scholarly journals POSSIBILITIES FOR PROVIDING AN INFORMATION SECURITY DURING RETRIEVAL OF NETWORK DATA

2019 ◽  
pp. 689-693
Author(s):  
Veselka Stoyanova

The Internet of Things (IoT) will connect not only computers and mobile devices, but it will also interconnect smart buildings, homes, and cities, as well as electrical grids, gas, and water networks, automobiles, airplanes, etc. IoT will lead to the development of a wide range of advanced information services that need to be processed in real-time and require data centers with large storage and computing power. In this paper, we present an IoT security framework for smart infrastructures such as Smart Homes (SH) and smart buildings (SB). I also present a general threat model that can be used to develop a security protection methodology for IoT services against cyber-attacks (known or unknown).

Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 3036
Author(s):  
German Cano-Quiveu ◽  
Paulino Ruiz-de-clavijo-Vazquez ◽  
Manuel J. Bellido ◽  
Jorge Juan-Chico ◽  
Julian Viejo-Cortes ◽  
...  

The Internet of Things (IoT) security is one of the most important issues developers have to face. Data tampering must be prevented in IoT devices and some or all of the confidentiality, integrity, and authenticity of sensible data files must be assured in most practical IoT applications, especially when data are stored in removable devices such as microSD cards, which is very common. Software solutions are usually applied, but their effectiveness is limited due to the reduced resources available in IoT systems. This paper introduces a hardware-based security framework for IoT devices (Embedded LUKS) similar to the Linux Unified Key Setup (LUKS) solution used in Linux systems to encrypt data partitions. Embedded LUKS (E-LUKS) extends the LUKS capabilities by adding integrity and authentication methods, in addition to the confidentiality already provided by LUKS. E-LUKS uses state-of-the-art encryption and hash algorithms such as PRESENT and SPONGENT. Both are recognized as adequate solutions for IoT devices being PRESENT incorporated in the ISO/IEC 29192-2:2019 for lightweight block ciphers. E-LUKS has been implemented in modern XC7Z020 FPGA chips, resulting in a smaller hardware footprint compared to previous LUKS hardware implementations, a footprint of about a 10% of these LUKS implementations, making E-LUKS a great alternative to provide Full Disk Encryption (FDE) alongside authentication to a wide range of IoT devices.


2021 ◽  
pp. 18-26
Author(s):  
Navod Neranjan Thilakarathne ◽  
◽  
◽  
◽  
N.T .. ◽  
...  

The rapid growth of Information and Communication Technology (ICT) in the 21st century has resulted in the emergence of a novel technological paradigm; known as the Internet of Things, or IoT. The IoT, which is at the heart of today's smart infrastructure, aids in the creation of a ubiquitous network of things by simplifying interconnection between smart digital devices and enabling Machine to Machine (M2M) communication. As of now, there are numerous examples of IoT use cases available, assisting every person in this world towards making their lives easier and more convenient. The latest advancement of IoT in a variety of domains such as healthcare, smart city, smart agriculture has led to an exponential growth of cyber-attacks that targets these pervasive IoT environments, which can even lead to jeopardizing the lives of people; that is involved with it. In general, this IoT can be considered as every digital object that is connected to the Internet for intercommunication. Hence in this regard to analyze cyber threats that come through the Internet, here we are doing an experimental evaluation to analyze the requests, received to exploit the opened Secure Shell (SSH) connection service of an IoT device, which in our case a Raspberry Pi devices, which connected to the Internet for more than six consecutive days. By opening the SSH service on Raspberry Pi, it acts as a Honeypot device where we can log and retrieve all login attempt requests received to the SSH service opened. Inspired by evaluating the IoT security attacks that target objects in the pervasive IoT environment, after retrieving all the login requests made through the open SSH connection we then provide a comprehensive analysis along with our observations about the origin of the requests and the focus areas of intruders; in this study.


