Security Assertion of IoT Devices Using Cloud of Things Perception

Author(s):  
Mamata Rath ◽  
Bibudhendu Pati

Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.

2018 ◽  
Vol 7 (2.7) ◽  
pp. 274 ◽  
Author(s):  
Ms U. Harita ◽  
K V.DayaSagar

The Internet of Things (IoT) introduces an inventive and perceptive of a future Internet where users, computing systems, and everyday items owning sensing and actuating abilities cooperate with unique comfort and financial advantages. Many heterogeneous devices get connected and contribute to the IoT and are known as things.Internet of Things (IoT) enables these things to correspond, compute and make decisions on the network. In such a heterogeneous environment, every user of IoT will have a unique purpose to be served in the form of communication and computation. There is a threat that a malicious user can demolish the security and privacy of the network. Hence any application in the environment of IoT is prone to various attacks and threats. At this point, security becomes a high priority in IoT. To ensure security, care must be taken to guarantee confidentiality, authenticity, data integrity and non-repudiation. In this paperaddress various conventional techniques for providing security of IoT devices and present analysis of existing solutions for IoT. Firstly, as security will be a fundamental allowing thing of most IoT applications, mechanisms must also be designed to defend communications enabled by such technologies. Later, we identify some suitable security algorithms.


2017 ◽  
Vol 2017 ◽  
pp. 1-14
Author(s):  
Ignacio Elicegui ◽  
Carmen López ◽  
Luis Sánchez ◽  
Jorge Lanza ◽  
Luis Muñoz ◽  
...  

Internet of Things (IoT) concept has attracted a lot of attention in recent years and it is foreseen as one of the technologies that will leverage the Future Internet. It is seen as a major enabler of novel applications and services that will foster efficiency and will ease every day’s life. However, current IoT solutions are mainly focusing on the development of centralized solutions that do not promote the democratization of the IoT but rather concentrate the IoT around a set of cloud-based platforms which pretend to be open but limit the capacity of the people to tailor their Personal and Communal IoT. This paper describes a software platform based on available generic enablers as defined by the FIWARE initiative. It extends the existing architecture models to accommodate the requirements stemming from the vision of people-sourced IoT devices which are shared to create applications and services in smart communities where the owners of the shared devices are always empowered to control who, and in which circumstances, has access to the shared information.


Author(s):  
Amrani Ayoub ◽  
Rafalia Najat ◽  
Abouchabaka Jaafar

<span>Cloud Computing and the Internet of Things (IoT), two different technologies, are already part of our lives. Their impressive adoption increasing more and more, which makes them the future of the future internet. The tsunami of interconnectivity between objects and data collection is increasingly based on Cloud Computing, where data analysis and intelligence really reside. A new paradigm where the Cloud and the IoT are merged will create a new air in the world of technology, which can offer many services and applications useful to humanity. However, despite the great benefits that can bring this technology in term of new services, elasticity and flexibility, the security aspect still remains a serious constraint which hampers the expansion of this technology. This paper proposes a lightweight Mutual authentication protocol based on Constrained Application Protocol (CoAP); that is suitable for IoT devices than HTTP and using elliptic curve cryptography to secure data transmission between the Cloud and devices. We used the AVISPA tool to verify our proposed scheme.</span>


Author(s):  
Suneth Namal ◽  
Hasindu Gamaarachchi ◽  
Gyu Myoung Lee ◽  
Tai-Won Um

In this paper, we propose an autonomic trust management framework for cloud based and highly dynamic Internet of Things (IoT) applications and services. IoT is creating a world where physical objects are seamlessly integrated in order to provide advanced and intelligent services for humanbeings in their day-to-day life style. Therefore, trust on IoT devices plays an important role in IoT based services and applications. Cloud computing has been changing the way how provides are looking into these issues. Many studies have proposed different techniques to address trust management although non of them addresses autonomic trust management in cloud based highly dynamic IoT systems. To our understanding, IoT cloud ecosystems help to solve many of these issues while enhancing robustness and scalability. On this basis, we came up with an autonomic trust management framework based on MAPE-K feedback control loop to evaluate the level of trust. Finally, we presents the results that verify the effectiveness of this framework.


Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2647
Author(s):  
Stefan Balogh ◽  
Ondrej Gallo ◽  
Roderik Ploszek ◽  
Peter Špaček ◽  
Pavol Zajac

Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.


