scholarly journals Enhancing Security Features for IoT Devices by Integration with Block Chain Technology

System of bodily hubs or "matters" joined with hardware, programming, sensors, and linked to enact articles to move information from servers, included frameworks, or doubtlessly distinctive associated devices depending on a numerous correspondence foundations may be actualized with net of factors (IoT) version. IoT facts gathered from various sensors, hubs and government are moved to the cover over the net. The principle target of IoT protection is to ensure thriller of the statistics, and make certain the assurance of the consumer's statistics, frameworks, software program's facts substance, and smart machine's of the IoT, via manner of ensures the administrations accessibility of IoT organic gadget. The number one purpose of this exam article is to enhance protection highlights to IoT device becoming a member of with rectangular chain. The significance of Bit-coin the usage of rectangular chain innovation, which changed into at that factor set up for a few, financial nicely well worth exchanges because it have been. Anyhow, because of its Non-delivered collectively engineering, agile corruption and cryptographic defend benefits, for instance, pseudonymous personalities, statistics trustworthiness and take a look at, scientists and safety professionals round the sector are concentrating on the rectangular chain to decide coverage and protection issues of IoT. In this article, we have positioned a few right down to earth problems which can be associated with the becoming a member of of IoT devices with the square chain. At closing, we endorse a course ahead to determine a part of the large difficulties to the rectangular chain's utilization in IoT based totally software program.

Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2681
Author(s):  
Kedir Mamo Besher ◽  
Juan Ivan Nieto-Hipolito ◽  
Raymundo Buenrostro-Mariscal ◽  
Mohammed Zamshed Ali

With constantly increasing demand in connected society Internet of Things (IoT) network is frequently becoming congested. IoT sensor devices lose more power while transmitting data through congested IoT networks. Currently, in most scenarios, the distributed IoT devices in use have no effective spectrum based power management, and have no guarantee of a long term battery life while transmitting data through congested IoT networks. This puts user information at risk, which could lead to loss of important information in communication. In this paper, we studied the extra power consumed due to retransmission of IoT data packet and bad communication channel management in a congested IoT network. We propose a spectrum based power management solution that scans channel conditions when needed and utilizes the lowest congested channel for IoT packet routing. It also effectively measured power consumed in idle, connected, paging and synchronization status of a standard IoT device in a congested IoT network. In our proposed solution, a Freescale Freedom Development Board (FREDEVPLA) is used for managing channel related parameters. While supervising the congestion level and coordinating channel allocation at the FREDEVPLA level, our system configures MAC and Physical layer of IoT devices such that it provides the outstanding power utilization based on the operating network in connected mode compared to the basic IoT standard. A model has been set up and tested using freescale launchpads. Test data show that battery life of IoT devices using proposed spectrum based power management increases by at least 30% more than non-spectrum based power management methods embedded within IoT devices itself. Finally, we compared our results with the basic IoT standard, IEEE802.15.4. Furthermore, the proposed system saves lot of memory for IoT devices, improves overall IoT network performance, and above all, decrease the risk of losing data packets in communication. The detail analysis in this paper also opens up multiple avenues for further research in future use of channel scanning by FREDEVPLA board.


Author(s):  
Domenico Garlisi ◽  
Alessio Martino ◽  
Jad Zouwayhed ◽  
Reza Pourrahim ◽  
Francesca Cuomo

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as IoT information related to the network level (wireless or wired) is gathered by the network operators. In this paper, we provide a systematic approach to process network data gathered from a wide area IoT wireless platform based on LoRaWAN (Long Range Wide Area Network). Our study can be used for profiling IoT devices, in order to group them according to their characteristics, as well as detecting network anomalies. Specifically, we use the k-means algorithm to group LoRaWAN packets according to their radio and network behavior. We tested our approach on a real LoRaWAN network where the entire captured traffic is stored in a proprietary database. Quite important is the fact that LoRaWAN captures, via the wireless interface, packets of multiple operators. Indeed our analysis was performed on 997, 183 packets with 2169 devices involved and only a subset of them were known by the considered operator, meaning that an operator cannot control the whole behavior of the system but on the contrary has to observe it. We were able to analyze clusters’ contents, revealing results both in line with the current network behavior and alerts on malfunctioning devices, remarking the reliability of the proposed approach.


Author(s):  
Olof Magnusson ◽  
Rikard Teodorsson ◽  
Joakim Wennerberg ◽  
Stig Arne Knoph

LoRaWAN (long-range wide-area network) is an emerging technology for the connection of internet of things (IoT) devices to the internet and can as such be an important part of decision support systems. In this technology, IoT devices are connected to the internet through gateways by using long-range radio signals. However, because LoRaWAN is an open network, anyone has the ability to connect an end device or set up a gateway. Thus, it is important that gateways are designed in such a way that their ability to be used maliciously is limited. This chapter covers relevant attacks against gateways and potential countermeasures against them. A number of different attacks were found in literature, including radio jamming, eavesdropping, replay attacks, and attacks against the implementation of what is called beacons in LoRaWAN. Countermeasures against these attacks are discussed, and a suggestion to improve the security of LoRaWAN is also included.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Deris Stiawan ◽  
Mohd. Yazid Idris ◽  
Reza Firsandaya Malik ◽  
Siti Nurmaini ◽  
Nizar Alsharif ◽  
...  

Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at a gateway or data sink very often is improperly set up. At the same time, password matching/theft holding is among the popular attacks as the intruders attack the IoT network. Thus, this paper attempts to provide an insight of this type of attack with the main aim of coming up with attack patterns that may help the IoT system administrator to analyze any similar attacks. This paper investigates brute force attack (BFA) on the FTP server of the IoT network by using a time-sensitive statistical relationship approach and visualizing the attack patterns that identify its configurations. The investigation focuses on attacks launched from the internal network, due to the assumption that the IoT network has already installed a firewall. An insider/internal attack launched from an internal network endangers more the entire IoT security system. The experiments use the IoT network testbed that mimic the internal attack scenario with three major goals: (i) to provide a topological description on how an insider attack occurs; (ii) to achieve attack pattern extraction from raw sniffed data; and (iii) to establish attack pattern identification as a parameter to visualize real-time attacks. Experimental results validate the investigation.


2020 ◽  
Vol 6 (Supplement_1) ◽  
pp. 58-58
Author(s):  
Lamech Sigu ◽  
Fredrick Chite ◽  
Emma Achieng ◽  
Andrew Koech

PURPOSE The Internet of Things (IoT) is a technology that involves all things connected to the Internet that share data over a network without requiring human-to-human interaction or human-to-computer interaction. Information collected from IoT devices can help physicians identify the best treatment process for patients and reach accurate and expected outcomes. METHODS The International Cancer Institute is partnering to set up remote oncology clinics in sub-Saharan Africa. Medical oncologists and expert teams from across the world connect with oncology clinics in other Kenyan counties—Kisumu, Meru, Makueni, Garissa, Kakamega, Bungoma, Siaya, and Vihiga counties. The furthest county is Garissa, approximately 651.1 km from Eldoret, and the nearest is Vihiga at 100.4 km from Eldoret. This study began July 2019, and as of November 30th, the team has hosted 21 sessions with an average of 11 participants attending a session led by a medical oncologist. RESULTS IoT devices have become a way by which a patient gets all the information he or she needs from a physician without going to the clinic. Patient monitoring can be done in real time, allowing access to real-time information with improved patient treatment outcomes and a decrease in cost. Through IoT-enabled devices, the International Cancer Institute has set up weekly virtual tumor boards during which cancer cases are presented and discussed by all participating counties. An online training module on cancer is also offered. Furthermore, remote monitoring of a patient’s health helps to reduce the length of hospital stay and prevents readmissions. CONCLUSION In our setting, which has a few oncologists, use of IoT and tumor boards has helped to improve patient decision support as well as training for general physicians.


IoT devices are playing a greater role in business specially in wireless communication. IoT devices are achieving higher maturity as seen in smartdust. The aim of this research is to study the functionality of MOTES in smartdust to integrate with IoT architecture and infrastructure for optimization of wireless communication specially linked with 2.4Ghz and 5Ghz band. MOTES are being modeled in MALTAB using Artificial Neural Network integrated with optimization for speed, power and frequency linked with IoT architecture. The result proves that smartdust architecture if utilized in IoT architecture, the over all performances result of IoT devices is increased specially in bandwidth and power consumption. All the modeling result were compared for general sensor data bandwidth in ESP8266 for 2.4 Ghz, and mathematical model are presented for 5Ghz using smartdust MOTES. It is been proposed that using AI optimization technique like Ant Colonization Optimization or Particle Swarm Optimization we can mathematically model smartdust Architecture.


An emerging Lightweight machine to machine had been indulged with a high speed portable client-server specification. The LWM2M was helpfull for constrained networks. It has systematic machine manipulation also with an invulnerability venture, was supported in IoT applications. Research activities also focus on the server domain was in process in LWM2M. In LWM2M end-nodes are always resource-constrained. The client-side authorized LWM2M functionalities are not only critical and crucial also challenging. To approach the client-side set-up in LWM2M, it has a proper authenticity environment embedded in hand with IoT node. Its interconnection was predetermined to associate with the lightweight protocol stack and response was figured up by the LWM2M v1.0 specification. The usability and effectiveness of Lightweight protocol validated using a real-world application. Building a home automation product is one of the most effective parts is to think about protocols. Thus the LWM2M protocols are one of the efficient ways to communicate to gateways, servers, and sensors.


Nowadays security is major concern for any user connected to the internet. Various types of attacks are to be performed by intruders to obtaining user information as man- inmiddle attack, denial of service, malware attacks etc. Malware attacks specifically ransomware attack become very famous recently. Ransomware attack threaten the users by encrypting their most valuable data, lock the user screen, play some random videos and by various more means. Finally attacker takes benefits by users through paid ransom. In this paper, we propose a framework which prevents the ransomware attack more appropriately using various techniques as block chain, honeypot, cloud & edge computing. This framework is analyzed mainly through the IoT devices and generalized to the any malware attack.


Author(s):  
Thangaraj Muthuraman ◽  
Punitha Ponmalar Pichiah ◽  
Anuradha S.

The current technology has given arms, hands, and wings to the smart objects-internet of things, which create the centralized data collection and analysis nightmare. Even with the distributed big data-enabled computing, the relevant data filtering for the localized decisions take a long time. To make the IOT data communication smoother and make the devices talk to each other in a coherent way the device data transactions are made to communicate through the block chain, and the applications on the localized destination can take the decisions or complete transaction without the centralized hub communication. This chapter focuses on adding vendor-specific IOT devices to the public or private block chain and the emerging challenges and the possible solutions to make the devices talk to each other and have the decision enablement through the distributed transactions through the block chain technology.


Sign in / Sign up

Export Citation Format

Share Document