scholarly journals Framework for Secure Routing Towards Identifying and Resisting Complex Malicious Threats in IoT Ecosystem

Internet-of-Things (IoT) is an inevitable domain of technology that is going to capture the connectivity of the majority of the smart devices in the coming days supported by huge advancement in mobile computing. However, IoT still suffers serious security issues when it comes to performing extensive communication over a broad range of heterogeneous devices. A review of existing secure routing schemes shows that they are complex in operation overlooking the communication performance and resource-constrained factors. Therefore, the proposed system introduces a very novel, simple, and cost-effective, secure routing scheme that is not only capable of identifying the threats without any apriority information of adversary, but they are equally capable of isolating the threats from the connectivity of regular IoT nodes. The simulated outcome of the proposed system shows that it offers a better solution towards security in contrast to existing security approaches frequently exercised in IoT at present

Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2784 ◽  
Author(s):  
Chao Qu ◽  
Ming Tao ◽  
Ruifen Yuan

With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy. On the other hand, the smart devices in IoT are always lightweight and have less energy and memory. This makes the application of blockchain difficult. Against this background, this paper proposes a blockchain model based on hypergraphs. The aims of this model are to reduce the storage consumption and to solve the additional security issues. In the model, we use the hyperedge as the organization of storage nodes and convert the entire networked data storage into part network storage. We discuss the design of the model and security strategy in detail, introducing some use cases in a smart home network and evaluating the storage performance of the model through simulation experiments and an evaluation of the network.


2019 ◽  
Vol 10 (4) ◽  
pp. 16-29 ◽  
Author(s):  
Adil Bashir ◽  
Ajaz Hussain Mir

Internet of Things (IoT) is the emerging technology finding applications in a wide range of fields that include smart homes, intelligent transportation, e-health, supply chain management. Among IoT applications, e-health is one of the most promising application in which smart devices capable of monitoring physiological parameters of patients are implanted in or around their bodies which automatically sense and transmit collected data to medical consultants. However, security issues for electronic patient records (EPR) in-transit hinder the usage of IoT in e-health systems. Among these issues, EPR confidentiality and entity authentication are major concerns. In this article, confidentiality of EPR and its secure transmission over network is focused mainly. A security framework is proposed where-in smart devices encrypt sensed physiological data with Light-Weight Encryption Algorithm and Advanced Encryption Standard cryptographic algorithms. The security framework and the designed protocol provides better security and are energy efficient as presented in the evaluation section.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 720 ◽  
Author(s):  
Gonçalo Marques ◽  
Nuno Miranda ◽  
Akash Kumar Bhoi ◽  
Begonya Garcia-Zapirain ◽  
Sofiane Hamrioui ◽  
...  

This paper presents a real-time air quality monitoring system based on Internet of Things. Air quality is particularly relevant for enhanced living environments and well-being. The Environmental Protection Agency and the World Health Organization have acknowledged the material impact of air quality on public health and defined standards and policies to regulate and improve air quality. However, there is a significant need for cost-effective methods to monitor and control air quality which provide modularity, scalability, portability, easy installation and configuration features, and mobile computing technologies integration. The proposed method allows the measuring and mapping of air quality levels considering the spatial-temporal information. This system incorporates a cyber-physical system for data collection and mobile computing software for data consulting. Moreover, this method provides a cost-effective and efficient solution for air quality supervision and can be installed in vehicles to monitor air quality while travelling. The results obtained confirm the implementation of the system and present a relevant contribution to enhanced living environments in smart cities. This supervision solution provides real-time identification of unhealthy behaviours and supports the planning of possible interventions to increase air quality.


2016 ◽  
Vol 24 (4) ◽  
pp. 217-221 ◽  
Author(s):  
Irakli Abashidze ◽  
Marcin Dąbrowski

Abstract Internet of Things (IoT) affects different areas of human activities: everyday life of ordinary citizens, work style of marketing teams, factories and even entire cities. Large companies try to implement the technology in their marketing strategy that reshapes not only communication style and product promotion but consumers’ expectations, perceptions and requirements towards companies. IoT is expected to become a huge network that will encompass not only smart devices but significantly influence humans’ behavior, in this particular case - decision making style in different phases of purchase process. Therefore, the need for comprehensive scientific research is necessary. The issue needs to be reviewed from various points of view, such as opportunities, advantages, disadvantages, legal and technical considerations. The paper is an attempt to review different aspects of using Internet of Things for marketing purposes, identify some of the major problems and present possible ways of solution.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1492 ◽  
Author(s):  
Pantaleone Nespoli ◽  
David Useche Pelaez ◽  
Daniel Díaz López ◽  
Félix Gómez Mármol

The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in several daily appliances. Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems. On the downside, the great benefit carried by the IoT paradigm in our life brings simultaneously severe security issues, since the information exchanged among the objects frequently remains unprotected from malicious attackers. The paper at hand proposes COSMOS (Collaborative, Seamless and Adaptive Sentinel for the Internet of Things), a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. Additionally, we discuss the current deployment of the sentinel on a commodity device (i.e., Raspberry Pi). Exhaustive experiments are conducted on the sentinel, demonstrating that it performs meticulously even in heavily stressing conditions. Each defensive layer is tested, reaching a remarkable performance, thus proving the applicability of COSMOS in a distributed and dynamic scenario such as IoT. With the aim of easing the enjoyment of the proposed sentinel, we further developed a friendly and ease-to-use COSMOS App, so that end-users can manage sentinel(s) directly using their own devices (e.g., smartphone).


