Security Breaches and Threat Prevention in the Internet of Things - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

9
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781522522966, 9781522522973

Author(s):  
N. Jeyanthi ◽  
Shreyansh Banthia ◽  
Akhil Sharma

An attempt to do a comparison between the various DDoS attack types that exist by analysing them in various categories that can be formed, to provide a more comprehensive view of the problem that DDoS poses to the internet infrastructure today. Then DDoS and its relevance with respect to IoT (Internet of Things) devices are analysed where attack types have been explained and possible solutions available are analysed. This chapter does not propose any new solutions to mitigating the effects of DDoS attacks but just provides a general survey of the prevailing attack types along with analysis of the underlying structures that make these attacks possible, which would help researchers in understanding the DDoS problem better.


Author(s):  
Jayanta Mondal ◽  
Debabala Swain

Images unduly assist digital communication in this aeon of multimedia. During times a person transmits confidential images over a flabby communication network, sheer protection is an accost contention to preserve the privacy of images. Encryption is one of the practice to clutch the reticence of images. Image encryption contributes a preeminent bite to charter security for secure sight data communication over the internet. Our work illustrates a survey on image encryption in different domains providing concise exordium to cryptography, moreover, furnishing the review of sundry image encryption techniques.


Author(s):  
Kijpokin Kasemsap

This chapter reveals the overview of the Internet of Things (IoT); the IoT, Wireless Sensor Networks (WSNs), and Radio Frequency Identification (RFID); the technology of the IoT; the IoT and security concerns; the information security aspects of the IoT; the applications of the IoT in modern health care; and the implications of the IoT in the digital age. Organizations can utilize the IoT to gain the considerable cost savings by improving asset utilization, enhancing process efficiency, and increasing productivity in global operations. However, the IoT has its own challenges, such as the privacy of personal data, the lack of compatibility, and security breach. The chapter argues that utilizing the IoT and security techniques has the potential to enhance organizational performance and meet security requirements toward threat prevention in global operations.


Author(s):  
H. Parveen Sultana

Internet of Things (IoT) is an emerging area for the researchers. IoT with the combination of thing, gateway, and Internet perform any operation in a smart way. This chapter discusses the importance of Internet of Things in various application areas. It has been elucidated that how IoT can be used effectively in the smart wireless networks. Most of the devices used in the IoT system are of sensor and actuator devices. The architectural model and communication layout of IoT is explicated through appropriate diagrams. A 16 bit and 32 bit microcontroller based processors are used in the IoT devices to send and receive instructions from the machine to machine, people to people and people to machine. As and when changes or any variations occur in the smart environment suitable instructions are forwarded through gateway to execute corrective task.


Author(s):  
B. Balamurugan ◽  
Dyutimoy Biswas

The internet of things (IoT) is an imminent model in the field of wireless telecommunications. It is also considered as a third wave of information technology after the Internet and mobile communication. Basically, IoT is a wireless interconnected network of variety of objects such as radio frequency identification (RFID) tags, sensors, actuators, mobile phones and other types of wireless devices. It has extensible application in the areas such as public security, infrastructure development, modern agriculture, environment protection, urban management, healthcare, enhanced learning, and business service, among others. IoT is a self-configuring wireless network of sensors where the primary goal of establishing connection is to offer interconnectivity of various objects. The concept of IoT was coined by the Auto-Id center of the Massachusetts Institute of Technology (MIT) in 1999


Author(s):  
Somasundaram R ◽  
Mythili Thirugnanam

The fields of computer science and electronics have merged to result into one of the most notable technological advances in the form of realization of the Internet of Things. The market for healthcare services has increased exponentially at the same time security flaws could pose serious threats to the health and safety of patients using wearable technologies and RFID. The volume and sensitivity of data traversing the IoT environment makes dangerous to messages and data could be intercepted and manipulated while in transit. This scenario must absolutely respect the confidentiality and privacy of patient's medical information. Therefore, this chapter presents various security issues or vulnerabilities with respect to attacks and various situations how information will be attacked by the attacker in healthcare IoT. The working principle of healthcare IoT also discussed. The chapter concludes the performance of various attacks based on the past work. In the future this work can be extended to introduce a novel mechanism to resolve various security issues in healthcare IoT.


Author(s):  
Azeddine Bilami ◽  
Somia Sahraoui

The maturity of the IoT depends on the security of communications and the protection of end-user's privacy. However, technological and material heterogeneities, and the asymmetric nature of communications between sensor nodes and ordinary Internet hosts, make the security in this case more problematic. Major problem facing the large deployment of IoT is the absence of a unified architecture and a lack of common agreement in defining protocols and standards for IoT parts. Many solutions have been proposed for the standardization of security concepts and protocols in IoT at different layers. Even though many advances and proposals were made for IoT adaptation as IPv6 for Low Power Wireless Personal Area Network (6LoWPAN), and at application layer with protocols such as XMPP, MQTT, CoAP, etc., security of the IoT remains a very challenging task and an open research topic. This chapter focuses on existing protocols and different proposed mechanisms in literature to secure communications in the IoT.


Author(s):  
R. Thandeeswaran ◽  
Rajat Pawar ◽  
Mallika Rai

The automotive industry has reached a stage categorisation of the degree of the automation has become crucial. According to the levels of automation defined by SAE, the automotive industry is already past the first four and development is now being heavily concentrated on level 5, that is, driving independent of human control. This obviously requires an array of sensors, microcontrollers and visual feedback systems like cameras, LiDAR (Light Detection and Ranging) to be present in the vehicle. With security concerns omnipresent among these devices, they are now ported to the realm of vehicles and must be tackled so that unsafe driving conditions are never experienced. In this paper, Section 3 elaborates upon the technologies that have shaped autonomous cars into the form known today and Section 4 explains the network architecture and network security amongst these cars. Section 5 describes the rippling effect of this evolution in the automotive industry on other supportive industries, Section 6 talks about the challenges posed to the development of AVs and finally, Section 7 discusses the future of autonomous vehicles in India.


Author(s):  
Jasmine Norman ◽  
Paul Joseph

IoT is an acronym for Internet of Things. It is the revolutionary area that transforms the digital world into a device world. IoT helps in not only fulfilling human requirements, but also they act as a communication medium between humans and electronic devices. The birth of IoT started in early 2000s, but since then, it is an amazing fact that now at least 65% of devices are connected with IoT technology with the term “smart” in their prefix and it would be up by 30% at the end of 2016 (Gartner Survey, 2015). Since then, many security issues were raised, and have been risen all these years due to the flaws in that devices. This made attackers to take advantage over that devices and started controlling them. This chapter studies IoT application layer protocols, services offered and gives an idea of existing cyber attacks and threat. In addition, the authors give the possible attacks on the IoT devices, in particular at application layer, and give the necessary precautions to overcome the cyber attacks both for consumers and vendors.


Sign in / Sign up

Export Citation Format

Share Document