scholarly journals Internet of Things in Smart City Environments

2019 ◽  
Vol 8 (3) ◽  
pp. 7917-7921

With the advent of smart devices, a huge paradigm shift is observed in the way the users define service quality. Further, these devices or Internet of Things (IoT) devices as they are generally addressed, have acted as catalyst for comfort and connectivity and are building blocks of Smart City environment. With limited thought related to security is involved during the deployment of such devices, they offer a dangerous environment of opportunity to the attackers from the internet; which not only jeopardize network security, bus also the privacy of the users. Hence, it is of utmost importance to address the security concerns in smart city environment. This paper attempts to study the current IoT technologies deployed in a smart-city environment along with its vulnerabilities and possible solutions to improve IoT security. An approach is made to study the various vulnerabilities available with the IoT devices deployed in the smart city setup, various motivation of an attacker and the analyse some of the recent attacks witnessed by IoT devices. A few possible solutions for mitigation are suggested in this paper. The findings of the paper can be implemented in any network of IoT devices

2021 ◽  
pp. 2141007
Author(s):  
Mengyi Lian ◽  
Xiaowei Liu

Building information modeling (BIM) is one of the most exciting recent construction, engineering, and architecture developments. Built environments play a significant role in Smart City worldwide, and they are used to convey useful information to achieve smart city strategic goals. In modern project management, optimizing resources, BIM data integration, and data sharing in a smart city environment is challenging. Hence, in this paper, IoT-based Improved Building Information modeling (IoT-IBIM) has been proposed to overcome the challenges in building information modeling in modern project management for sustainable smart city applications. This paper discusses the efforts to create and integrate built-in environment data with IoT sensors for effective communication. The Internet of Things provides efficient resource control, increased efficiency, and improved human quality of life. As a result, the Internet of Things is a critical enabler of smart societies, including smart homes, smart cities, and smart factories. Building Information Modeling is an advanced asset allocation framework that generates high-quality output, reduces resource use, reduces environmental effects of development, and secures resources and availability for future generations. The experimental results show that the proposed IoT-IBIM method enhances the performance ratio and improves data integration and data sharing in a smart city environment.


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2020 ◽  
Vol 60 (11) ◽  
pp. 16-20
Author(s):  
Vugar Hajimahmud Abdullayev ◽  
◽  
Vusala Alyag Abuzarova ◽  

The article is devoted to the study of cyber security problems in the Smart Cities system. The development of the IT industry has led to the introduction of new technologies into our lives. One of these technologies is the Internet of Things technology. The application of IoT technology has increased in recent years. One of the most important areas in which Internet of Things technology is applied is the Smart Cities system. The main difference between smart cities and other cities is that their components are connected to each other via the Internet. All these smart devices create a smart city system in general. One of the biggest and most important problems in many areas where the Internet is used is security. The article looks at possible security problems in the system of smart cities and solutions to ensure cyber security. Key words: Smart city; Internet of Things; Information technologies; Security; Cyber security


Author(s):  
Aman Tyagi

Elderly population in the Asian countries is increasing at a very fast rate. Lack of healthcare resources and infrastructure in many countries makes the task of provding proper healthcare difficult. Internet of things (IoT) in healthcare can address the problem effectively. Patient care is possible at home using IoT devices. IoT devices are used to collect different types of data. Various algorithms may be used to analyse data. IoT devices are connected to the internet and all the data of the patients with various health reports are available online and hence security issues arise. IoT sensors, IoT communication technologies, IoT gadgets, components of IoT, IoT layers, cloud and fog computing, benefits of IoT, IoT-based algorithms, IoT security issues, and IoT challenges are discussed in the chapter. Nowadays global epidemic COVID19 has demolished the economy and health services of all the countries worldwide. Usefulness of IoT in COVID19-related issues is explained here.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1492 ◽  
Author(s):  
Pantaleone Nespoli ◽  
David Useche Pelaez ◽  
Daniel Díaz López ◽  
Félix Gómez Mármol

The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in several daily appliances. Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems. On the downside, the great benefit carried by the IoT paradigm in our life brings simultaneously severe security issues, since the information exchanged among the objects frequently remains unprotected from malicious attackers. The paper at hand proposes COSMOS (Collaborative, Seamless and Adaptive Sentinel for the Internet of Things), a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. Additionally, we discuss the current deployment of the sentinel on a commodity device (i.e., Raspberry Pi). Exhaustive experiments are conducted on the sentinel, demonstrating that it performs meticulously even in heavily stressing conditions. Each defensive layer is tested, reaching a remarkable performance, thus proving the applicability of COSMOS in a distributed and dynamic scenario such as IoT. With the aim of easing the enjoyment of the proposed sentinel, we further developed a friendly and ease-to-use COSMOS App, so that end-users can manage sentinel(s) directly using their own devices (e.g., smartphone).


