Security Issues and Protective Measures of the Internet of Things Architecture

2013 ◽  
Vol 765-767 ◽  
pp. 1007-1010
Author(s):  
Yun Chang Sang ◽  
Xin Gao

With the development of technology and applications of the Internet of Things, Things technology and industry being the attention from the government to enterprises and research institutions at different levels. The guarantee of Things safety is an important prerequisite to promote the healthy development of the Internet of Things. Articles oriented networking current mainstream architecture research from the three levels of perception layer, transport layer and application layer, the security threat of the Internet of Things, and appropriate security measures, provided for the establishment of the security architecture of the Internet of Things theoretical reference.

Author(s):  
Yash Choudhary ◽  
B Umamaheswari ◽  
Vijeta Kumawat

IoT or the Internet of things refers to all the physical devices connected to the internet. IoT consists of computing devices that are web-enabled and have the capability of sensing, collecting, and sending data. IoT provides the ability to remote control appliances and has many more applications. Since IoT is becoming a big part of society, it is necessary to ensure that these devices provide adequate security measures. This paper discusses various security issues in IoT systems like threats, vulnerabilities and some countermeasures which can be used to provide some security. Developing a secure device is now more important than ever, as with the increase in digitization, much of a user’s data is available on these devices. Securing data is a primary concern in any system, as internet-enabled devices are easier to hack. The idea of this paper is to spread awareness and improve the security of IoT devices.


2013 ◽  
Vol 748 ◽  
pp. 910-914
Author(s):  
Zhong Wei Zhou ◽  
Lei Shi

With the development of Internet of things, the security has become moreand more important. In order to make clear the internet of things existing security threats, provide a theoretical reference for Internet of things Security and privacy protection, this paper summarizes the internet of things security threat and the measures. According to the Internet of things main system frame, research the perception layer, transport layer and application layer seperately, analysis of the network security needs issues, research networking security model, and discuss the content of network security mechanisms, gives the corresponding safety measures and recommendations for all kinds of security threats.


Author(s):  
Alan Fuad Jahwar ◽  
Subhi R. M. Zeebaree

The Internet of Things (IoT) is a paradigm shift that enables billions of devices to connect to the Internet. The IoT's diverse application domains, including smart cities, smart homes, and e-health, have created new challenges, chief among them security threats. To accommodate the current networking model, traditional security measures such as firewalls and Intrusion Detection Systems (IDS) must be modified. Additionally, the Internet of Things and Cloud Computing complement one another, frequently used interchangeably when discussing technical services and collaborating to provide a more comprehensive IoT service. In this review, we focus on recent Machine Learning (ML) and Deep Learning (DL) algorithms proposed in IoT security, which can be used to address various security issues. This paper systematically reviews the architecture of IoT applications, the security aspect of IoT, service models of cloud computing, and cloud deployment models. Finally, we discuss the latest ML and DL strategies for solving various security issues in IoT networks.


2014 ◽  
Vol 989-994 ◽  
pp. 4261-4264 ◽  
Author(s):  
Xiao Feng Wang

According to the current mainstream architecture of the Internet of Things, Makes research on security threat of the Internet of things from the perception layer, network layer and application layer, Gives the corresponding security policies and measures. It provides the theoretical reference for security of the Internet of things and privacy protection.


Author(s):  
Issmat Shah Masoodi ◽  
Bisma Javid

There are various emerging areas in which profoundly constrained interconnected devices connect to accomplish specific tasks. Nowadays, internet of things (IoT) enables many low-resource and constrained devices to communicate, do computations, and make smarter decisions within a short period. However, there are many challenges and issues in such devices like power consumption, limited battery, memory space, performance, cost, and security. This chapter presents the security issues in such a constrained environment, where the traditional cryptographic algorithms cannot be used and, thus, discusses various lightweight cryptographic algorithms in detail and present a comparison between these algorithms. Further, the chapter also discusses the power awakening scheme and reference architecture in IoT for constrained device environment with a focus on research challenges, issues, and their solutions.


2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


2011 ◽  
Vol 403-408 ◽  
pp. 2457-2460 ◽  
Author(s):  
Run Chen ◽  
Cai Ming Liu ◽  
Lu Xin Xiao

Grasping security situation of the Internet of Things (IoT) is useful to work out a scientific and reasonable strategy to defend the IoT security. In the interest of resolving the problems of the security situation sense technology for IoT, a security situation sense model based on artificial immune system for IoT is proposed in this paper. Security threat sense sub-model, formulation mechanism for security threat intensity and security situation assessment sub-model are established. The security threats in the IoT environment are surveyed effectively. Quantitative and accurate assessment for the Real-Time security situation is realized. Theoretical analysis shows that the proposed model is significative of theory and practice.


Sign in / Sign up

Export Citation Format

Share Document