Enhancing Security in Internet of Things Environment by Developing an Authentication Mechanism using COAP Protocol

2021 ◽  
Author(s):  
Samah Mohammed S ALhusayni ◽  
Wael Ali Alosaimi

Internet of Things (IoT) has a huge attention recently due to its new emergence, benefits, and contribution to improving the quality of human lives. Securing IoT poses an open area of research, as it is the base of allowing people to use the technology and embrace this development in their daily activities. Authentication is one of the influencing security element of Information Assurance (IA), which includes confidentiality, integrity, and availability, non repudiation, and authentication. Therefore, there is a need to enhance security in the current authentication mechanisms. In this report, some of the authentication mechanisms proposed in recent years have been presented and reviewed. Specifically, the study focuses on enhancement of security in CoAP protocol due to its relevance to the characteristics of IoT devices and its need to enhance its security by using the symmetric key with biometric features in the authentication. This study will help in providing secure authentication technology for IoT data, device, and users.

Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


2021 ◽  
Vol 9 (1) ◽  
pp. 17-28
Author(s):  
Siddhartha Vadlamudi

The evolvement of IT has open new doors in connecting many devices to the worldwide web that successively produce data around the physical setting using the IoT. However, the system of message turns out to be slightly intricate in human specialization-internet of things communication for the reason that the IoT is a system including diverse objects transferring data This study examines the hypothetical pathway by which the changes in source attribution that is multiple against single and specialization that is multi-functionality against single functionality of IoT devices affect the quality of human- internet of things interaction. The result from the study obtained from 80 participants that took part in the experiment shows that multiple source attribution improves the condition of information basically for the low-involvement people supports further probes the multiple source effects. However, this study recommends improvement of attribution source and human specialization-IoT.


internet of things is now everywhere and even if people are aware of it or not, it is part of our everyday life. For something that is so much in pace with our life, iot collects a lot of information about our day today life, which in case of a data leak or hijacking could lead to catastrophic effects in the society. Still iot devices are not manufactured keeping in mind the security factor. This paper dives into the problem of spoofing attacks dealt by iot devices and comes up with an authentication mechanism, which uses variants of elliptic curve cryptography to protect against such said attacks without exhausting the devices in case of computational power and storage area. The experimentation clearly revealed the strength of the scheme to mitigate spoofing attacks on the iot home networks.


Author(s):  
Yong Kyu Lee

This chapter reviews the internet of things (IoT) as a key component of a smart city and how it is applied to consumers' daily lives and business. The IoT is a part of information and communication technology (ICT) and is considered a powerful means to improve consumers' quality of life. The “thing” could be any object which has internet capability, such as wearable devices and smart TVs/phones/speakers. Several studies have identified driving factors that have led consumers to adopting them, but also concerns of consumers' resistance to IoT devices. The three major fields of application of IoT technologies were selected to review the role of the IoT in consumers' daily lives and business.


Telecom IT ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. 20-25
Author(s):  
Y. Avakyan ◽  
R. Kirichek ◽  
V. Kulik

This paper discusses methods for testing data channels under a functional load of traffic generated by devices and applications of the Internet of things. The research of data channels is carried out according to the following quality of service parameters: throughput, network latency, network jitter, packet loss percentage. To measure these parameters, it is proposed to use the following types of testing: stress testing, benchmark testing. A model network including devices and application of the Internet of things was developed to define functional load models. The considered methods can be used to develop sys-tems for testing data channels of the Internet of things.


2020 ◽  
Vol 8 (6) ◽  
pp. 3387-3392

IoT has become one of the most prominent used industry which is been intensively used in various applications across the globe. This usage has also made it more vulnerable to numerous attacks from within and outside the industry. Though this remains as one of the most predominant challenges in almost all of the industries, most of the organizations fail to allocate security budgets in order to secure their sub-networks from being misused and attacked. One of the most important aspects of this drawback is the unawareness of various upcoming IoT devices and infrastructures that are not technically sound enough to handle and meet the challenges caused by the various attacking methods. Implementation of highly secure IoT based infrastructure could basically produce various other benefits that include obtaining greater revenues from new inculcated methods and models while minimizing the operational costs by making use of the various optimized processes. This, in turn, leads to various meaningful and accurate data with a better knowledge of user experience. In order to develop such an IoT infrastructure, all the organizations have to mandatory build built-in security checks in each and every level of the applications being used by them. The paper presents a new design model that is used for securing all the devices from various malicious attacks. The paper also compares the newly designed model with the existing model and has proved the betterment of the security level that is been achieved.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Dmitry Kozyrev ◽  
Aleksandr Ometov ◽  
Dmitri Moltchanov ◽  
Vladimir Rykov ◽  
Dmitry Efrosinin ◽  
...  

Today, the number of interconnected Internet of Things (IoT) devices is growing tremendously followed by an increase in the density of cellular base stations. This trend has an adverse effect on the power efficiency of communication, since each new infrastructure node requires a significant amount of energy. Numerous enablers are already in place to offload the scarce cellular spectrum, thus allowing utilization of more energy-efficient short-range radio technologies for user content dissemination, such as moving relay stations and network-assisted direct connectivity. In this work, we contribute a new mathematical framework aimed at analyzing the impact of network offloading on the probabilistic characteristics related to the quality of service and thus helping relieve the energy burden on infrastructure network deployments.


Sign in / Sign up

Export Citation Format

Share Document