scholarly journals Security Requirements for the Internet of Things: A Systematic Approach

Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5897
Author(s):  
Shantanu Pal ◽  
Michael Hitchens ◽  
Tahiry Rabehaja ◽  
Subhas Mukhopadhyay

There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.

2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Author(s):  
Awad Saad Al-Qahtani, Mohammad Ayoub Khan Awad Saad Al-Qahtani, Mohammad Ayoub Khan

The Internet of things (IOT) users lack awareness of IOT security infrastructure to handle the risks including Threats, attack and penetration associated with its use. IOT devices are main targets for cyber-attacks due to variable personally identifiable information (PII) stored and transmit in the cyber centers. The security risks of the Internet of Things aimed to damage user's security and privacy. All information about users can be collected from their related objects which are stored in the system or transferred through mediums among diverse smart objects and may exposed to exposed dangerous of attacks and threats if it lack authentication so there are essential need to make IOT security requirements as important part of its efficient implementation. These requirements include; availability, accountability, authentication, authorization, privacy and confidentiality, Integrity and Non-repudiation. The study design is a survey research to investigate the visibility of the proposed model of security management for IOT uses, the security risks of IOT devices, and the changes IOT technology on the IT infrastructure of IOT users through answering of the research questionnaires. This work proposes a model of security management for IOT to predict IOT security and privacy threats, protect IOT users from any unforeseen dangers, and determine the right security mechanisms and protocols for IOT security layers, as well as give the most convenient security mechanisms. Moreover, for enhancing the performance of IOT networks by selecting suitable security mechanisms for IOT layers to increase IOT user's security satisfaction.


2020 ◽  
Author(s):  
Deekshaa Khanna

Technology is evolving rapidly, and cheaper and smaller devices that vary in size, computational power using cloud technologies or operating mode become available. These devices are always connected to form a network in order to enhance communication and data transmission. Such devices are largely referred to as smart devices e.g., smart homes, smart cities, smart cars, etc. that are connected to a complex infrastructure known as the Internet of things. Internet of Things generates a huge amount of data that poses significant challenges for processing and analysis. This research paper outlines various challenges and opportunities that are in the field of the Internet of Things.


2021 ◽  
Vol 22 (1) ◽  
pp. 13-28
Author(s):  
Mir Shahnawaz Ahmad ◽  
Shahid Mehraj Shah

The interconnection of large number of smart devices and sensors for critical information gathering and analysis over the internet has given rise to the Internet of Things (IoT) network. In recent times, IoT has emerged as a prime field for solving diverse real-life problems by providing a smart and affordable solutions. The IoT network has various constraints like: limited computational capacity of sensors, heterogeneity of devices, limited energy resource and bandwidth etc. These constraints restrict the use of high-end security mechanisms, thus making these type of networks more vulnerable to various security attacks including malicious insider attacks. Also, it is very difficult to detect such malicious insiders in the network due to their unpredictable behaviour and the ubiquitous nature of IoT network makes the task more difficult. To solve such problems machine learning techniques can be used as they have the ability to learn the behaviour of the system and predict the particular anomaly in the system. So, in this paper we have discussed various security requirements and challenges in the IoT network. We have also applied various supervised machine learning techniques on available IoT dataset to deduce which among them is best suited to detect the malicious insider attacks in the IoT network.


