Security Aspects of the Internet of Things

Author(s):  
Dominik Hromada ◽  
Rogério Luís de C. Costa ◽  
Leonel Santos ◽  
Carlos Rabadão

The Internet of Things (IoT) comprises the interconnection of a wide range of different devices, from Smart Bluetooth speakers to humidity sensors. The great variety of devices enables applications in several contexts, including Smart Cities and Smart Industry. IoT devices collect and process a large amount of data on machines and the environment and even monitor people's activities. Due to their characteristics and architecture, IoT devices and networks are potential targets for cyberattacks. Indeed, cyberattacks can lead to malfunctions of the IoT environment and access and misuse of private data. This chapter addresses security concerns in the IoT ecosystem. It identifies common threats for each of IoT layers and presents advantages, challenges, and limitations of promising countermeasures based on new technologies and strategies, like Blockchain and Machine Learning. It also contains a more in-depth discussion on Intrusion Detection Systems (IDS) for IoT, a promising solution for cybersecurity in IoT ecosystems.

2018 ◽  
Vol 38 (1) ◽  
pp. 121-129 ◽  
Author(s):  
Pablo Antonio Pico Valencia ◽  
Juan A. Holgado-Terriza ◽  
Deiver Herrera-Sánchez ◽  
José Luis Sampietro

Recently, the scientific community has demonstrated a special interest in the process related to the integration of the agent-oriented technology with Internet of Things (IoT) platforms. Then, it arises a novel approach named Internet of Agents (IoA) as an alternative to add an intelligence and autonomy component for IoT devices and networks. This paper presents an analysis of the main benefits derived from the use of the IoA approach, based on a practical point of view regarding the necessities that humans demand in their daily life and work, which can be solved by IoT networks modeled as IoA infrastructures. It has been presented 24 study cases of the IoA approach at different domains ––smart industry, smart city and smart health wellbeing–– in order to define the scope of these proposals in terms of intelligence and autonomy in contrast to their corresponding generic IoT applications.


2021 ◽  
Vol 15 (02) ◽  
pp. 19-24
Author(s):  
Vishv Patel ◽  
Devansh Shah ◽  
Nishant Doshi

The large deployment of the Internet of Things (IoT) is empowering Smart City tasks and activities everywhere throughout the world. Items utilized in day-by-day life are outfitted with IoT devices and sensors to make them interconnected and connected with the internet. Internet of Things (IoT) is a vital piece of a smart city that tremendously impact on all the city sectors, for example, governance, healthcare, mobility, pollution, and transportation. This all connected IoT devices will make the cities smart. As different smart city activities and undertakings have been propelled in recent times, we have seen the benefits as well as the risks. This paper depicts the primary challenges and weaknesses of applying IoT innovations dependent on smart city standards. Moreover, this paper points the outline of the technologies and applications of the smart cities.


2021 ◽  
pp. 218-228
Author(s):  
Kieron O’Hara

The Internet of Things is created by giving Internet connections to objects embedded in the environment, including wearable items. When IoT devices are connected and coordinated in an urban environment, smart cities are created, which can allow control of the environment, for example to improve carbon emissions or traffic flow. Instrumentation of the environment creates problems of consent, privacy, security, safety, and trust. The status of the IoT with respect to Internet ideology is discussed. The Silicon Valley Open Internet supports citizen-centric development, but may lack coordination at scale. The DC Commercial Internet creates great power for platforms. The Brussels Bourgeois Internet values rights and privacy, which may suppress innovation. In China, India, and elsewhere, smart cities are seen as key to developing a paternal social vision under digital modernity. Given its key role in the IoT, this is where America’s battle against Huawei may be most consequential.


2017 ◽  
pp. 5-17 ◽  
Author(s):  
Thomas J. Farkas

Data has become an asset with a big financial impact. With the extensive use of the Internet which “never forgets”, society has become more transparent than ever. Society also creates more data than ever. The increase of data creation is further catalysed by new technologies and connected devices; it is often referred to as the “internet of things” or “IoT-devices”. But who owns the date created by these new devices? This article aims to give a brief overview of possible rules governing data ownership. Also, it stresses the question whether or not the current legal framework sufficiently protects said data or if a new law should be implemented. 


Author(s):  
Ranjitha G. ◽  
Pankaj Lathar ◽  
G. M. Siddesh

Fog computing enhances cloud computing to be closer to the processes that act on IOT devices. Fogging was introduced to overcome the cloud computing paradigm which was not able to address some services, applications, and other limitations of cloud computing such as security aspects, bandwidth, and latency. Fog computing provides the direct correlation with the internet of things. IBM and CISCO are linking their concepts of internet of things with the help of fog computing. Application services are hosted on the network edge. It improves the efficiency and reduces the amount of data that is transferred to the cloud for analysis, storage, and processing. Developers write the fog application and deploy it to the access points. Several applications like smart cities, healthcare domain, pre-processing, and caching applications have to be deployed and managed properly.


Author(s):  
Edward T. Chen

The Internet of Things (IoT) has the potential to increase quality of life, heighten performance of systems and processes, and save valuable time for businesses and people. Common objects and devices are being linked with Internet connectivity and have capabilities for data analytics that affect day-to-day experiences of both individuals and businesses. The notions of Smart Health, Smart Cities, and Smart Living come into play as the Internet of Things plays a role in today's world. This chapter presents IoT devices and application examples as well as descriptions of the benefits and limitations alongside an assessment of each respective technology's potential for success in the future. Security and privacy are important factors that need to be addressed within the different domains. This chapter addresses these potentials, issues, and challenges for managers to be prepared for the new wave brought forth by the IoT.


Author(s):  
Samruddhi S. Burhade ◽  
Sonal N. Deshmukh

The Internet Of Things(IOT) is interconnection between identifiable embedded computing devices. Internet of Things is highly on the rise from smart cities, environment, health, energy, vehicle, transport, public safety to our daily essentials. Internet of Things has completely revitalized these areas. IOT expect the advanced connectivity with devices services. This paper highlighted the security and privacy aspect of IOT and various security threats which are given in each concept related to IOT. Various techniques are used for security and privacy of IOT devices and easy to adapt by users.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


Author(s):  
Wendy W. Fok ◽  

Minerva Tantoco was named New York City’s first chief technology officer last year, charged with developing a coordinated citywide strategy on technology and innovation. We’re likely to see more of that as cities around the country, and around the world, consider how best to use innovation and technology to operate as “smart cities.”The work has major implications for energy use and sustainability, as cities take advantage of available, real-time data – from ‘smart’ phones, computers, traffic monitoring, and even weather patterns — to shift the way in which heating and cooling systems, landscaping, flow of people through cities, and other pieces of urban life are controlled. But harnessing Open Innovation and the Internet of Things can promote sustainability on a much broader and deeper scale. The question is, how do you use all the available data to create a more environmentally sound future? The term “Internet of Things” was coined in 1999 by Kevin Ashton, who at the time was a brand manager trying to find a better way to track inventory. His idea? Put a microchip on the packaging to let stores know what was on the shelves.


Sign in / Sign up

Export Citation Format

Share Document