scholarly journals Biometrics for Internet-of-Things Security: A Review

Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6163
Author(s):  
Wencheng Yang ◽  
Song Wang ◽  
Nor Masri Sahri ◽  
Nickson M. Karie ◽  
Mohiuddin Ahmed ◽  
...  

The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.

2022 ◽  
pp. 148-175
Author(s):  
Anish Khan ◽  
Dragan Peraković

The internet of things is a cutting-edge technology that is vulnerable to all sorts of fictitious solutions. As a new phase of computing emerges in the digital world, it intends to produce a huge number of smart gadgets that can host a wide range of applications and operations. IoT gadgets are a perfect target for cyber assaults because of their wide dispersion, availability/accessibility, and top-notch computing power. Furthermore, as numerous IoT devices gather and investigate private data, they become a gold mine for hostile actors. Hence, the matter of fact is that security, particularly the potential to diagnose compromised nodes, as well as the collection and preservation of testimony of an attack or illegal activity, have become top priorities. This chapter delves into the timeline and the most challenging security and privacy issues that exist in the present scenario. In addition to this, some open issues and future research directions are also discussed.


2017 ◽  
Vol 2017 ◽  
pp. 1-41 ◽  
Author(s):  
Mohamed Amine Ferrag ◽  
Leandros A. Maglaras ◽  
Helge Janicke ◽  
Jianmin Jiang ◽  
Lei Shu

In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.


2020 ◽  
Vol 17 (1) ◽  
pp. 115-121 ◽  
Author(s):  
Soram Ranbir Singh ◽  
Khan Kumar Ajoy

With the advancements in wireless internet technology, a new computing ecosystem, the Internet of Things(IoT), has ushered in numerous devices in many areas in our life as well as in industries. The IoT is a computing notion that describes a scenario in which objects we use everyday are accessible using the internet and can be controlled from anywhere (Kung, Y.F., et al., 2018. Home Monitoring System Based Internet of Things. 2018 IEEE International Conference on Applied System Invention (ICASI), April; IEEE. pp.325–327; Singh, S. and Singh, N., 2015. Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE. pp.1577–1581). It could comprise devices with sensors to gather and broadcast data over the Internet (Singh, S. and Singh, N., 2015. Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE. pp.1577–1581). As per report of the research firm Gartner, the number of IoT objects will surpass 11.2 billion by 2018, and 20.4 billion by 2020. By 2020, the IoT industries will make revenue of almost 3 trillion US Dollars. As IoT devices are largely used in various areas of importance, it will definitely bring a lot of interests to hackers. It is worthwhile to quote here that hackers took away more than Rs 78 crore by hacking into router of Cosmos Bank based in Pune by duplicating debit cards in August, 2018. They carried out about 12 thousand unethical transactions worth Rs 78 crore in 28 countries. Hence, it is necessary to consider data privacy so that we can protect the data with limited system resource and technology. This paper proposes a new key management scheme with entity authentication for IoT devices. The proposed scheme uses modified Tate pairing. The presented scheme is apposite for IoT devices such as sensor networks due to their lower computational requirements.


Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2647
Author(s):  
Stefan Balogh ◽  
Ondrej Gallo ◽  
Roderik Ploszek ◽  
Peter Špaček ◽  
Pavol Zajac

Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.


2021 ◽  
Author(s):  
Mehdia Ajana El Khaddar

The Internet of Things (IoT), along with its wider variants including numerous technologies, things, and people: the Internet of Everything (IoE) and the Internet of Nano Things (IoNT), are considered as part of the Internet of the future and ubiquitous computing allowing the communication among billions of smart devices and objects, and have recently drawn a very significant research attention. In these approaches, there are varieties of heterogeneous devices empowered by new capabilities and interacting with each other to achieve specific applications in different domains. A middleware layer is therefore required to abstract the physical layer details of the smart IoT devices and ease the complex and challenging task of developing multiple backend applications. In this chapter, an overview of IoT technologies, architecture, and main applications is given first and then followed by a comprehensive survey on the most recently used and proposed middleware solutions designed for IoT networks. In addition, open issues in IoT middleware design and future works in the field of middleware development are highlighted.


