scholarly journals VOCATIONAL SCHOOL LABORATORY ON THE BASIS OF CYBER SECURITY IN THE FIELD OF THE INTERNET OF THINGS (IOT)

Author(s):  
Э.Д. Алисултанова ◽  
Л.К. Хаджиева ◽  
М.З. Исаева

Данная статья посвящена созданию профориентационной (умной) лаборатории, которая призвана сформировать у школьников базовые представления о технологии Интернет вещей (IoT), угрозах кибербезопасности в этой сфере, мотивировать к получению в будущем профильного образования и построению карьеры в области обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. Обучение школьников в профориентационной лаборатории, построенное на основе применения интерактивных электронных образовательных ресурсов, прежде всего будет позиционировать карьерные возможности будущих специалистов в сфере обеспечения безопасности Интернет вещей (IoT) при функционировании умного производства. В рамках функционирования лаборатории особое внимание обучающихся сконцентрировано на тематиках правовых аспектов обеспечения кибербезопасности, главных тенденциях развития киберугроз в современном глобальном информационном пространстве и мерах, необходимых для их нейтрализации. This article is devoted to the creation of a career-oriented (smart) laboratory, which is designed to formulate in schoolchildren basic ideas about the Internet of Things (IoT) technology, cyber security threats in this area, motivate to receive specialized education in the future and build a career in the field of Internet things (IoT) security) with the functioning of smart manufacturing. The training of schoolchildren in a vocational guidance laboratory, based on the use of interactive electronic educational resources, will primarily position the career opportunities of future specialists in the field of Internet of Things (IoT) security in the operation of smart manufacturing. Within the framework of the functioning of the laboratory, special attention of students is concentrated on the topics of the legal aspects of ensuring cyber security, the main trends in the development of cyber threats in the modern global information space and the measures necessary to neutralize them.

The Internet of Things (IoT) has been growing to market from the past several years with great potential. Many several devices have been now available in the market based on IoT, which enables it to connect with your smart phones or with any other kind of smart resources, and then that device is ready to perform smart work via the Internet. With the help of IoT, we are now able to make our devices connect with the internet and then can be operated from anywhere from the geo location as well as it can store and retrieve a large amount of data for better communication between the end-user and the device. IoT also has a wide range of applications that are being used on many platforms. However, this great technology also has to face many problems and among all the problems the main issue arises with its security aspects. The major concern on using IoT security is the hacker wants to enter into the large network system using a particular device as all the devices are connected over the network. Not only this, many other security threats and malware are also a major concern in IoT. So taking these security aspects as a major concern this research paper reviews several security issues and challenges that occur in IoT. As there in every field when it comes to cyber security for any kind of data, we need to follow CIA Security Triangle i.e., Confidentiality, Integrity, and Availability of data. CIA security triangle is the most important concept in terms of security and also must be taken into consideration in the IoT domain. Therefore, considering all these facts and reviewing some of the latest documents as well as researches in the field of IoT, this paper has been based on all the facts related to IoT security issues and its desirable solution which is needed to be done and should follow the security triangle to an extent.


Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


Author(s):  
Jonika Lamba ◽  
Esha Jain

Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.


Author(s):  
Md Alimul Haque ◽  
Shameemul Haque ◽  
Kailash Kumar ◽  
Narendra Kumar Singh

The role of the internet of things (IoT) and cyberspace in a digital society is well recognized, and they have become tremendously popular due to certain features like the ability to ease the operational process of businesses and instant communication. Recent developments in the fields of wireless communication networks like 4G, 5G, and 6G with IoT applications have greatly benefited human welfare. Still, the rapid growth of various IoT applications focuses on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. It has also contributed to unethical practices by hackers who use new tools and techniques to penetrate more complex or well-controlled environments and produce increased damage and even remain under the cover. The main objective of this chapter is to improve understanding of the challenges to secure future digital infrastructure while it is still evolving. In this context, a detailed review of the security-related issues, challenges, threats, and countermeasures in the IoT applications is presented.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


