To see the other types of publications on this topic, follow the link: Internet of Things (IoT) Security.

Journal articles on the topic 'Internet of Things (IoT) Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet of Things (IoT) Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Malge, Sunilkumar, and Pallavi Singh. "Internet of Things IoT: Security Perspective." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (2019): 1041–43. http://dx.doi.org/10.31142/ijtsrd24010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shivani, Ramesh Sharma. "Internet of Things IoT IoT in Healthcare." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 980–82. https://doi.org/10.31142/ijtsrd23971.

Full text
Abstract:
IoT is a modest way to elevate our production and yield with the help of internet. We can supervise and control and communicate with the help of internet. Internet Of Things imagines a future physical and digital entities are to be linked by proper information and communication technologies which will sanction new class of applications and services. In this survey we will ensure a survey of applications and research difficulties for Internet Of Things in Healthcare. Shivani Ramesh Sharma "Internet of Things (IoT): IoT in Healthcare" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23971.pdf
APA, Harvard, Vancouver, ISO, and other styles
3

Dorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.

Full text
Abstract:
Recently, it has become important to integrate cybersecurity threat management policies in the management of any organization that uses information systems, whether large, medium or even small organizations. People live in the center of the field of smart homes, business opportunities of smart industrial cities and healthcare. Even as IoT security issues become increasingly ubiquitousin the industrial realm, they face the added challenge of evolving networks. Architecture towards the integration of information technology (IT) and operational technology (OT) networks. This article analyzes the underlying cybersecurity risks, attack landscape in the Industrial IoT (IIoT), and suggests possible countermeasures for future hybrid IoT applications, based on lessons learned from IIoT projects. Security is essential for IoT systems to protect sensitive data and infrastructure, while security issues are becoming increasingly costly, especially in the industrial sector. The domains of the Internet of Things (IIoT). With this in mind, the issue of cybersecurity has become paramount for the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) to mitigate cybersecurity risks for organizations and end users. New cybersecurity technologies and applications have improved IoT security management. However, there is a disparity in the effectiveness of solutions for IoT cyber risks. Key Words: Cybersecurity; Computer security; IT security; Internet of things (IoT); Safety; Industrial internet of things (IIoT); Blockchain and SDN (Software Defined Networking); 5G
APA, Harvard, Vancouver, ISO, and other styles
4

IORDACHE, Dorin. "INTERNET OF THINGS SECURITY FRAMEWORK." STRATEGIES XXI - Security and Defense Faculty 17, no. 1 (2021): 287–93. http://dx.doi.org/10.53477/2668-2001-21-36.

Full text
Abstract:
It was unimaginable for a non-professional user that access data to personal e-mail, bank or identity accounts could be stolen via a mobile phone interface or connection, no more than twenty years ago. Nowadays, people with bad intentions – hacker – can use smart devices, such as: webcams, microwaves, refrigerators, door controllers, and others, generically we named it IoT[1], to access accounts like the ones mentioned above, without much effort. The Internet of Things is the place where devices are digitally interconnected, interacts with almost every domain. IoT development is closely correlated with growing of Internet. These issues have generated an unprecedented upward trend in Wi-Fi and IoT interconnecting networks. Cyber-security has gained new meanings because of the increasing number and scope of IoT devices. By developing these devices, especially among regular users, it is necessary to improve their security more than ever. How prepared are regular users and how can they protect themselves in the context of IoT penetration into their daily lives? it is a question that needs to be answered, in terms of the actions it can take immediately or in the long run.
 
 [1] IoT - Internet of Things
APA, Harvard, Vancouver, ISO, and other styles
5

Đekić, Milica. "The Internet of Things security challenges." Tehnika 75, no. 6 (2020): 678–83. http://dx.doi.org/10.5937/tehnika2005678d.

