security of iot
Recently Published Documents


TOTAL DOCUMENTS

89
(FIVE YEARS 60)

H-INDEX

6
(FIVE YEARS 3)

2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 530
Author(s):  
Woei-Jiunn Tsaur ◽  
Jen-Chun Chang ◽  
Chin-Ling Chen

Internet of Things (IoT) device security is one of the crucial topics in the field of information security. IoT devices are often protected securely through firmware update. Traditional update methods have their shortcomings, such as bandwidth limitation and being attackers’ easy targets. Although many scholars proposed a variety of methods that are based on the blockchain technology to update the firmware, there are still demerits existing in their schemes, including large storage space and centralized stored firmware. In summary, this research proposes a highly secure and efficient protection mechanism that is based on the blockchain technology to improve the above disadvantages. Therefore, this study can reduce the need of storage space and improve system security. The proposed system has good performance in some events, including firmware integrity, security of IoT device connection, system security, and device anonymity. Furthermore, we confirm the high security and practical feasibility of the proposed system by comparing with the existing methods.


Author(s):  
Nurussabah Mohammad Fahim

Abstract: The number of Internet of Things (IoT) devices in smart homes is rapidly increasing, generating massive volumes of data that is mostly transmitted over wireless communication channels. The amount of data released by these gadgets increased as well. Aside from the increasing volume, the IoT gadget generates a significant amount of data. Having varied data quality characterised by its speed in terms of time and position in various different modalities dependence. However, different IoT devices are vulnerable to different dangers, such as cyber-attacks and changing network conditions. Data leakage, connections, and so on. The properties of IoT nodes, on the other hand, make the current solutions obsolete. inadequate to cover the entire security range of IoT networks Machine learning can help in this situation. Algorithms can be useful in detecting irregularities in data, which improves the security of IoT systems. The methods are aimed at the data anomalies that exist in the smart Internet in general.


2021 ◽  
Vol 11 (6) ◽  
pp. 7757-7762
Author(s):  
K. Aldriwish

Internet of Things (IoT) -based systems need to be up to date on cybersecurity threats. The security of IoT networks is challenged by software piracy and malware attacks, and much important information can be stolen and used for cybercrimes. This paper attempts to improve IoT cybersecurity by proposing a combined model based on deep learning to detect malware and software piracy across the IoT network. The malware’s model is based on Deep Convolutional Neural Networks (DCNNs). Apart from this, TensorFlow Deep Neural Networks (TFDNNs) are introduced to detect software piracy threats according to source code plagiarism. The investigation is conducted on the Google Code Jam (GCJ) dataset. The conducted experiments prove that the classification performance achieves high accuracy of about 98%.


Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2647
Author(s):  
Stefan Balogh ◽  
Ondrej Gallo ◽  
Roderik Ploszek ◽  
Peter Špaček ◽  
Pavol Zajac

Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.


Author(s):  
Pawan Vishwakarma

IoT is the component which is set up between advanced machines and associated gadgets. It is an interrelated framework where every thing has a novel identifier and consequently moves information and works the framework which works in the internet. Be that as it may, it isn't protected to leave the gadgets open since programmers or infections can undoubtedly assault or cut the information of the concerned individual or client. Various high-profile episodes where a typical IoT gadget was utilized to invade and assault the bigger organization has caused to notice the requirement for IoT security. Lacking information insurance (correspondence and capacity) The most regular worries in the information security of IoT applications are because of shaky interchanges and information stockpiling. One of the critical difficulties for IoT protection and security is that compromised gadgets can be utilized to get to classified information. It is basic to guaranteeing the security of organizations with IoT gadgets associated with them. Security in IoT is the demonstration of getting Internet of Things gadgets and the organizations they're associated with. In the business setting, IoT gadgets incorporate modern machines, keen energy networks, building mechanization, in addition to whatever individual IoT gadgets representatives bring to work. This scope of gadgets can present security hazards that can undermine your business. Every now and again planned without security, IoT gadgets have become another danger vector for agitators to utilize when dispatching assaults. We have effectively seen a few assaults utilizing these disseminated, apparently blameless gadgets. IoT security, incorporates a wide scope of procedures, systems, conventions and activities that intend to alleviate the expanding IoT weaknesses of present day organizations. In this paper the theoretical investigation of safety issues in IoT is given


Sign in / Sign up

Export Citation Format

Share Document