scholarly journals IMPLEMENTASI CHALLENGE RESPONSE AUTHENTICATION MECHANISM (CRAM) UNTUK KEAMANAN TRANSAKSI PERANGKAT IoT

2021 ◽  
pp. 15-21
Author(s):  
Hendro FJ Lami ◽  
Hendro F J Lami ◽  
Stephanie I Pella

This research aims to secure data transaction in Internet of Things (IoT)devices using the challenge-response authentication mechanism (CRAM). The research choose uses ESP 8266 and ESP 32 to develop the system for their ability to run micropython programming language. Using a random challenge to grant authentication protects the system from replay attack from intruders. In each authentication process, the client receives a 10 digit random number to be encrypted using a shared key and sent back to the server. The server then checks if the client posses the correct key by decrypting the encrypted challenge using the same shared key. Access is granted if the decryption result is equal to the original challenge.

internet of things is now everywhere and even if people are aware of it or not, it is part of our everyday life. For something that is so much in pace with our life, iot collects a lot of information about our day today life, which in case of a data leak or hijacking could lead to catastrophic effects in the society. Still iot devices are not manufactured keeping in mind the security factor. This paper dives into the problem of spoofing attacks dealt by iot devices and comes up with an authentication mechanism, which uses variants of elliptic curve cryptography to protect against such said attacks without exhausting the devices in case of computational power and storage area. The experimentation clearly revealed the strength of the scheme to mitigate spoofing attacks on the iot home networks.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 92 ◽  
Author(s):  
K Sai Prasanthi ◽  
K V.Daya Sagar

Nowadays Internet of Things (IoT) is the trending topic where we go. IoT is included in almost every device surrounded by us where valuable information is shared over the network to store it in the cloud or to transfer as a message alert to an individual. IoT devices generate a huge amount of data but only caring information is required and for that analytics needs to be performed. Analytics are reaching outside of the traditional datacenter towards the edge, where the IoT data is generated. So, here in this paper, the importance of secure data sharing over a network, generated by IoT devices is described and along with that the data flow between IoT and edge server is discussed, and the requirement of edge analytics is focused.


2021 ◽  
Vol 18 (1) ◽  
pp. 58-69
Author(s):  
Ting Cai ◽  
Yuxin Wu ◽  
Hui Lin ◽  
Yu Cai

A recent study predicts that by 2025, up to 75 billion internet of things (IoT) devices will be connected to the internet, in which data sharing is increasingly needed by massive IoT applications as a major driver of the IoT market. However, how to meet the interests of all participants in complex multi-party interactive data sharing while providing secure data control and management is the main challenge in building an IoT data sharing ecosystem. In this article, the authors propose a blockchain-empowered data sharing architecture that supports secure data monitoring and manageability in complex multi-party interactions of IoT systems. First, to build trust among different data sharing parties, the authors apply blockchain technologies to IoT data sharing. In particular, on-chain/off-chain collaboration and sharding consensus process are used to improve the efficiency and scalability of the large-scale blockchain-empowered data sharing systems. In order to encourage IoT parties to actively participate in the construction of shared ecology, the authors use an iterative double auction mechanism in the proposed architecture to maximize the social welfare of all parties as a case-study. Finally, simulation results show that the proposed incentive algorithm can optimize data allocations for each party and maximize the social welfare while protecting the privacy of all parties.


2021 ◽  
Author(s):  
Samah Mohammed S ALhusayni ◽  
Wael Ali Alosaimi

Internet of Things (IoT) has a huge attention recently due to its new emergence, benefits, and contribution to improving the quality of human lives. Securing IoT poses an open area of research, as it is the base of allowing people to use the technology and embrace this development in their daily activities. Authentication is one of the influencing security element of Information Assurance (IA), which includes confidentiality, integrity, and availability, non repudiation, and authentication. Therefore, there is a need to enhance security in the current authentication mechanisms. In this report, some of the authentication mechanisms proposed in recent years have been presented and reviewed. Specifically, the study focuses on enhancement of security in CoAP protocol due to its relevance to the characteristics of IoT devices and its need to enhance its security by using the symmetric key with biometric features in the authentication. This study will help in providing secure authentication technology for IoT data, device, and users.


Electronics ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 848
Author(s):  
Hani Mohammed Alshahrani

The Internet of Things (IoT) and its applications are becoming popular among many users nowadays, as it makes their life easier. Because of its popularity, attacks that target these devices have increased dramatically, which might cause the entire system to be unavailable. Some of these attacks are denial of service attack, sybil attack, man in the middle attack, and replay attack. Therefore, as the attacks have increased, the detection solutions to detect malware in the IoT have also increased. Most of the current solutions often have very serious limitations, and malware is becoming more apt in taking advantage of them. Therefore, it is important to develop a tool to overcome the existing limitations of current detection systems. This paper presents CoLL-IoT, a CoLLaborative intruder detection system that detects malicious activities in IoT devices. CoLL-IoT consists of the following four main layers: IoT layer, network layer, fog layer, and cloud layer. All of the layers work collaboratively by monitoring and analyzing all of the network traffic generated and received by IoT devices. CoLL-IoT brings the detection system close to the IoT devices by taking the advantage of edge computing and fog computing paradigms. The proposed system was evaluated on the UNSW-NB15 dataset that has more than 175,000 records and achieved an accuracy of up to 98% with low type II error rate of 0.01. The evaluation results showed that CoLL-IoT outperformed the other existing tools, such as Dendron, which was also evaluated on the UNSW-NB15 dataset.


Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 81
Author(s):  
Jorge Coelho ◽  
Luís Nogueira

Internet of things (IoT) devices play a crucial role in the design of state-of-the-art infrastructures, with an increasing demand to support more complex services and applications. However, IoT devices are known for having limited computational capacities. Traditional approaches used to offload applications to the cloud to ease the burden on end-user devices, at the expense of a greater latency and increased network traffic. Our goal is to optimize the use of IoT devices, particularly those being underutilized. In this paper, we propose a pragmatic solution, built upon the Erlang programming language, that allows a group of IoT devices to collectively execute services, using their spare resources with minimal interference, and achieving a level of performance that otherwise would not be met by individual execution.


2020 ◽  
Vol 8 (6) ◽  
pp. 2459-2465

The Internet of Things (IoT) is an emerging field where physical objects are connected over the network, by the way, to make human life easy and more comfortable. The IoT environment is involved with various devices and those are working together to attain a common goal. The enhanced technology of IoT enables the military environment to work on it. Typically, most of the IoT devices are restricted in terms of their storage, process, compute and network capability. Hence, those devices are easy to attack and compromise. Compromised devices become behave as blackhole attacks. To assure the proper network function, we are in the situation to overcome those types of attacks. As trust plays a vital role in decision making, in this paper we proposed a Multi-attribute Trust-based Authentication mechanism (MTA). The ultimate aim of this model is to ensure authentication among the participating devices by identifying black hole nodes in the network. This multi-attribute trust calculation approach provides a maximum effort to evaluating the trustworthiness of devices. The simulation results show the applicability of the proposed model in terms of various performance metrics.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Impact ◽  
2019 ◽  
Vol 2019 (10) ◽  
pp. 61-63 ◽  
Author(s):  
Akihiro Fujii

The Internet of Things (IoT) is a term that describes a system of computing devices, digital machines, objects, animals or people that are interrelated. Each of the interrelated 'things' are given a unique identifier and the ability to transfer data over a network that does not require human-to-human or human-to-computer interaction. Examples of IoT in practice include a human with a heart monitor implant, an animal with a biochip transponder (an electronic device inserted under the skin that gives the animal a unique identification number) and a car that has built-in sensors which can alert the driver about any problems, such as when the type pressure is low. The concept of a network of devices was established as early as 1982, although the term 'Internet of Things' was almost certainly first coined by Kevin Ashton in 1999. Since then, IoT devices have become ubiquitous, certainly in some parts of the world. Although there have been significant developments in the technology associated with IoT, the concept is far from being fully realised. Indeed, the potential for the reach of IoT extends to areas which some would find surprising. Researchers at the Faculty of Science and Engineering, Hosei University in Japan, are exploring using IoT in the agricultural sector, with some specific work on the production of melons. For the advancement of IoT in agriculture, difficult and important issues are implementation of subtle activities into computers procedure. The researchers challenges are going on.


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Scott Monteith ◽  
Tasha Glenn ◽  
John Geddes ◽  
Emanuel Severus ◽  
Peter C. Whybrow ◽  
...  

Abstract Background Internet of Things (IoT) devices for remote monitoring, diagnosis, and treatment are widely viewed as an important future direction for medicine, including for bipolar disorder and other mental illness. The number of smart, connected devices is expanding rapidly. IoT devices are being introduced in all aspects of everyday life, including devices in the home and wearables on the body. IoT devices are increasingly used in psychiatric research, and in the future may help to detect emotional reactions, mood states, stress, and cognitive abilities. This narrative review discusses some of the important fundamental issues related to the rapid growth of IoT devices. Main body Articles were searched between December 2019 and February 2020. Topics discussed include background on the growth of IoT, the security, safety and privacy issues related to IoT devices, and the new roles in the IoT economy for manufacturers, patients, and healthcare organizations. Conclusions The use of IoT devices will increase throughout psychiatry. The scale, complexity and passive nature of data collection with IoT devices presents unique challenges related to security, privacy and personal safety. While the IoT offers many potential benefits, there are risks associated with IoT devices, and from the connectivity between patients, healthcare providers, and device makers. Security, privacy and personal safety issues related to IoT devices are changing the roles of manufacturers, patients, physicians and healthcare IT organizations. Effective and safe use of IoT devices in psychiatry requires an understanding of these changes.


Sign in / Sign up

Export Citation Format

Share Document