Sensors ◽  
2019 ◽  
Vol 19 (18) ◽  
pp. 4038 ◽  
Author(s):  
Ion Bica ◽  
Bogdan-Cosmin Chifor ◽  
Ștefan-Ciprian Arseni ◽  
Ioana Matei

Ambient intelligence is a new paradigm in the Internet of Things (IoT) world that brings smartness to living environments to make them more sensitive; adaptive; and personalized to human needs. A critical area where ambient intelligence can be used is health and social care; where it can improve and sustain the quality of life without increasing financial costs. The adoption of this new paradigm for health and social care largely depends on the technology deployed (sensors and wireless networks), the software used for decision-making and the security, privacy and reliability of the information. IoT sensors and wearables collect sensitive data and must respond in a near real-time manner to input changes. An IoT security framework is meant to offer the versatility and modularization needed to sustain such applications. Our framework was designed to easily integrate with different health and social care applications, separating security tasks from functional ones and being designed with independent modules for each layer (Cloud, gateway and IoT device), that offer functionalities relative to that layer.


2021 ◽  
Vol 23 (06) ◽  
pp. 767-774
Author(s):  
Niveditha. V.K ◽  
◽  
Dr. Kiran. V ◽  
Avinash Pathak ◽  
◽  
...  

The fast evolution pace of various technologies such as the Internet of Things (IoT), Cloud Computing and the world moving towards digitalization created an increased need for data centers than ever before. Data centers support a wide range of internet services, including web hosting, e-commerce, and social networking. In recent years huge data centers have been owned and run by tech giants like Google, Facebook, Microsoft, etc., and these firms are known as Hyper-scalers. Hyper-scalers are the next big thing, ready to fundamentally alter the internet world for data storage through a variety of services supplied by them across all technological domains. The tool for automatic software upgrade focuses on having a seamless upgrade for the devices in the datacenters mainly in huge data centers owned by the hyper-scalers. This paper mainly focuses on the technologies used in developing the tool for automatic software upgrade, an overview of how the tool is developed, and its features. By deploying this tool in the datacenters, it supports them in delivering more efficient services.


Author(s):  
Anand Mohan

The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-tocomputer interaction. It is an ambiguous term, but it is fast becoming a tangible technology that can be applied in data centers to collect information on just about anything that IT wants to control. IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS), microservices and the internet. The convergence has helped tear down the silo walls between operational technology (OT) and information technology (IT), allowing unstructured machine-generated data to be analyzed for insights that will drive improvements. The Internet of Things (IoT) is essentially a system of machines or objects outfitted with data-collecting technologies so that those objects can communicate with one another. The machineto-machine (M2M) data that is generated has a wide range of uses, but is commonly seen as a way to determine the health and status of things -- inanimate or living.


2018 ◽  
Vol 2018 ◽  
pp. 1-21 ◽  
Author(s):  
Pablo Salva-Garcia ◽  
Jose M. Alcaraz-Calero ◽  
Qi Wang ◽  
Jorge Bernal Bernabe ◽  
Antonio Skarmeta

Internet of Things (IoT) is a key business driver for the upcoming fifth-generation (5G) mobile networks, which in turn will enable numerous innovative IoT applications such as smart city, mobile health, and other massive IoT use cases being defined in 5G standards. To truly unlock the hidden value of such mission-critical IoT applications in a large scale in the 5G era, advanced self-protection capabilities are entailed in 5G-based Narrowband IoT (NB-IoT) networks to efficiently fight off cyber-attacks such as widespread Distributed Denial of Service (DDoS) attacks. However, insufficient research has been conducted in this crucial area, in particular, few if any solutions are capable of dealing with the multiple encapsulated 5G traffic for IoT security management. This paper proposes and prototypes a new security framework to achieve the highly desirable self-organizing networking capabilities to secure virtualized, multitenant 5G-based IoT traffic through an autonomic control loop featured with efficient 5G-aware traffic filtering. Empirical results have validated the design and implementation and demonstrated the efficiency of the proposed system, which is capable of processing thousands of 5G-aware traffic filtering rules and thus enables timely protection against large-scale attacks.