2019 ◽  
pp. 2134-2144
Author(s):  
Aditya Pratap Singh ◽  
Pradeep Tomar

Cloud computing has proven itself and is accepted in industrial applications. Cloud computing is based on the co-existence and co-working of various technologies and services from different sources that together make cloud computing a success. Over the last few years, the Internet of Things (IoT) has been widely studied and being applied. The blending of these two efficient technologies may provide an intelligent perception about usage of resources on demand and efficient sharing. The adoption of these two different technologies and usage is likely to be more and more pervasive, making them important components of the future internet-based systems. This chapter focuses on the deployment models of cloud computing in relation to IoT. The implications of cloud computing in view of deployment are discussed. The issues for deployment and optimization related to the merger of IoT with cloud computing are raised.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6441 ◽  
Author(s):  
Salam Hamdan ◽  
Moussa Ayyash ◽  
Sufyan Almajali

The rapid growth of the Internet of Things (IoT) applications and their interference with our daily life tasks have led to a large number of IoT devices and enormous sizes of IoT-generated data. The resources of IoT devices are limited; therefore, the processing and storing IoT data in these devices are inefficient. Traditional cloud-computing resources are used to partially handle some of the IoT resource-limitation issues; however, using the resources in cloud centers leads to other issues, such as latency in time-critical IoT applications. Therefore, edge-cloud-computing technology has recently evolved. This technology allows for data processing and storage at the edge of the network. This paper studies, in-depth, edge-computing architectures for IoT (ECAs-IoT), and then classifies them according to different factors such as data placement, orchestration services, security, and big data. Besides, the paper studies each architecture in depth and compares them according to various features. Additionally, ECAs-IoT is mapped according to two existing IoT layered models, which helps in identifying the capabilities, features, and gaps of every architecture. Moreover, the paper presents the most important limitations of existing ECAs-IoT and recommends solutions to them. Furthermore, this survey details the IoT applications in the edge-computing domain. Lastly, the paper recommends four different scenarios for using ECAs-IoT by IoT applications.


Author(s):  
Mustafa Jamal Mahdi ◽  
Abbas Fadhil Aljuboori ◽  
Mudhafar Hussein Ali

In our life technology is important there are two entirely various technologies are cloud computing and the IoT and both are very portion of our lives. They are supposed to be more common in their acceptance and use, making them essential ingredients of the future Internet worldwide. Because of the lack of time in our working life and the follow-up of all operations that we must follow before any match is held on any stadium in the world. An aspect of precautionary measures is discussed here before every match. In this research, a discussion was conducted on how to integrate cloud computing and the IoT and use them to work in developing stadiums in the word and made it smart. Several existing and new models of smart stadium are although explained.


2021 ◽  
Vol 9 (2) ◽  
Author(s):  
Feroz Khan A.B ◽  
◽  
Anandharaj G ◽  

The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. There are numerous applications in different areas such as healthcare, home automation, transportation, military, agriculture, and still so many sectors that incorporate cutting-edge technologies of communication, networking, cloud computing, sensing, and actuation. With this huge increase in the number of connected devices, a strong security mechanism is required to protect the IoT devices. Hence, it is required to focus on the challenges and issues of IoT enabled applications to safeguard the entire network from the outside invasion. This paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT.