Full text
Abstract:
The Internet of Things (IoT) is a quite recent paradigm going a decade back to the past. With the development and deployment of wireless technologies this new advancement has taken the part in the consumers' lives and businesses. In other words, the IoT is a pretty convenient way to correlated devices with each other and make them communicate in such a network. This is feasible using the internet connection and differently saying, all IoT devices forming the IoT asset got their IP addresses. From this perspective, it's quite clear that this technology got a lot of advantages and the users may feel so thankful for being the part of an IoT community. On the other hand, the consumers would spend less time thinking about the possible security concerns being linked to this new improvement. In this paper, we intend to discuss how secure our IoT infrastructure is, what its strategic implications are and why cyber industry should invest more time and effort in order to better research and develop this concept. In addition, we would try to deal a bit more with the IoT crawlers as the tools for investigating the IoT network and being so handy for both - researchers and hacker's groups.
APA, Harvard, Vancouver, ISO, and other styles
6

Минаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.

Full text
Abstract:
Одной из основных проблем при обеспечении безопасности Интернета вещей (IoT) является, с одной стороны, огромное количество устройств, масштабирующее угрозы и риски безопасности их использования, а с другой – слабая разработанность или даже отсутствие стандартизированных протоколов безопасности. Нередко устройства IoT имеют ограниченную вычислительную мощность и память в угоду цене и коммерческой выгоде, что затрудняет реализацию надежных мер безопасности. Расширение IoT достигло критической инфраструктуры - системы здравоохранения, транспорта и других особо важных отраслей. Поскольку современные устройства IoT имеют доступ к персональной и конфиденциальной информации, нарушения их информационной безопасности могут иметь весьма серьезные последствия, поэтому крайне важно обосновать и реализовать надежные меры безопасности для их защиты от компьютерных атак. Проводится сравнительный анализ основных сетевых протоколов IoT. Выделяются наиболее вероятные компьютерные атаки на устройства IoT: нарушение безопасности сети, нарушение безопасности устройства, физический доступ к устройству, сбои в работе устройства, технологии социальной инженерии. Рассматриваются следующие меры для обеспечения безопасности устройств IoT: совершенствование нормативно-правовой базы; обучение и повышение квалификации сотрудников; развитие взаимодействия с производителями IoT; улучшение мониторинга IoT-устройств; улучшение методов анализа данных, связанных с функционированием IoT. Для реализации предложенных мер приводятся программные и аппаратные решения задач безопасности IoT-устройств. One of the main problems in ensuring the security of the Internet of Things (IoT) is, on the one hand, a huge number of devices that scale the threats and security risks of their use, and on the other hand, weak development or even lack of standardized security protocols. Often, IoT devices have limited computing power and memory for the sake of price and commercial benefits, which makes it difficult to implement reliable security measures. The expansion of IoT has reached critical infrastructure - healthcare, transport and other particularly important areas. Since modern IoT devices have access to personal and confidential information, violations of their information security can have very serious consequences, therefore it is extremely important to justify and implement reliable security measures to protect them from computer attacks. A comparative analysis of the main IoT network protocols is carried out. The most likely computer attacks on IoT devices are highlighted: network security violation, device security violation, physical access to the device, device malfunctions, social engineering technologies. The following measures to ensure the security of IoT devices are considered: improvement of the regulatory and legal framework; training and professional development of employees; development of interaction with IoT manufacturers; improvement of monitoring of IoT devices; improvement of data analysis methods related to the functioning of IoT. To implement the proposed measures, software and hardware solutions to the security problems of IoT devices are provided.
APA, Harvard, Vancouver, ISO, and other styles
7

Choi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (2019): 752. http://dx.doi.org/10.3390/electronics8070752.

Full text
Abstract:
The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, resulting in serious damage to human life and property. Therefore, we aim to study a method to increase the security of IoT devices and effectively extend them simultaneously. To this end, we analyze the authentication methods and limitations of traditional IoT devices and examine cases for improving IoT environments by using blockchain technology. Accordingly, we propose a framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist. The method proposed in this paper restricts the extension of devices vulnerable to security risks by imposing penalties and allows only devices with high security to be securely and quickly authenticated and extended without user intervention. In this study, we applied the proposed method to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments.
APA, Harvard, Vancouver, ISO, and other styles
8

Raimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.