2021 ◽  
Author(s):  
Mehdia Ajana El Khaddar

The Internet of Things (IoT), along with its wider variants including numerous technologies, things, and people: the Internet of Everything (IoE) and the Internet of Nano Things (IoNT), are considered as part of the Internet of the future and ubiquitous computing allowing the communication among billions of smart devices and objects, and have recently drawn a very significant research attention. In these approaches, there are varieties of heterogeneous devices empowered by new capabilities and interacting with each other to achieve specific applications in different domains. A middleware layer is therefore required to abstract the physical layer details of the smart IoT devices and ease the complex and challenging task of developing multiple backend applications. In this chapter, an overview of IoT technologies, architecture, and main applications is given first and then followed by a comprehensive survey on the most recently used and proposed middleware solutions designed for IoT networks. In addition, open issues in IoT middleware design and future works in the field of middleware development are highlighted.


Author(s):  
Abdelkader Khobzaoui ◽  
Kadda Benyahia ◽  
Boualem Mansouri ◽  
Sofiane Boukli-Hacene

Internet of Things (IoT) is a set of connected smart devices providing and sharing rich data in real-time without involving a human being. However, IoT is a security nightmare because like in the early computer systems, security issues are not considered in the design step. Thereby, each IoT system could be susceptible to malicious users and uses. To avoid these types of situations, many approaches and techniques are proposed by both academic and industrial researches.DNA computing is an emerging and relatively new field dealing with data encryption using a DNA computing concepts. This technique allows rapid and secure data transfer between connected objects with low power consumption. In this paper, authors propose a symmetric cryptography method based on DNA. This method consists in cutting the message to encrypt/decrypt in blocks of characters and use a symmetric key extracted from a chromosome for encryption and decryption. Implemented on the embedded platform of a Raspberry Pi, the proposed method shows good performances in terms of robustness, complexity and attack resistance.


Optimized routing in wireless network is the trending research area in ad-hoc wireless communication. Performance of outmoded schemes designed for security during the process of routing in sensor networks significantly affected by consistency and security issues. However the present routing schemes are inexpensive and need no rigorous positioning but security is still unavoidable apprehension. An optimized routing scheme is proposed for WSN in this paper which is named as Collaborative Optimized Routing Algorithm (CORA), which precisely focuses on optimized progression of data during routing along with security aspects. CORA functions in two phases, first phase is to identify and group the collaborative nodes through defined lenient constant based on direct_trust, link_strength and quality parameters. Direct_trust and link_strength are direct measures but to evaluate quality, link survival time and caused delay are considered. Whereas in second phase suit function is defined for choosing the optimized nodes using the proposed CORA, based on direct_trust, link_strength, quality and distance. Performance of proposed collaborative optimized routing scheme is assessed based on the measurement metrics with 50 dynamic nodes ad-hoc sensor network in presence of selective forwarding and denial-of-service attacks. CORA indicates the higher detection rate and throughput as 54.9 and 41.6 respectively and lower delay and distance as 15 and 158.8 respectively which are significantly better than competing schemes.


2021 ◽  
Vol 11 (4) ◽  
pp. 4750-4763
Author(s):  
Madhura Apte ◽  
Supriya Kelkar ◽  
Aishwarya Dorge ◽  
Shilpa Deshpande ◽  
Pooja Bomble ◽  
...  

Internet of Things (IoT) a growing phenomenon, refers to the seamless integration of things into the information network. The security in IoT is tampered because of the various attacks which happen due to resource constrained nature of the devices in the network. Thus, although IoT is evolving as an attractive next generation networking paradigm, it can be adopted only when the security issues are resolved. This implies that, in a dynamic and collaborative IoT environment, the devices need to be trustworthy. This paper proposes a gateway based trust management system and an algorithm for computation of trust for the devices. The system focuses on making the computations on the devices lightweight and the network robust. The proposed system is tested against various IoT attacks and results demonstrate that it can clearly identify the malicious device if any, in the IoT network.


Author(s):  
Layse Nascimento ◽  
Joice Machado ◽  
Caio Rodrigues ◽  
Rhuan Ribeiro ◽  
Glauber Marques ◽  
...  

Nowadays, smart devices which can be controlled remotely by the Internet appear in the preference setting rather than the manual control to improve the standard of living. In this paper, a domotic system integrated into PV power generation has been developed on the Internet of Things (IoT). The system uses sensors for fire detection and monitoring of the temperature and relative air humidity. Based on real-time, the home automation off-grid system is developed so that makes the system cost-effective and portable.


Sign in / Sign up

Export Citation Format

Share Document