scholarly journals A Novel Hifi-Hacking Interrupter for Iot Devices

Internet of Things (IoT) is a very relevant technology used by internet networks to send and receive sensed data via a sensor. The same relates to common data communication except that sensors and microcontrollers are commonly used in IoT. It is supposed to explore, and there will be developing interest in the IoT framework which gives frequent IoT system capabilities. It connects us to the Internet and also helps us to reveal and manage the actual world by using sharing its info. IoT systems make use of real-world data, so device-collected data may also be a tool for cyber attack. The attack surface also expands as IoT expands and all the vulnerabilities present in the digital world flow through our modern world. DDoS attacks built on compromised IoT systems emerge as a serious problem. There are many technological solutions, but technology has changed a lot, so software solution can be in risk as well. The proposed system will serve as a prevention tool for DDoS attack and send the admin an alert when an attempt is made to hack the IoT device. In this proposed system, intend to provide a highly secured platform that will clean out all the unnecessary data without disrupting IoT’s normal operation.

Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 923
Author(s):  
Darsh Patel ◽  
Kathiravan Srinivasan ◽  
Chuan-Yu Chang ◽  
Takshi Gupta ◽  
Aman Kataria

With an increasing number of Internet of Things (IoT) devices in the digital world, the attack surface for consumer networks has been increasing exponentially. Most of the compromised devices are used as zombies for attacks such as Distributed Denial of Services (DDoS). Consumer networks, unlike most commercial networks, lack the infrastructure such as managed switches and firewalls to easily monitor and block undesired network traffic. To counter such a problem with limited resources, this article proposes a hybrid anomaly detection approach that detects irregularities in the network traffic implicating compromised devices by using only elementary network information like Packet Size, Source, and Destination Ports, Time between subsequent packets, Transmission Control Protocol (TCP) Flags, etc. Essential features can be extracted from the available data, which can further be used to detect zero-day attacks. The paper also provides the taxonomy of various approaches to classify anomalies and description on capturing network packets inside consumer networks.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1876
Author(s):  
Ioana Apostol ◽  
Marius Preda ◽  
Constantin Nila ◽  
Ion Bica

The Internet of Things has become a cutting-edge technology that is continuously evolving in size, connectivity, and applicability. This ecosystem makes its presence felt in every aspect of our lives, along with all other emerging technologies. Unfortunately, despite the significant benefits brought by the IoT, the increased attack surface built upon it has become more critical than ever. Devices have limited resources and are not typically created with security features. Lately, a trend of botnet threats transitioning to the IoT environment has been observed, and an army of infected IoT devices can expand quickly and be used for effective attacks. Therefore, identifying proper solutions for securing IoT systems is currently an important and challenging research topic. Machine learning-based approaches are a promising alternative, allowing the identification of abnormal behaviors and the detection of attacks. This paper proposes an anomaly-based detection solution that uses unsupervised deep learning techniques to identify IoT botnet activities. An empirical evaluation of the proposed method is conducted on both balanced and unbalanced datasets to assess its threat detection capability. False-positive rate reduction and its impact on the detection system are also analyzed. Furthermore, a comparison with other unsupervised learning approaches is included. The experimental results reveal the performance of the proposed detection method.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 552 ◽  
Author(s):  
Rocksan Choi ◽  
SeungGwan Lee ◽  
Sungwon Lee

In our modern world, many Internet of Things (IoT) technologies are being researched and developed. IoT devices are currently being used in many fields. IoT devices use Wi-Fi and Bluetooth, however, communication distance is short and battery consumption is high. In areas such as smart cities and smart farms, IoT technology is needed to support a wide coverage with low power consumption. Low Power Wide Area (LPWA), which is a transmission used in IoT supporting a wide area with low power consumption, has evolved. LPWA includes Long Range (LoRa), Narrowband (NB-IoT), and Sigfox. LoRa offers many benefits as it communicates the longest distances, is cheap and consumes less battery. LoRa is used in many countries and covers a range of hundreds of square kilometers (km2) with a single gateway. However, if there are many obstacles to smart cities and smart farms, it causes communication problems. This paper proposes two (2) solutions to this problem: the relay method which is a multi-hop method and the Automatic Repeat Request (ARQ) system that detects packet loss in real-time and requests retransmission for LoRa. In this study, the actual performance of LoRa in the problematic environment was measured and the proposed method was applied. It was confirmed that the transmission rate of LoRa dropped when there were many obstacles such as trees. To use LoRa in a smart farm with a lot of space, multi-hop was observed to be better. An ARQ system is needed to compensate for the unexpected drop in the forward rate due to the increase in IoT devices. This research focused on reliability, however, additional network methods and automatic repeat request (ARQ) systems considering battery time should be researched in symmetry. This study covers the interdisciplinary field of computer science and wireless low power communication engineering. We have analyzed the LoRa/LoRaWAN technology in an experimental approach, which has been somewhat less studied than cellular network or WiFi technology. In addition, we presented and improved the performance evaluation results in consideration of various local and climatic environments.