Full text
Abstract:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited, as far as machine resources are concerned. In this way, traditional security does not fit in IoT systems. The issue of cybersecurity has become paramount to the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) in mitigating cybersecurity risk for organizations and end users. New cybersecurity technologies/applications present improvements for IoT security management. Nevertheless, there is a gap in the effectiveness of IoT cyber risk solutions. This review article discusses the literature trends around opportunities and threats in cybersecurity for IIoT, by reviewing 70 key articles discovered from a profound Scopus literature survey. It aims to present the current debate around the issue of IIoT rather than suggesting any particular technical solutions to solve network security problems.
APA, Harvard, Vancouver, ISO, and other styles
9

Masyhur, Zulkarnaim, Firmansyah Ibrahim, and Didit Hermawan. "Internet of Things (IoT): Security, Threats and Countermeasures." Journal Software, Hardware and Information Technology 2, no. 2 (2022): 15–20. http://dx.doi.org/10.24252/shift.v2i2.31.

Full text
Abstract:
Internet of Things (IoT) is a technology that is very popular lately and is starting to get busy in Indonesia, marked by various cellphone manufacturers building an IoT ecosystem. IoT can help connect objects such as sensors, vehicles, hospital instruments, household appliances and others. However, connecting these smart devices to the internet network causes various data security problems because internet technology and communication protocols have not been specifically designed to support IoT devices. The leakage of data security through the commercialization of IoT devices, causes privacy problems, threats of cyber-attacks, and organized crime. This paper aims to educate about how data security attacks in IoT and how to overcome them. To achieve this goal, we first discuss various well-known IoT reference models and define security in the context of IoT. Second, identify and classify various IoT attacks and threats. Third, described methods of countermeasures against IoT attacks. In the end, it provides some tips on securing IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
10

Wenceslaus Ritte, James. "Security Concerns in Internet of Things." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.

Full text
Abstract:
Security Concerns is the among of the significant challenges of Internet of thing (IoT). Lack of proper Device updates, lack of User awareness, Software compatibility issues, service disruption, inability to monitor their current status and software are Among the challenges that IoT is facing. In this work we are going to explore significant areas of IoT applications and security measures and identify management of Machine to Machine(M2M), Platform selection criteria, Knowledge of How data is managed on various IoT applications which includes (i) IoT in healthcare (ii) Blood Banks. In this work provide valuable insights into issues related to streamline workflows, predict necessary maintenance, analyze usage patterns, auto- mate manufacturing, and much more.
APA, Harvard, Vancouver, ISO, and other styles
11

Sunilkumar, Malge, and Singh Pallavi. "Internet of Things IoT Security Perspective." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1041–43. https://doi.org/10.31142/ijtsrd24010.

Full text
Abstract:
In the past decade, internet of things IoT has been a focus of research. It makes more intelligent to core element of modern world such as hospitals, cities, organizations, and buildings. Usually, IoT has four major components including sensing, information processing, applications and services, heterogeneous access and additional components e.g. Security and privacy. In this paper, we are presenting security perspective from the perspective of layers that comprises IoT. In this we focus on the overview of IoT security perspective. Sunilkumar Malge | Pallavi Singh "Internet of Things (IoT): Security Perspective" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24010.pdf
APA, Harvard, Vancouver, ISO, and other styles
12

Yang, Wencheng, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli. "Biometrics for Internet-of-Things Security: A Review." Sensors 21, no. 18 (2021): 6163. http://dx.doi.org/10.3390/s21186163.

Full text
Abstract:
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
13

Jadhav, Ajay, Sagar Khot, Sana Bagwan, and Vanmala Kadam. "Security Factors affecting Internet of Things." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 900–903. http://dx.doi.org/10.22214/ijraset.2022.48031.

