scholarly journals Counterfeiting Threats in IoT

With the advent of digitalization the entire world is greatly connected to the digital world. The modern gadgets are equipped with Internet-connectivity encouraging web browsing. Due to rapid mobility of devices numerous applications are launched while these come with lot of advantages and wide spread of information they are prone to attacks too. These attacks on IoT devices compromise the security & privacy of the user. The attackers get entry and invade through the data, inject malware, or schedule attacks on neighborhood. In this paper, we present the attacks and the vulnerabilities in IoT, along with the preventive and counter measures to be adapted to safeguard from attacks. We compiled a brief outline of the security breaches and the latest block chain application to implement security in IoT devices as work for future direction.

Author(s):  
Jo Anne Cote ◽  
Eun G. Park

In the digital world, several ways to organize and describe digital rights management (DRM) have been developed to enforce fairness and transparency in business trades. Metadata is beginning to serve this purpose as it attempts to address property rights, licensing, privacy, and confidentiality issues in a manner that ideally renders information or content easily accessible over a variety of platforms (Koenen, 2001). With the rise of security breaches and computer crimes such as identity theft, DRM is increasingly an issue for creators, content owners, purveyors, and consumers of all sorts of digital materials. This article defines what DRM is and explains how it is implemented into description and assessment in practical metadata schemes. DRM components are discussed, in particular those related to identification and rights expression. The two commonly used standards of describing DRM are discussed with Open Mobile Alliance and MPEG-21 (Rosenblatt, 2005). Issues and problems of metadata in DRM are also discussed for future implications.


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Bandar Alotaibi ◽  
Munif Alotaibi

Internet of things (IoT) devices and applications are dramatically increasing worldwide, resulting in more cybersecurity challenges. Among these challenges are malicious activities that target IoT devices and cause serious damage, such as data leakage, phishing and spamming campaigns, distributed denial-of-service (DDoS) attacks, and security breaches. In this paper, a stacked deep learning method is proposed to detect malicious traffic data, particularly malicious attacks targeting IoT devices. The proposed stacked deep learning method is bundled with five pretrained residual networks (ResNets) to deeply learn the characteristics of the suspicious activities and distinguish them from normal traffic. Each pretrained ResNet model consists of 10 residual blocks. We used two large datasets to evaluate the performance of our detection method. We investigated two heterogeneous IoT environments to make our approach deployable in any IoT setting. Our proposed method has the ability to distinguish between benign and malicious traffic data and detect most IoT attacks. The experimental results show that our proposed stacked deep learning method can provide a higher detection rate in real time compared with existing classification techniques.


Author(s):  
P.Chinnasamy Et al.

The evolving agricultural technologies used mostly for remote access and modernization in farming connected via the Internet of Things (IoT) have been grown rapidly. However because of the wide size of all its broadcaster's propagandizing existence, it has some significant concerns with respect to security and privacy. We utilize blockchain to address such security breaches, allowing the development of a decentralized distributed blockchain system that's also exchanged between the IoT cluster heads. This article's major focus is provide smart greenhouse farmlands with a portable blockchain-based infrastructure which offers integrity and confidentiality. Where, green-house IoT sensor nodes are function as a blockchain centrally controlled to optimize the energy consumption by utilizing secure immutable ledgers. Furthermore, we present a significant solution that integrates blockchain technology via IoT devices to offer Smart Greenhouse cultivation with an enhanced secure communication.


IoT devices are playing a greater role in business specially in wireless communication. IoT devices are achieving higher maturity as seen in smartdust. The aim of this research is to study the functionality of MOTES in smartdust to integrate with IoT architecture and infrastructure for optimization of wireless communication specially linked with 2.4Ghz and 5Ghz band. MOTES are being modeled in MALTAB using Artificial Neural Network integrated with optimization for speed, power and frequency linked with IoT architecture. The result proves that smartdust architecture if utilized in IoT architecture, the over all performances result of IoT devices is increased specially in bandwidth and power consumption. All the modeling result were compared for general sensor data bandwidth in ESP8266 for 2.4 Ghz, and mathematical model are presented for 5Ghz using smartdust MOTES. It is been proposed that using AI optimization technique like Ant Colonization Optimization or Particle Swarm Optimization we can mathematically model smartdust Architecture.