2020 ◽  
Vol 29 (01n04) ◽  
pp. 2040012
Author(s):  
Milton Chang ◽  
Santanu Das ◽  
Dale Montrone ◽  
Tapan Chakraborty

This paper proposes a novel scheme for inter-connecting IOT devices with servers. To overcome the drawbacks and other shortcomings of existing IoT network schemes, a new approach to IoT device certification and inter-connecting IoT devices to other network devices (e.g., aggregators and servers) is described. The proposed approach ensures that the overall IoT network is “hardened” against attack and meets the stringent requirements of mission critical applications.


2020 ◽  
Vol 23 (2) ◽  
pp. 52-58
Author(s):  
S. SKRYPNYK ◽  

Our world with its high technologies has long been deeply dependent on the quality of electricity supply. In most countries of the world there are national power grids that combine the entire set of generating capacity and loads. This network provides the operation of household appliances, lighting, heating, refrigeration, air conditioning and transport, as well as the functioning of the state apparatus, industry, finance, trade, health services and utilities across the country. Without this utility, namely electricity, the modern world simply could not live at its current pace. Sophisticated technological improvements are firmly rooted in our lives and workplaces, and with the advent of e-commerce began the process of continuous transformation of the way individuals interact with the rest of the world. But with the achievement of intelligent technologies, an uninterrupted power supply is required, the parameters of which exactly meet the established standards. These standards maintain our energy security and create a reliable power system, that is maintaining the system in a trouble-free state. Overvoltage is the deviation of the rated voltage from the value of the corresponding quality standard (frequency, sinusoidal voltage and compliance of harmonics). Overvoltage in terms of fire hazard is one of the most dangerous emergency modes of electrical equipment, which causes conditions that in most cases are sufficient for the occurrence of fire hazards (exceeding the allowable voltage leads to disruption of normal operation or possible ignition). Against the background of deteriorating engineering systems, increased power consumption and poor maintenance, power supply of electrical installations, the main causes of overvoltage in electrical networks are thunderstorms (atmospheric overvoltage), switching switches, uneven phase load in electrical networks, etc. The physical picture of internal overvoltage is due to oscillatory transients from the initial to the established voltage distributions in the conductive sections due to the different situation in the electrical circuit. In the conditions of operation of electric networks planned, mode or emergency situations are possible. Therefore, the ranges of overvoltage are determined by the range from several hundred volts to tens and hundreds of kilovolts, and depend on the types of overvoltage. Atmospheric overvoltage is considered to be one of the most dangerous types of emergency modes of operation of the electrical network. This overvoltage occurs as a result of lightning discharge during precipitation by concentrating electricity on the surface of the object, the introduction of potential through engineering networks and


1997 ◽  
Vol 22 (1) ◽  
pp. 1-30 ◽  
Author(s):  
Howard Wainer

The modern world is rich with data; an inability to effectively utilize these data is a real handicap. One common mode of data communication is the printed data table. In this article we provide four guidelines the use of which can make tables more effective and evocative data displays. We use the National Assessment of Educational Progress both to provide inspiration for the development of these guidelines and to illustrate their operation. We also discuss a theoretical structure to aid in the development of test items to tap students’ proficiency in extracting information from tables.


2021 ◽  
Author(s):  
Stuart Fowler ◽  
Keith Joiner ◽  
Elena Sitnikova

<div>Cyber-worthiness as it is termed in Australian Defence, or cyber-maturity more broadly, is a necessary feature of modern complex systems which are required to operate in a hostile cyber environment. To evaluate the cyber-worthiness of complex systems, an assessment methodology is required to examine a complex system’s or system-of-system’s vulnerability to and risk of cyber-attacks that can compromise such systems. This assessment methodology should address the cyber-attack surface and threat kill chains, including supply chains and supporting infrastructure. A cyber-worthiness capability assessment methodology has been developed based on model-based systems engineering concepts to analyse the cyber-worthiness of complex systems and present a risk assessment of various cyber threats to the complex system. This methodology incorporates modelling and simulation methods that provide organisations greater visibility and consistency across diverse systems, especially to drive cybersecurity controls, investment and operational decisions involving aggregated systems. In this paper, the developed methodology will be presented in detail and hypothesised outcomes will be discussed.</div>


2022 ◽  
Vol 11 (1) ◽  
pp. 5
Author(s):  
Njabulo Sakhile Mtetwa ◽  
Paul Tarwireyi ◽  
Cecilia Nombuso Sibeko ◽  
Adnan Abu-Mahfouz ◽  
Matthew Adigun

The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.


Sign in / Sign up

Export Citation Format

Share Document