Full text
Abstract:
Abstract: Internet of things (IoT) is the following huge thing in the networking field. The vision of IoT is to connect day by day used gadgets that have the capacity of sensing and actuation to the internet. This can or may additionally or might not contain human. In this paper we are able to go through all of the demanding situations of IOT and mainly focus on IOT safety undertaking. IoT entails adding net connectivity to a system of interrelated computing gadgets, mechanical and digital machines, items, animals and/or people. Each "component" is furnished a completely unique identifier and the capability to automatically switch statistics over a community. Allowing devices to connect with the internet opens them as much as some of severe vulnerabilities if they're now not nicely included.
APA, Harvard, Vancouver, ISO, and other styles
14

Şükür oğlu Əhmədov, İlham. "SMART HOMES BASED ON INTERNET OF THINGS TECHNOLOGY: CLASSIFICATION OF SECURITY RISKS." SCIENTIFIC RESEARCH 08, no. 4 (2022): 211–15. http://dx.doi.org/10.36719/2789-6919/08/211-215.

Full text
Abstract:
Əşyaların İnterneti (IoT) insan fəaliyyətinin bütün sahələrinə tətbiq edilə bilən texnoloji yenilikdir. İnternet artıq təhsil, kommunikasiya, biznes, elm, hökumət və bəşəriyyətə böyük təsiri olan bütün bəşər tarixinin ən mühüm və güclü yaradılışlardan biridir. IoT İnternetin növbəti təkamülünü təmsil etməklə, məlumata, biliyə və nəticədə müdrikliyə çevrilə biləcəyimiz üçün məlumatları toplamaq, təhlil etmək və yaymaq qabiliyyətinə malik böyük bir sıçrayışdır. Bu kontekstdə IoT-un öyrənilməsi olduqca əhəmiyyətlidir. Məqalədə Əşyaların İnterneti (IoT) anlayışı, ağıllı ev, ağıllı evlərdə təhlükəsizlik risklərinin təsnifatı məsələləri araşdırılmışdır. Açar sözlər: İnternet, Əşyaların İnterneti (IoT), ağıllı ev, təhlükəsizlik tədbirləri, proqram təminatı Ilham Shukur Ahmedov SMART HOMES BASED ON INTERNET OF THINGS TECHNOLOGY: CLASSIFICATION OF SECURITY RISKS Abstract The Internet of Things (IoT) is a technological innovation that can be applied to all areas of human activity. The Internet is already one of the most important and powerful creations in human history, with a profound impact on education, communication, business, science, government and humanity. Representing the next evolution of the Internet, IoT is a great leap forward in our ability to collect, analyze, and disseminate information so that we can turn it into information, knowledge, and eventually wisdom. In this context, the study of IoT is very important. This article examines the concept of Internet of Things (IoT), smart home, classification of security risks in smart homes. Key words: Internet, Internet of Things (IoT), smart home, security measures, software
APA, Harvard, Vancouver, ISO, and other styles
15

Javida Damirova, Javida Damirova, and Laman Musayeva Laman Musayeva. "INTERNET OF THINGS." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 13, no. 02 (2022): 33–43. http://dx.doi.org/10.36962/pahtei13022022-33.