Author(s):  
K. A. Varun Kumar ◽  
D. Arivudainambi

<p>Software defined data centers (SDDC) and software defined networking (SDN) are two emerging areas in the field of cloud data centers. SDN based centrally controlled services takes a global view of the entire cloud infrastructure between SDDC and SDN, whereas Network Function Virtualization (NFV) is widely used for providing virtual networking between host and Internet Service Providers (ISP’s). Some Application as a Service used in NFV data centers have a wide range in building security services like Virtual firewalls, Intrusion Detection System (IDS), load balancing, bandwidth allocation and management. In this paper, a novel security framework is proposed to combat SDDC and SDN based on NFV security features. The proposed framework consists of a Virtual firewall and an efficient bandwidth manager to handle multiple heterogeneous application requests from different ISPs. Real time data were taken from an experiment for a week and A new simulation based proof of concept is admitted in this paper for validation of the proposed framework which was deployed in real time SDNs using Mininet and POX controller.</p>


Author(s):  
Awad Saad Al-Qahtani, Mohammad Ayoub Khan Awad Saad Al-Qahtani, Mohammad Ayoub Khan

The Internet of things (IOT) users lack awareness of IOT security infrastructure to handle the risks including Threats, attack and penetration associated with its use. IOT devices are main targets for cyber-attacks due to variable personally identifiable information (PII) stored and transmit in the cyber centers. The security risks of the Internet of Things aimed to damage user's security and privacy. All information about users can be collected from their related objects which are stored in the system or transferred through mediums among diverse smart objects and may exposed to exposed dangerous of attacks and threats if it lack authentication so there are essential need to make IOT security requirements as important part of its efficient implementation. These requirements include; availability, accountability, authentication, authorization, privacy and confidentiality, Integrity and Non-repudiation. The study design is a survey research to investigate the visibility of the proposed model of security management for IOT uses, the security risks of IOT devices, and the changes IOT technology on the IT infrastructure of IOT users through answering of the research questionnaires. This work proposes a model of security management for IOT to predict IOT security and privacy threats, protect IOT users from any unforeseen dangers, and determine the right security mechanisms and protocols for IOT security layers, as well as give the most convenient security mechanisms. Moreover, for enhancing the performance of IOT networks by selecting suitable security mechanisms for IOT layers to increase IOT user's security satisfaction.


The Internet of Things (IoT) has been growing to market from the past several years with great potential. Many several devices have been now available in the market based on IoT, which enables it to connect with your smart phones or with any other kind of smart resources, and then that device is ready to perform smart work via the Internet. With the help of IoT, we are now able to make our devices connect with the internet and then can be operated from anywhere from the geo location as well as it can store and retrieve a large amount of data for better communication between the end-user and the device. IoT also has a wide range of applications that are being used on many platforms. However, this great technology also has to face many problems and among all the problems the main issue arises with its security aspects. The major concern on using IoT security is the hacker wants to enter into the large network system using a particular device as all the devices are connected over the network. Not only this, many other security threats and malware are also a major concern in IoT. So taking these security aspects as a major concern this research paper reviews several security issues and challenges that occur in IoT. As there in every field when it comes to cyber security for any kind of data, we need to follow CIA Security Triangle i.e., Confidentiality, Integrity, and Availability of data. CIA security triangle is the most important concept in terms of security and also must be taken into consideration in the IoT domain. Therefore, considering all these facts and reviewing some of the latest documents as well as researches in the field of IoT, this paper has been based on all the facts related to IoT security issues and its desirable solution which is needed to be done and should follow the security triangle to an extent.


Telecom IT ◽  
2019 ◽  
Vol 7 (1) ◽  
pp. 1-9
Author(s):  
A. Borodko

The data center (DC) is the most progressive form of computing resources when it is necessary to provide services to a wide range of users. Research subject. The article discusses the classification of data centers, their main functions, composition, purpose of creation and factors affecting them. Methodology and core results. The article provides a classification and structural analysis of the methods and technologies for constructing information storage and processing systems. In the work with a systematic approach analyzed factors affecting data centers. Practical relevance. It consists in the possibility of using the proposed classification in the tasks of systematically introducing the Internet of things devices into the data center, implementing software-defined data centers and developing methods for assessing the effectiveness of the functioning of the data center.


Sign in / Sign up

Export Citation Format

Share Document