scholarly journals Authentication with What You See and Remember in the Internet of Things

Symmetry ◽  
2018 ◽  
Vol 10 (11) ◽  
pp. 537 ◽  
Author(s):  
Wayne Chiu ◽  
Chunhua Su ◽  
Chuan-Yen Fan ◽  
Chien-Ming Chen ◽  
Kuo-Hui Yeh

The Internet-of-Things (IoT) is an emerging paradigm seamlessly integrating a great number of smart objects ubiquitously connected to the Internet. With the rise in interest in the IoT, industry and academia have introduced a variety of authentication technologies to deal with security challenges. Authentication in IoT involves not only shifting intelligent access control down to the end smart objects, but also user identification and verification. In this paper, we build an authentication system based on brainwave reactions to a chain of events. Brainwaves, as external signals of a functioning brain, provide a glimpse into how we think and react. However, seen another way, we could reasonably expect that a given action or event could be linked back to its corresponding brainwave reaction. Recently, commercial products in the form of wearable brainwave headsets have appeared on the market, opening up the possibility of exploiting brainwaves for various purposes and making this more feasible. In the proposed system, we use a commercially available brainwave headset to collect brainwave data from participants for use in the proposed authentication system. After the brainwave data collection process, we apply a machine learning-based approach to extract features from brainwaves to serve as authentication tokens in the system and support the authentication system itself.

2019 ◽  
Vol 1 (2) ◽  
pp. 16 ◽  
Author(s):  
Deepak Choudhary

The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and household settings. As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems. New security issues arise through the heterogeneity  of  IoT  applications and devices and their large-scale deployment.


2017 ◽  
Vol 129 ◽  
pp. 444-458 ◽  
Author(s):  
Ibrar Yaqoob ◽  
Ejaz Ahmed ◽  
Muhammad Habib ur Rehman ◽  
Abdelmuttlib Ibrahim Abdalla Ahmed ◽  
Mohammed Ali Al-garadi ◽  
...  

Author(s):  
Elodie Attié ◽  
Lars Meyer-Waarden

The internet of things, or the IoT, is progressively and surely invading environments, and is consequently creating new kinds of consumer needs and behaviors. More and more companies are getting involved in this growing field, showing the importance for them to understand this technology market. This chapter aims at studying the acceptance process of the IoT. More specifically, the main factors that influence consumer decisions to accept and use the IoT and smart objects have been tested, such as the ethical, wellbeing, social, and utility values. The importance of each benefit is demonstrated, according to specific targets and to examples of applications. A system of values that represents the promises of the IoT and the central needs of users is also described. Besides, a typology of users should help companies creating or refining targeting strategies and should guide consumers into their acceptance process. Finally, further research directions are discussed.


Author(s):  
Mohammad Tariq Banday

The chapter discusses various security challenges in the design of the internet of things and their possible solutions. After presenting a precise introduction to the internet of things, its applications, and technologies enabling it, the chapter discusses its various architectures and models which follow with an introduction of development kits, boards, platforms, hardware, software, and devices used in the internet of things. A concise explanation and discussion on the internet of things standards and protocols with emphasis on their security is presented. Next, various possible security threats and attacks to the internet of things are presented. The subsequent sections of the chapter discuss identified security challenges at individual layers of various models along with their possible solutions. It further presents cryptographic and lightweight cryptographic primitives for the internet of things, existing use of cryptography in the internet of things protocols, security challenges, and its prospectus.


Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


2018 ◽  
Vol 7 (4.36) ◽  
pp. 700
Author(s):  
N. Koteswara Rao ◽  
Gandharba Swain

The proliferation of smart objects with capability of sensing, processing and communication has grown in recent years. In this scenario, the Internet of Things (IoT) connects these objects to the Internet and provides communication with users and devices. IoT enables a huge amount of new applications, with which academics and industries can benefit, such as smart cities, health care and automation. In this environment, compose of constrained devices, the widespread adoption of this paradigm depends of security requirements like secure communication between devices, privacy and anonymity of its users. This paper presents the main security challenges and solutions to provide authentication and authorization on the Internet of Things. 


Symmetry ◽  
2018 ◽  
Vol 10 (12) ◽  
pp. 669 ◽  
Author(s):  
Daniel Díaz López ◽  
María Blanco Uribe ◽  
Claudia Santiago Cely ◽  
Daniel Tarquino Murgueitio ◽  
Edwin Garcia Garcia ◽  
...  

Undoubtedly, the adoption of the Internet of Things (IoT) paradigm has impacted on our every-day life, surrounding us with smart objects. Thus, the potentialities of this new market attracted the industry, so that many enterprises developed their own IoT platforms aiming at helping IoT services’ developers. In the multitude of possible platforms, selecting the most suitable to implement a specific service is not straightforward, especially from a security perspective. This paper analyzes some of the most prominent proposals in the IoT platforms market-place, performing an in-depth security comparison using five common criteria. These criteria are detailed in sub-criteria, so that they can be used as a baseline for the development of a secure IoT service. Leveraging the knowledge gathered from our in-depth study, both researchers and developers may select the IoT platform which best fits their needs. Additionally, an IoT service for monitoring commercial flights is implemented in two previously analyzed IoT platforms, giving an adequate detail level to represent a solid guideline for future IoT developers.


Sign in / Sign up

Export Citation Format

Share Document