2019 ◽  
Vol 8 (3) ◽  
pp. 7917-7921

With the advent of smart devices, a huge paradigm shift is observed in the way the users define service quality. Further, these devices or Internet of Things (IoT) devices as they are generally addressed, have acted as catalyst for comfort and connectivity and are building blocks of Smart City environment. With limited thought related to security is involved during the deployment of such devices, they offer a dangerous environment of opportunity to the attackers from the internet; which not only jeopardize network security, bus also the privacy of the users. Hence, it is of utmost importance to address the security concerns in smart city environment. This paper attempts to study the current IoT technologies deployed in a smart-city environment along with its vulnerabilities and possible solutions to improve IoT security. An approach is made to study the various vulnerabilities available with the IoT devices deployed in the smart city setup, various motivation of an attacker and the analyse some of the recent attacks witnessed by IoT devices. A few possible solutions for mitigation are suggested in this paper. The findings of the paper can be implemented in any network of IoT devices


2018 ◽  
Vol 2 (2) ◽  
pp. 10 ◽  
Author(s):  
Hany Atlam ◽  
Robert Walters ◽  
Gary Wills

With the rapid growth of Internet of Things (IoT) applications, the classic centralized cloud computing paradigm faces several challenges such as high latency, low capacity and network failure. To address these challenges, fog computing brings the cloud closer to IoT devices. The fog provides IoT data processing and storage locally at IoT devices instead of sending them to the cloud. In contrast to the cloud, the fog provides services with faster response and greater quality. Therefore, fog computing may be considered the best choice to enable the IoT to provide efficient and secure services for many IoT users. This paper presents the state-of-the-art of fog computing and its integration with the IoT by highlighting the benefits and implementation challenges. This review will also focus on the architecture of the fog and emerging IoT applications that will be improved by using the fog model. Finally, open issues and future research directions regarding fog computing and the IoT are discussed.


Author(s):  
Maha Saadeh ◽  
Azzam Sleit ◽  
Khair Eddin Sabri ◽  
Wesam Almobaideen

Internet of Things (IoT) is considered as the future of the Internet that connects billions of objects all together. Trusted communication between these objects is a crucial requirement for the wide deployment of IoT services. Consequently, effective authentication procedures should be applied between the communicating objects. This paper provides a comprehensive survey of object authentication in the IoT. The survey aims to direct future researchers in the field of IoT object authentication by delving into the details of authentication schemes and going through different comparisons. Comparisons are based on various criteria which include authentication process characteristics, the underlying architecture, key generation and distribution techniques, supporting IoT challenges, security analysis, and performance evaluation. Additionally, this survey highlights the main issues and challenges of IoT objects authentication and recommends future research directions.


Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3459
Author(s):  
Yuhong Li ◽  
Xiang Su ◽  
Aaron Yi Ding ◽  
Anders Lindgren ◽  
Xiaoli Liu ◽  
...  

The Internet of Things (IoT) connects smart devices to enable various intelligent services. The deployment of IoT encounters several challenges, such as difficulties in controlling and managing IoT applications and networks, problems in programming existing IoT devices, long service provisioning time, underused resources, as well as complexity, isolation and scalability, among others. One fundamental concern is that current IoT networks lack flexibility and intelligence. A network-wide flexible control and management are missing in IoT networks. In addition, huge numbers of devices and large amounts of data are involved in IoT, but none of them have been tuned for supporting network management and control. In this paper, we argue that Software-defined Networking (SDN) together with the data generated by IoT applications can enhance the control and management of IoT in terms of flexibility and intelligence. We present a review for the evolution of SDN and IoT and analyze the benefits and challenges brought by the integration of SDN and IoT with the help of IoT data. We discuss the perspectives of knowledge-driven SDN for IoT through a new IoT architecture and illustrate how to realize Industry IoT by using the architecture. We also highlight the challenges and future research works toward realizing IoT with the knowledge-driven SDN.


Sign in / Sign up

Export Citation Format

Share Document