2016 ◽  
Author(s):  
Δημήτριος Κελαϊδώνης

Η αλματώδης εξέλιξη των διαδικτυακών τεχνολογιών έχει οδηγήσει στην ανάπτυξη νέων υποδομών που επιτρέπουν την διασύνδεση όλο και περισσότερων συσκευών και μηχανών στο διαδίκτυο. Ο θεαματικά αυξανόμενος αριθμός συσκευών και μηχανών με δυνατότητες διασύνδεσης στο διαδίκτυο έχει οδηγήσει στην εκκίνηση μιας νέας εποχής του διαδικτύου, που αναφέρεται ως το «Διαδίκτυο των Αντικειμένων» - “Internet of Things” (IoT), το οποίο και θα αποτελέσει κύριο κορμό του Μελλοντικού Διαδικτύου. Το μεγάλο πλήθος αντικειμένων, του πραγματικού κόσμου, που δύναται να γίνουν μέρος του IoT, η ποικιλία των δικτύων και των επικοινωνιών που θα πρέπει να υποστηρίζονται, καθώς και οι απαιτήσεις για την παροχή σύνθετων λειτουργικών δυνατοτήτων και IoT υπηρεσιών και εφαρμογών, απαιτούν τον σχεδιασμό, την ανάπτυξη και την χρήση νέων τεχνολογιών που θα καταστήσουν δυνατή την αποτελεσματική διαχείριση ετερογενών IoT υποδομών.Η «αφαιρετικότητα» - “abstraction” αντικειμένων και εφαρμογών αποτελεί ακρογωνιαίο λίθο για την αποτελεσματική υποστήριξη των απαιτήσεων στο IoT, πραγματοποιώντας την ιδέα κατά την οποία, κάθε αντικείμενο που είναι διαθέσιμο, προσβάσιμο και ελέγξιμο στον πραγματικό κόσμο, μπορεί να έχει μια σημασιολογικά εμπλουτισμένη «εικονική αναπαράσταση» – “virtual representation” στο IoT. Για την ανάπτυξη «εικονικών αναπαραστάσεων» - “virtual representations” απαιτείται ο συνδυασμός τεχνικών, μεθοδολογιών και τεχνολογιών από το πεδίο της «εικονικοποίηση» - “virtualization”, για την βασιζόμενη στο λογισμικό αφαιρετικότητα των αντικειμένων και των εφαρμογών, και της «Σημασιολογίας» - “Semantics”, για την ανάπτυξη σημασιολογικών περιγραφών των λειτουργικών δυνατοτήτων των εικονικοποιημένων οντοτήτων. Επιπλέον, η διαχείριση και αξιοποίηση των λειτουργικών δυνατοτήτων των εικονικών αντικειμένων, απαιτεί την εισαγωγή γνωσιακών τεχνολογιών διαχείρισης σε διαφορετικά επίπεδα λειτουργικότητας, κυμαινόμενα από το επίπεδο εικονικών οντοτήτων, στο επίπεδο υπηρεσιών και εφαρμογών.Λαμβάνοντας υπόψη τα παραπάνω, η παρούσα διατριβή εστιάζει στο σχεδιασμό και την ανάπτυξη «Σημασιολογικού Πλαισίου για την αφαιρετικότητα αντικειμένων και εφαρμογών στο Διαδίκτυο του μέλλοντος». Ο αρχιτεκτονικός σχεδιασμός του προτεινόμενου πλαισίου συνδυάζει τεχνολογίες από το χώρο της «Σημασιολογίας» - “Semantics”, της «Γνωσιακής διαχείρισης» – “Cognitive Management”, καθώς και του πεδίου της «εικονικοποίησης»-“Virtualization” και κατ’ επέκταση από το χώρο του «Υπολογιστικού νέφους» - “Cloud Computing”. Τα παραπάνω τεχνολογικά πεδία συνθέτονται προκειμένου να δομήσουν μια καινοτόμο λύση που θα προκύψει ως αποτέλεσμα της παρούσας διατριβής. Στοχεύοντας στη επίτευξη αυτού του στόχου, το προτεινόμενο πλαίσιο εισάγει τις έννοιες της σημασιολογικής μοντελοποίησης και της εικονικοποίησης των αντικειμένων, ως τα στοιχεία που θα επιτρέψουν την αφαιρετικότητα και την ενοποίηση των λειτουργικών δυνατοτήτων των αντικειμένων του πραγματικού κόσμου, αναπτύσσοντας αφαιρετικές εικονικές αναπαραστάσεις που συμπληρώνονται από την σημασιολογική τους περιγραφή. Τα αρχιτεκτονικά δομικά τμήματα «Σημασιολογικής Αφαιρετικότητας και Εικονικοποίηση Αντικειμένων», και «Σημασιολογικού Συστήματος Αποθήκευσης», υποστηρίζουν την εικονικοποίηση και την διαχείριση των σημασιολογικών δεδομένων των σημασιολογικά εμπλουτισμένων εικονικών αναπαραστάσεων, αντιστοίχως. Η γνωσιακή διαχείριση των εικονικών αντικειμένων, υπό τις έννοιες της σύνθεσης και ανάπτυξης τους, καθώς και του ελέγχου τους, για την παροχή σύνθετων λειτουργικών δυνατοτήτων, επιτυγχάνεται από το δομικό τμήμα «Γνωσιακής Διαχείρισης και Σύνθεσης Εικονικών Αντικειμένων». Το τελευταίο δομικό τμήμα, σε συνδυασμό με αυτό της «Γνωσιακής Διαχείρισης Υπηρεσιών», επιτρέπουν την εισαγωγή δυνατοτήτων γνωσιακής διαχείρισης σύνθετων εικονικών οντοτήτων και υπηρεσιών από το προτεινόμενο πλαίσιο. Οι υπηρεσίες προκύπτουν ως αποτέλεσμα και βασίζουν τις λειτουργικές τους δυνατότητες στη σύνθεσης των εικονικών οντοτήτων, παρέχοντας σύνθετες λειτουργικές δυνατότητες που ικανοποιούν τις απαιτήσεις του IoT, υποστηρίζοντας επιπλέον την παροχή προηγμένων IoT εφαρμογών. Επιπροσθέτως, οι αρχές του «Υπολογιστικού Νέφους» υιοθετούνται στα πλαίσια του προτεινόμενου πλαισίου, επιτρέποντας την ανάπτυξη του ως Cloud-IoT υποδομή, εξασφαλίζοντας υψηλή διαθεσιμότητα, αποδοτικότητα και επεκτασιμότητα της υποδομής. Τέλος, βασικός στόχος αυτής της διατριβής είναι να επικυρώσει ότι το «Σημασιολογικό Πλαίσιο» είναι κατάλληλο για την αντιμετώπιση των προκλήσεων του «Μελλοντικού Διαδικτύου».


Sign in / Sign up

Export Citation Format

Share Document