System of bodily hubs or "matters" joined with hardware, programming, sensors, and linked to enact articles to move information from servers, included frameworks, or doubtlessly distinctive associated devices depending on a numerous correspondence foundations may be actualized with net of factors (IoT) version. IoT facts gathered from various sensors, hubs and government are moved to the cover over the net. The principle target of IoT protection is to ensure thriller of the statistics, and make certain the assurance of the consumer's statistics, frameworks, software program's facts substance, and smart machine's of the IoT, via manner of ensures the administrations accessibility of IoT organic gadget. The number one purpose of this exam article is to enhance protection highlights to IoT device becoming a member of with rectangular chain. The significance of Bit-coin the usage of rectangular chain innovation, which changed into at that factor set up for a few, financial nicely well worth exchanges because it have been. Anyhow, because of its Non-delivered collectively engineering, agile corruption and cryptographic defend benefits, for instance, pseudonymous personalities, statistics trustworthiness and take a look at, scientists and safety professionals round the sector are concentrating on the rectangular chain to decide coverage and protection issues of IoT. In this article, we have positioned a few right down to earth problems which can be associated with the becoming a member of of IoT devices with the square chain. At closing, we endorse a course ahead to determine a part of the large difficulties to the rectangular chain's utilization in IoT based totally software program.


2021 ◽  
Author(s):  
G. Vijay Kumar ◽  
M. Sreedevi ◽  
Arvind Yadav ◽  
B. Aruna

Now at present development the entire world using vast variety of smart devices associated among sensors & handful of actuators. There is an enormous progress within the field of electronic communication; processing the data through devices and the bandwidth in internet technologies makes very easy to access and to interact with the variety of devices all over the whole world. There is a wide range research in the area of Internet of Things (IoT) along Cloud Technologies making to build incredible data which are creating from this type of heterogeneous environments and can be able to transform into a valuable knowledge with the help of data mining techniques. The knowledge that is generated will takes a crucial role in making intellectual decisions and also be a best possible resource management and services. In this paper we organized a comprehensive assessment on various data mining techniques engaged with small and large scale IoT applications to make the environment smart.


2021 ◽  
Vol 3 (1) ◽  
pp. 23-28
Author(s):  
Rozan Khader ◽  
Derar Eleyan

The term internet of thing (IoT) has gained much popularity in the last decade. Which can be defined as various connected devices over the internet. IoT has rapidly  spread to include all aspects of our lives. For instance, smart houses, smart cities, and variant wearable devices. IoT devices work to do their desired goals, which is to develop a person life with his/her minimal involvement. At the same time, IoT devices have many weaknesses, which attackers exploit to affect these devices security. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are considered the most common attacks that strike IoT security. The main aim of these attacks is to make victim systems down and inaccessible for legitimate users by malicious malware. This paper objective is to discuss and review security issues related to DoS/DDoS Attacks and their counter measures i.e. prevention based on IoT devices layers structure.


Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4341
Author(s):  
Alejandro Pozo ◽  
Álvaro Alonso ◽  
Joaquín Salvachúa

The Internet of Things (IoT) brings plenty of opportunities to enhance society’s activities, from improving a factory’s production chain to facilitating people’s household tasks. However, it has also brought new security breaches, compromising privacy and authenticity. IoT devices are vulnerable to being accessed from the Internet; they lack sufficient resources to face cyber-attack threats. Keeping a balance between access control and the devices’ resource consumption has become one of the highest priorities of IoT research. In this paper, we evaluate an access control architecture based on the IAACaaS (IoT application-Scoped Access Control as a Service) model with the aim of protecting IoT devices that communicate using the Publish/Subscribe pattern. IAACaaS is based on the OAuth 2.0 authorization framework, which externalizes the identity and access control infrastructure of applications. In our evaluation, we implement the model using FIWARE Generic Enablers and deploy them for a smart buildings use case with a wireless communication. Then, we compare the performance of two different approaches in the data-sharing between sensors and the Publish/Subscribe broker, using Constrained Application Protocol (CoAP) and Hypertext Transfer Protocol (HTTP) protocols. We conclude that the integration of Publish/Subscribe IoT deployments with IAACaaS adds an extra layer of security and access control without compromising the system’s performance.


Nowadays security is major concern for any user connected to the internet. Various types of attacks are to be performed by intruders to obtaining user information as man- inmiddle attack, denial of service, malware attacks etc. Malware attacks specifically ransomware attack become very famous recently. Ransomware attack threaten the users by encrypting their most valuable data, lock the user screen, play some random videos and by various more means. Finally attacker takes benefits by users through paid ransom. In this paper, we propose a framework which prevents the ransomware attack more appropriately using various techniques as block chain, honeypot, cloud & edge computing. This framework is analyzed mainly through the IoT devices and generalized to the any malware attack.


Sign in / Sign up

Export Citation Format

Share Document