scholarly journals Investigation of Security Challenges from the Perspective of Stakeholders in IoT

2021 ◽  
Vol 20 (2) ◽  
pp. 8-19
Author(s):  
Md Sajid Bin Faisal ◽  
Ahsan Habib ◽  
Md Aolad Hossain ◽  
Cynthia Simin Rashid ◽  
Dip Nandi

Internet of Things (IoT) has become one of the major study concerns and prospects in recent times. The ecosystem that makes the interconnection between person, objects, device in a secured acceptable and useful manner is in the boundary of Internet of Things. One of the major concerns in IoT is its security and the technologies which are working behind. The security measures are taken under a vast amount of studies and applications. The concept of this research is to consider the existing technologies that are working for security assurance and the challenges which are faced by different angles of participants and manufacturers due to make IoT a secure electronic ecosystem. Basically, the focus over the security challenges are on the stakeholders and they are user, manufacturer and service provider.

2021 ◽  
Vol 13 (6) ◽  
pp. 19-39
Author(s):  
Padmashree M G ◽  
Mallikarjun J P ◽  
Arunalatha J S ◽  
Venugopal K R

The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2021 ◽  
Vol 2 (3) ◽  
pp. 1-44
Author(s):  
Akm Iqtidar Newaz ◽  
Amit Kumar Sikder ◽  
Mohammad Ashiqur Rahman ◽  
A. Selcuk Uluagac

Recent advancements in computing systems and wireless communications have made healthcare systems more efficient than before. Modern healthcare devices can monitor and manage different health conditions of patients automatically without any manual intervention from medical professionals. Additionally, the use of implantable medical devices, body area networks, and Internet of Things technologies in healthcare systems improve the overall patient monitoring and treatment process. However, these systems are complex in software and hardware, and optimizing between security, privacy, and treatment is crucial for healthcare systems because any security or privacy violation can lead to severe effects on patients’ treatments and overall health conditions. Indeed, the healthcare domain is increasingly facing security challenges and threats due to numerous design flaws and the lack of proper security measures in healthcare devices and applications. In this article, we explore various security and privacy threats to healthcare systems and discuss the consequences of these threats. We present a detailed survey of different potential attacks and discuss their impacts. Furthermore, we review the existing security measures proposed for healthcare systems and discuss their limitations. Finally, we conclude the article with future research directions toward securing healthcare systems against common vulnerabilities.


Author(s):  
Srikanta kumar Mohapatra ◽  
Pradeepta Kumar Sarangi ◽  
Premananda Sahu ◽  
Bidush Kumar Sahoo ◽  
Prakash Kumar Sarangi ◽  
...  

2017 ◽  
Vol 129 ◽  
pp. 444-458 ◽  
Author(s):  
Ibrar Yaqoob ◽  
Ejaz Ahmed ◽  
Muhammad Habib ur Rehman ◽  
Abdelmuttlib Ibrahim Abdalla Ahmed ◽  
Mohammed Ali Al-garadi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document