2020 ◽  
Author(s):  
Vinod Kumar Verma

BACKGROUND COVID- 19 pandemics has affected the life of every human being in this world dramatically. The daily routine of the human has been changed to an uncertain extent. Some of the people are affected by the COVID-19, and some of the people are in fear of this epidemic. This has completely changed the thorough process of the people, and now, they are looking for solutions of this pandemic at different levels of the human addressable areas. These areas include medicine, vaccination, precautions, psychology, technology-assisted solutions like information technology, etc. There is a need to think in the direction of technology compliant solutions in the era of COVID-19 pandemic. OBJECTIVE The objective of this paper is to discuss the existing views and focus on the recommendations for the enhancement in the current situation from COVID-19. METHODS Based on the literature, perceptions, challenges, and viewpoints, the following opinions are suggested to the research community for the prevention and elimination of global pandemic COVID-19. The research community irrespective of the discipline focus on the following: 1. The comprehensive thought process for the designing of the internet of things (IoT) based solutions for healthcare applications used in the prevention from COVID-19. 2. Strategies for restricting outbreak of COVID-19 with the emerging trends in Ehealthcare applications. Which should be the optimal strategy to deal with a global pandemic? 3. Explorations on the data analysis as derived from the advanced data mining and warehousing associated with IoT. Besides, cloud-based technologies can be incorporated for the global spread of healthcare-related information to serve the community of different countries in the world. 4. The most adaptable method and technology can be deployed for the development of innovative solutions for COVID-19 related people like smart, patient-centric healthcare information systems. 5. Implementation of smart solutions like wearable technology for mask and PPE along with their disposal can be considered to deal with a global epidemic like COVID-19. This will lead to the manufacturing and incorporation of wearable technologies in the healthcare sector by industries. 6. A Pervasive thought process can be standardized for dealing with global pandemic like COVID-19. In addition, research measures should be considered for the security and privacy challenges of IoT services carrying healthcare-related information. These areas and directions are diverse but, in parallel, the need for healthy bonding and correlation between the people like researchers and scientists irrespective of their discipline. The discipline may vary from medical, engineering, computing, finance, and management, etc. In addition, standard protocols and interoperability measures can be worked out for the exchange of information in the global pandemic situations. RESULTS Recommendations Discussed CONCLUSIONS In this paper, the opinions have been discussed in the multi-disciplinary areas of research like COVID-19 challenges, medicines and vaccines, precautionary measures, technology assistance, and the Internet of Things. These opinions and discussion serve as an integrated platform for researchers and scientists to think about future perspectives to deal with healthcare-related COVID-19 pandemic situation. This includes the original, significant, and visionary automation based ideas, innovations, scientific designs, and applications focusing on Inter-disciplinary technology compliant solutions like IoT, vaccinations, manufacturing, preventive measures, etc. for the improvement of efficiency and reliability of existing healthcare systems. For the future, there is dire need to strengthen the technology not only in the one area but also for the interdisciplinary areas to recover from the pandemic situation rapidly and serve the community.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


2021 ◽  
Vol 39 (4) ◽  
pp. 1-33
Author(s):  
Fulvio Corno ◽  
Luigi De Russis ◽  
Alberto Monge Roffarello

In the Internet of Things era, users are willing to personalize the joint behavior of their connected entities, i.e., smart devices and online service, by means of trigger-action rules such as “IF the entrance Nest security camera detects a movement, THEN blink the Philips Hue lamp in the kitchen.” Unfortunately, the spread of new supported technologies makes the number of possible combinations between triggers and actions continuously growing, thus motivating the need of assisting users in discovering new rules and functionality, e.g., through recommendation techniques. To this end, we present , a semantic Conversational Search and Recommendation (CSR) system able to suggest pertinent IF-THEN rules that can be easily deployed in different contexts starting from an abstract user’s need. By exploiting a conversational agent, the user can communicate her current personalization intention by specifying a set of functionality at a high level, e.g., to decrease the temperature of a room when she left it. Stemming from this input, implements a semantic recommendation process that takes into account ( a ) the current user’s intention , ( b ) the connected entities owned by the user, and ( c ) the user’s long-term preferences revealed by her profile. If not satisfied with the suggestions, then the user can converse with the system to provide further feedback, i.e., a short-term preference , thus allowing to provide refined recommendations that better align with the original intention. We evaluate by running different offline experiments with simulated users and real-world data. First, we test the recommendation process in different configurations, and we show that recommendation accuracy and similarity with target items increase as the interaction between the algorithm and the user proceeds. Then, we compare with other similar baseline recommender systems. Results are promising and demonstrate the effectiveness of in recommending IF-THEN rules that satisfy the current personalization intention of the user.


Author(s):  
Martin Victor K ◽  
J. Immanuel Johnraja ◽  
Getzi Jeba Leelipushpam ◽  
J. Jebaveerasingh Jebadurai ◽  
I. Bildass Santhosam

Sign in / Sign up

Export Citation Format

Share Document