Author(s):  
Praveen Pandey

Abstract: Cyber security are techniques generally set forth in published materials that attempt to safeguard the cyber environment of a user or organization. It manages the set of techniques used to save the integrity of networks, programs and data from unauthorized access. It refers to the body of technologies, processes, and it may also be referred to as information technology security. The field is of growing importance due to increasing reliance on computer systems, including smart phones, televisions and the various tiny devices that constitute the Internet of Things. Keywords: IT security, Internet of things (IOT)


Author(s):  
Yusuf Perwej ◽  
Firoj Parwej ◽  
Mumdouh Mirghani Mohamed Hassan ◽  
Nikhat Akhtar

Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s’ Internet wave connected 1.2 billion subscribers while the 2000s’ mobile wave connected another 2.4 billion. Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid, and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast across several industry verticals along with increases in the number of interconnected devices and diversify of IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many challenges to overcome. The Internet of Things combines actual and virtual anywhere and anytime, fascinate the attention of both constructor and hacker. Necessarily, leaving the devices without human interference for a long period could lead to theft and IoT incorporates many such things. In this paper, we are briefly discussing technological perspective of Internet of Things security. Because, the protection was a major concern when just two devices were coupled. In this context, security is the most significant of them. Today scenario, there are millions of connected devices and billions of sensors and their numbers are growing. All of them are expected secure and reliable connectivity. Consequently, companies and organizations adopting IoT technologies require well-designed security IoT architectures.


Author(s):  
М.А. Держо ◽  
М.М. Лаврентьев ◽  
А.В. Шафаренко

В данной работе обсуждаются фундаментальные вопросы разработки программ магистратуры в области Интернета вещей (Internet of Things — IoT). Мы кратко сравниваем предложения Сколтеха и Стэнфорда и утверждаем, что наиболее гибкое решение достигается посредством вводного блока и четырех параллельных потоков учебных курсов: обработка сигналов и управление, обучение машин и искусственный интеллект (ИИ), программирование и схемотехника платформ с применением микроконтроллеров, и, наконец, сети и кибербезопасность. Вводный блок предполагается оснастить достаточным количеством предметов по выбору, чтобы поступающие выпускники бакалавриата из областей прикладной математики, информационных технологий и электроники/телекоммуникаций могли приобрести необходимые знания для освоения потоковых курсов. Мы утверждаем, что еще одним необходимым отличием программы IoT должен явиться междисциплинарный групповой дипломный проект значительного объема, также основанный на потоковых курсах. This paper discusses the fundamentals of postgraduate curriculum development for the area of the Internet of Things (IoT). We provide a brief contrasting analysis of Skoltech and Stanford Masters programs and argue that the most flexible way forward is via the introduction of a leveling-off, elective introductory stage, and four parallel course streams: signal processing and control; Artificial Intelligence (AI), and machine learning; microcontroller systems design; and networks and cyber security. The leveling-off stage is meant to provide sufficient electives for graduates of applied math, Information Technologies (IT), or electronics/telecom degrees to learn the necessary fundamentals for the stream modules. We argue that another distinguishing feature of an IoT masters program is a large project drawing on the stream modules and requiring a multidisciplinary, team development effort.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 298 ◽  
Author(s):  
M Bhargavi ◽  
Dr M.Nagabhushana Rao

The Internet of Things (IoT) is a revolutionary model, with rising wireless sensor network technology. In IoT network devices are connected and communicated with each other or with human. IoT is extremely available to security assaults. In recent years, the internet of things has a continuous support in research. In the upcoming scenario, IoT will play an important role and changes our day-to-day life, principles as well as industry models. In this paper we provide ensuring security of data exchange, IoT architecture and IoT Security architecture, applications, drawbacks of IoT. We study about various security issues, Problems, normal and Denial of service attacks in different layers, issues and research defy in IoT are also discussed.   


Sign in / Sign up

Export Citation Format

Share Document