scholarly journals VerificationTalk: A Verification and Security Mechanism for IoT Applications

Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7449
Author(s):  
Min-Zheng Shieh ◽  
Yi-Bing Lin ◽  
Yin-Jui Hsu

An Internet of Things (IoT) application typically involves implementations in both the device domain and the network domain. In this two-domain environment, it is possible that application developers implement the wrong network functions and/or connect some IoT devices that should never be linked, which result in the execution of wrong operations on network functions. To resolve these issues, we propose the VerificationTalk mechanism to prevent inappropriate IoT application deployment. VerificationTalk consists of two subsystems: the BigraphTalk subsystem which verifies IoT device configuration; and AFLtalk which validates the network functions. VerificationTalk provides mechanisms to conduct online anomaly detection by using a runtime monitor and offline by using American Fuzzy Lop (AFL). The runtime monitor is capable of intercepting potentially harmful data targeting IoT devices. When VerificationTalk detects errors, it provides feedback for debugging. VerificationTalk also assists in building secure IoT applications by identifying security loopholes in network applications. By the appropriate design of the IoTtalk execution engine, the testing capacity of AFLtalk is three times that of traditional AFL approaches.

Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2019 ◽  
Vol 2019 ◽  
pp. 1-19 ◽  
Author(s):  
Zeeshan Ali Khan ◽  
Peter Herrmann

Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.


Author(s):  
Mamata Rath ◽  
Bibudhendu Pati

Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1925
Author(s):  
Soe Ye Yint Tun ◽  
Samaneh Madanian ◽  
Dave Parry

The elderly population is increasing globally, putting more pressure on aged care and public health systems. To address this issue and help increase the independence of older people, different digital technologies, including the Internet of things (IoT), can play an important role. Although there has been an increase in the number of studies in this field, most of them concentrate on IoT applications in elderly care from a technology perspective, with very little contribution from the clinical side. Therefore, this paper aims to investigate and identify the available IoT applications and their clinical utility for common diseases in elderly people. The results of this study could be useful for information technology professionals in developing and understanding the clinical requirements for IoT applications in healthcare for older people. Clinicians will also be informed about the clinical possibilities of using IoT devices in this area. Based on our findings, future research should focus on enhancing the clinical utility of current IoT applications in different settings and on developing new applications to support practitioners and older people.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6846
Author(s):  
Ngoc-Thanh Dinh ◽  
Young-Han Kim

Existing caching mechanisms considers content objects individually without considering the semantic correlation among content objects. We argue that this approach can be inefficient in Internet of Things due to the highly redundant nature of IoT device deployments and the data accuracy tolerance of IoT applications. In many IoT applications, an approximate answer is acceptable. Therefore, a cache of an information object having a high semantic correlation with the requested information object can be used instead of a cache of the exact requested information object. In this case, caching both of the information objects can be inefficient and redundant. This paper proposes a caching retrieval scheme which considers the semantic information correlation of information objects of nodes for cache retrieval. We illustrate the benefits of considering the semantic information correlation in caching by studying IoT data caching at the edge. Our experiments and analysis show that semantic correlated caching can significantly improve the efficiency, cache hit, and reduce the resource consumption of IoT devices.


2018 ◽  
Vol 38 (1) ◽  
pp. 121-129 ◽  
Author(s):  
Pablo Antonio Pico Valencia ◽  
Juan A. Holgado-Terriza ◽  
Deiver Herrera-Sánchez ◽  
José Luis Sampietro

Recently, the scientific community has demonstrated a special interest in the process related to the integration of the agent-oriented technology with Internet of Things (IoT) platforms. Then, it arises a novel approach named Internet of Agents (IoA) as an alternative to add an intelligence and autonomy component for IoT devices and networks. This paper presents an analysis of the main benefits derived from the use of the IoA approach, based on a practical point of view regarding the necessities that humans demand in their daily life and work, which can be solved by IoT networks modeled as IoA infrastructures. It has been presented 24 study cases of the IoA approach at different domains ––smart industry, smart city and smart health wellbeing–– in order to define the scope of these proposals in terms of intelligence and autonomy in contrast to their corresponding generic IoT applications.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 1083-1086

In recent years everything is connected and passing through the internet, but Internet of Things (IOT), which will change all aspects of our lives and future. While the things are connected to the internet, they will generate the huge amount of information which has to be processed. The information that gathered from various IoT devices has to be recognized and organized according to the environments of their type. To recognize and organize the data gathered from different things, the important task to be played is making things passing through different Data Mining Techniques (DMT). In this article, we mainly focus on analysis of various Data Mining Techniques over the data that has been generated by the IOT Devices which are connected over the internet using DBSCAN Technique. And also performed review over different Data Mining Techniques for Data Analysis


Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 3047
Author(s):  
Kolade Olorunnife ◽  
Kevin Lee ◽  
Jonathan Kua

Recent years have seen the rapid adoption of Internet of Things (IoT) technologies, where billions of physical devices are interconnected to provide data sensing, computing and actuating capabilities. IoT-based systems have been extensively deployed across various sectors, such as smart homes, smart cities, smart transport, smart logistics and so forth. Newer paradigms such as edge computing are developed to facilitate computation and data intelligence to be performed closer to IoT devices, hence reducing latency for time-sensitive tasks. However, IoT applications are increasingly being deployed in remote and difficult to reach areas for edge computing scenarios. These deployment locations make upgrading application and dealing with software failures difficult. IoT applications are also increasingly being deployed as containers which offer increased remote management ability but are more complex to configure. This paper proposes an approach for effectively managing, updating and re-configuring container-based IoT software as efficiently, scalably and reliably as possible with minimal downtime upon the detection of software failures. The approach is evaluated using docker container-based IoT application deployments in an edge computing scenario.


2020 ◽  
Vol 10 (1) ◽  
pp. 1-10 ◽  
Author(s):  
Sanjay P. Ahuja ◽  
Nathan Wheeler

Fog computing has been rising in popularity over the last few years due in part to the many benefits that Fog confers upon Internet of Things (IoT) applications. Fog Computing extends the Cloud to the IoT devices. In this paper, the author explore IoT, Fog, and Cloud, as well as the benefits that are possible and have been realized by utilizing the 3 technologies in a 3-tier architecture. A reference architecture is provided, applications of the 3-tier architecture from the literature are discussed, and recommendations are made for future work.


Kybernetes ◽  
2019 ◽  
Vol 49 (10) ◽  
pp. 2509-2520
Author(s):  
Ibrahim Mashal ◽  
Osama Alsaryrah

Purpose Nowadays, there are various internet of things (IoT) applications covering many aspects of daily life. Many people own numerous smart objects that use these IoT applications. The purpose of this study is determining suitable IoT applications for each user which is a relevant challenge because it is amulti-criteria decision-making. Design/methodology/approach To solve this challenge, the authors propose fuzzy analytical hierarchy process model. Based on the opinions of IoT experts, the model and the hierarchy were designed to assess and compare three crucial IoT criteria, namely, object, application and providers. Findings The results indicated that the application criterion is far more relevant for users other than the two criteria. The findings of this study offer insights into more effective decision-making for IoT application developers and providers. Originality/value This study contributes to the IoT through proposing a fuzzy model to classify IoT applications. The findings provide meaningful implications for IoT application providers.


Sign in / Sign up

Export Citation Format

Share Document