. One advancement that can play a significant role in achieving precision agriculture is wireless technology, and specifically the Internet of Things (IoT) devices. Small, inch scale and low-cost devices can be used to monitor great agricultural areas. In this paper, a system for precision viticulture which uses IoT devices for real-time monitoring is proposed. The different components of the system are programmed properly and the interconnection between them is designed to minimize energy consumption. Wireless sensor nodes measure soil moisture and soil temperature in the field and transmit the information to a base station. If the conditions are optimal for a disease or pest to occur, a drone flies towards the area. When the drone is over the node, pictures are captured and then it returns to the base station for further processing. The feasibility of the system is examined through experimentation in a realistic scenario.


Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 111 ◽  
Author(s):  
Daniel Oliveira ◽  
Miguel Costa ◽  
Sandro Pinto ◽  
Tiago Gomes

Undeniably, the Internet of Things (IoT) ecosystem continues to evolve at a breakneck pace, exceeding all growth expectations and ubiquity barriers. From sensor to cloud, this giant network keeps breaking technological bounds in several domains, and wireless sensor nodes (motes) are expected to be predominant as the number of IoT devices grows towards the trillions. However, their future in the IoT ecosystem still seems foggy, where several challenges, such as (i) device’s connectivity, (ii) intelligence at the edge, (iii) security and privacy concerns, and (iv) growing energy needs, keep pulling in opposite directions. This prospective paper offers a succinct and forward-looking review of recent trends, challenges, and state-of-the-art solutions of low-end IoT motes, where reconfigurable computing technology plays a key role in tomorrow’s IoT devices.


Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1195 ◽  
Author(s):  
Gaurav Pathak ◽  
Jairo Gutierrez ◽  
Saeed Ur Rehman

The Internet of things (IoT) has revolutionized the use of connectivity and has given birth to new transmission technologies to satisfy the requirements of diverse IoT applications. Low powered wide area networks (LPWAN) is one of those transmission technologies, and is becoming exceptionally useful for IoT applications. The nodes use energy-efficient mechanisms for long-range data transmission (10–20 km), lasting in hostile environments for years and making them suitable for IoT applications such as environmental monitoring, automated billing systems, smart homes, smart offices, and patient monitoring. However, LPWAN devices have minimal resources, which makes it challenging to provide promising security to devices and data in the network. In this paper, we discuss the security mechanisms used in current LPWAN technologies along with their vulnerabilities and possible attacks on them. A detailed literature review is conducted on existing solutions on the security of constrained IoT networks similar to LPWAN using different networking frameworks. The reviewed literature is then compared based on various network security measures addressed by them. In addition, the emergence of software defined network (SDN) architecture for security in IoT is explained based on literature. Finally, the applicability of SDN in LPWAN security, its opportunities, and challenges in implementation are discussed.


Author(s):  
Yash Choudhary ◽  
B Umamaheswari ◽  
Vijeta Kumawat

IoT or the Internet of things refers to all the physical devices connected to the internet. IoT consists of computing devices that are web-enabled and have the capability of sensing, collecting, and sending data. IoT provides the ability to remote control appliances and has many more applications. Since IoT is becoming a big part of society, it is necessary to ensure that these devices provide adequate security measures. This paper discusses various security issues in IoT systems like threats, vulnerabilities and some countermeasures which can be used to provide some security. Developing a secure device is now more important than ever, as with the increase in digitization, much of a user’s data is available on these devices. Securing data is a primary concern in any system, as internet-enabled devices are easier to hack. The idea of this paper is to spread awareness and improve the security of IoT devices.


Author(s):  
G. Jaspher Willsie Kathrine ◽  
C. Willson Joseph

Wireless sensor network (WSN) comprises sensor nodes that have the capability to sense and compute. Due to their availability and minimal cost compared to traditional networks, WSN is used broadly. The need for sensor networks increases quickly as they are more likely to experience security attacks. There are many attacks and vulnerabilities in WSN. The sensor nodes have issues like limited resources of memory and power and undependable communication medium, which is further complicated in unattended environments, secure communication, and data transmission issues. Due to the complexity in establishing and maintaining the wireless sensor networks, the traditional security solutions if implemented will prove to be inefficient for the dynamic nature of the wireless sensor networks. Since recent times, the advance of smart cities and everything smart, wireless sensor nodes have become an integral part of the internet of things and their related paradigms. This chapter discusses the known attacks, vulnerabilities, and countermeasures existing in wireless sensor networks.


Sensors ◽  
2019 ◽  
Vol 19 (22) ◽  
pp. 4983 ◽  
Author(s):  
Ramiro Utrilla ◽  
Roberto Rodriguez-Zurrunero ◽  
Jose Martin ◽  
Alba Rozas ◽  
Alvaro Araujo

The increase in the number of mobile and Internet of Things (IoT) devices, along with the demands of new applications and services, represents an important challenge in terms of spectral coexistence. As a result, these devices are now expected to make an efficient and dynamic use of the spectrum, and to provide processed information instead of simple raw sensor measurements. These communication and processing requirements have direct implications on the architecture of the systems. In this work, we present MIGOU, a wireless experimental platform that has been designed to address these challenges from the perspective of resource-constrained devices, such as wireless sensor nodes or IoT end-devices. At the radio level, the platform can operate both as a software-defined radio and as a traditional highly integrated radio transceiver, which demands less node resources. For the processing tasks, it relies on a system-on-a-chip that integrates an ARM Cortex-M3 processor, and a flash-based FPGA fabric, where high-speed processing tasks can be offloaded. The power consumption of the platform has been measured in the different modes of operation. In addition, these hardware features and power measurements have been compared with those of other representative platforms. The results obtained confirm that a state-of-the-art tradeoff between hardware flexibility and energy efficiency has been achieved. These characteristics will allow for the development of appropriate solutions to current end-devices’ challenges and to test them in real scenarios.


2019 ◽  
Vol 8 (4) ◽  
pp. 3712-3715

Nowadays, the Internet of Things (IoT) has been used widely in our daily day to day life, starting from health care devices, hospital management appliances to a smart city. Most of the IoT devices have limited resources and limited storing capability. All the sensed information must have to be transmitted and to store in the cloud. To make a decision and for making analysis all the data stored in the cloud has to be retrieved. Making certain the credibility and security of the sensed information are much necessary and very important for the use of IoT devices. We tend to examine the proposed technique to be much secure than the existing one. In IoT, if the security is not ensured, then it may result in a variety of unsought issues. This survey resembles the overall safety aspects of IoT and debates the overall issues in the security of IoT.


Sign in / Sign up

Export Citation Format

Share Document