Author(s):  
Shashwat Pathak ◽  
Shreyans Pathak

The recent decade has seen considerable changes in the way the technology interacts with human lives and almost all the aspects of life be it personal or professional has been touched by technology. Many smart devices have also started playing a vital role in many fields and domains and the internet of things (IoT) has been the harbinger of the advent of IoT devices. IoT devices have proven to be monumental in imparting ‘smartness' in the otherwise static machines. The ability of the devices to interact and transfer the data to the internet and ultimately to the end-user has revolutionized the technological world and has brought many seemingly disparate fields in the technological purview. Out of the many fields where IoT has started gaining momentum, one of the most important ones is the healthcare sector. Many wearable smart devices have been developed over time capable to transmit real-time data to hospitals and doctors. It is essential for tracking the progress of the critically ill patients and has opened the horizon for attending patients remotely using these smart devices.


2020 ◽  
Vol 17 (1) ◽  
pp. 115-121 ◽  
Author(s):  
Soram Ranbir Singh ◽  
Khan Kumar Ajoy

With the advancements in wireless internet technology, a new computing ecosystem, the Internet of Things(IoT), has ushered in numerous devices in many areas in our life as well as in industries. The IoT is a computing notion that describes a scenario in which objects we use everyday are accessible using the internet and can be controlled from anywhere (Kung, Y.F., et al., 2018. Home Monitoring System Based Internet of Things. 2018 IEEE International Conference on Applied System Invention (ICASI), April; IEEE. pp.325–327; Singh, S. and Singh, N., 2015. Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE. pp.1577–1581). It could comprise devices with sensors to gather and broadcast data over the Internet (Singh, S. and Singh, N., 2015. Internet of Things (IoT): Security Challenges, Business Opportunities and Reference Architecture for E-Commerce. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), October; IEEE. pp.1577–1581). As per report of the research firm Gartner, the number of IoT objects will surpass 11.2 billion by 2018, and 20.4 billion by 2020. By 2020, the IoT industries will make revenue of almost 3 trillion US Dollars. As IoT devices are largely used in various areas of importance, it will definitely bring a lot of interests to hackers. It is worthwhile to quote here that hackers took away more than Rs 78 crore by hacking into router of Cosmos Bank based in Pune by duplicating debit cards in August, 2018. They carried out about 12 thousand unethical transactions worth Rs 78 crore in 28 countries. Hence, it is necessary to consider data privacy so that we can protect the data with limited system resource and technology. This paper proposes a new key management scheme with entity authentication for IoT devices. The proposed scheme uses modified Tate pairing. The presented scheme is apposite for IoT devices such as sensor networks due to their lower computational requirements.


2021 ◽  
Author(s):  
Mehdia Ajana El Khaddar

The Internet of Things (IoT), along with its wider variants including numerous technologies, things, and people: the Internet of Everything (IoE) and the Internet of Nano Things (IoNT), are considered as part of the Internet of the future and ubiquitous computing allowing the communication among billions of smart devices and objects, and have recently drawn a very significant research attention. In these approaches, there are varieties of heterogeneous devices empowered by new capabilities and interacting with each other to achieve specific applications in different domains. A middleware layer is therefore required to abstract the physical layer details of the smart IoT devices and ease the complex and challenging task of developing multiple backend applications. In this chapter, an overview of IoT technologies, architecture, and main applications is given first and then followed by a comprehensive survey on the most recently used and proposed middleware solutions designed for IoT networks. In addition, open issues in IoT middleware design and future works in the field of middleware development are highlighted.


2021 ◽  
Vol 15 (02) ◽  
pp. 19-24
Author(s):  
Vishv Patel ◽  
Devansh Shah ◽  
Nishant Doshi

The large deployment of the Internet of Things (IoT) is empowering Smart City tasks and activities everywhere throughout the world. Items utilized in day-by-day life are outfitted with IoT devices and sensors to make them interconnected and connected with the internet. Internet of Things (IoT) is a vital piece of a smart city that tremendously impact on all the city sectors, for example, governance, healthcare, mobility, pollution, and transportation. This all connected IoT devices will make the cities smart. As different smart city activities and undertakings have been propelled in recent times, we have seen the benefits as well as the risks. This paper depicts the primary challenges and weaknesses of applying IoT innovations dependent on smart city standards. Moreover, this paper points the outline of the technologies and applications of the smart cities.


Sign in / Sign up

Export Citation Format

Share Document