Full text
Abstract:
This article will discuss the Internet of things, which is a completely new technology. Currently, the world's most talked about new electronics use Internet of Things technology. This technology includes Google, Yandex, YouTube and all our social networks. The current benefits of Internet of Things technology will be discussed, as well as its future position. What is the role of smart technologies in the development of robotics, new electronics and the impetus for new inventions? The Internet of Things is a new paradigm that transforms traditional lifestyles into high-tech lifestyles. Many important studies and researches have been conducted to improve the technology through IoT. The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. The main purpose of this review article is to provide a detailed discussion, both technologically and socially. It is not just about the connected devices but also about the hardware, software, connectivity and communication protocols, middleware and so much more to create Internet of Things solutions as mentioned. And it’s also about many processes and technologies. So, this is most important theme in our world. The article discusses various problems and key issues in IoT, architecture and important applications. The Internet of Things is an emerging paradigm that enables the communication between electronic devices and sensors through the internet in order to facilitate our lives. IoT has also demonstrated its importance and potential for economic and industrial growth in the developing region. It is also seen as a revolutionary step in the trading and stock markets. However, data and information security is an important concern and is highly desirable, which is a major challenge that needs to be addressed. The Internet, the biggest source of security threats and cyber attacks, has opened various doors for hackers, thereby discrediting information and data. IoT is committed to providing the best possible solutions to deal with data and information security issues. IoT's most important concern in trade and the economy is security. The IoT system consists of a large number of devices and sensors that communicate with each other. They can range from a Wi-Fi pet camera on your bookshelf to a medical device implanted in your body, like a pacemaker. As long as the device is able to connect to the internet and has sensors that transmit data, it can be considered an IoT device. As the IoT network grows and expands, the number of these sensors and devices is growing rapidly. These devices communicate with each other and transmit large amounts of information over the Internet. This information is very large and flows every second, and therefore deserves to be called great information. The IoT was initially most interesting to business and manufacturing, where its application is sometimes known as machine-to-machine (mean - M2M), but the emphasis is now on filling our homes and offices with smart devices, transforming it into something. Today, these IoT projects are evolving and rapidly spreading to all platforms. It is possible to find IoT projects for each topic. As mentioned earlier, IoT projects are designed to make life easier. These projects, created to help as many people as possible, will be the most important part of our future lives. It will be impossible to imagine our lives without the Internet of Things and smart projects. A smart city with sensors covering all its regions using diverse tangible gadgets and objects all over the community and connected with the help of internet. The continuous expansion of IoT-based networks poses complex challenges such as data management and collection, storage and processing, and analytics. This article sheds light on the existing literature and describes their contributions to various aspects of IoT. This article will help readers and researchers understand IoT and its application to the real world Keywords: arduino, sensors, security systems, robotics, intelligent technology.
APA, Harvard, Vancouver, ISO, and other styles
16

Tiwari,, Arun. "Security and Privacy Analysis in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.

Full text
Abstract:
The concept of the Internet of Things (IoT) promises to make all electronic devices smart, connected and capable of functioning together seamlessly courtesy of a worldwide network that links virtual elements with physical ones. Every IoT item in this network has a unique identification number to indicate its position in this system. In addition, connectivity is important for effective coordination with some low-tech gadgets. In this chapter, we shall be discussing the relevant IoT systems and security issues related to them including privacy, security attacks, means of securing IoT environments as well as appropriate models for privacy and security in IoT. This paper looks at various privacy concerns as well as security problems that emanate from the internet of things like data breaches, identity thefts and unauthorized entries. Finally, it also discusses multiple approaches that can be adopted to minimize these risks such as using techniques like data protection, access control and encryption etc. Keywords Internet of Things (IoT), Data Privacy, Physical security, Device Access
APA, Harvard, Vancouver, ISO, and other styles
17

U. Harita, Ms, and K. V.DayaSagar. "A survey on secured internet of things architecture." International Journal of Engineering & Technology 7, no. 2.7 (2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.

Full text
Abstract:
The Internet of Things (IoT) introduces an inventive and perceptive of a future Internet where users, computing systems, and everyday items owning sensing and actuating abilities cooperate with unique comfort and financial advantages. Many heterogeneous devices get connected and contribute to the IoT and are known as things.Internet of Things (IoT) enables these things to correspond, compute and make decisions on the network. In such a heterogeneous environment, every user of IoT will have a unique purpose to be served in the form of communication and computation. There is a threat that a malicious user can demolish the security and privacy of the network. Hence any application in the environment of IoT is prone to various attacks and threats. At this point, security becomes a high priority in IoT. To ensure security, care must be taken to guarantee confidentiality, authenticity, data integrity and non-repudiation. In this paperaddress various conventional techniques for providing security of IoT devices and present analysis of existing solutions for IoT. Firstly, as security will be a fundamental allowing thing of most IoT applications, mechanisms must also be designed to defend communications enabled by such technologies. Later, we identify some suitable security algorithms.
APA, Harvard, Vancouver, ISO, and other styles
18

Kovalenko, O. Ye. "Security models of the Internet of Things." Mathematical machines and systems 4 (2023): 43–50. http://dx.doi.org/10.34121/1028-9763-2023-4-43-50.

Full text
Abstract:
The IoT is a cyber-convergent system that includes things, means of communication, target ap-plications, and data analysis tools that support the unique identification of each object. IoT technologies play a vital role in the creation of cyber-convergent systems due to their wide us-age in various spheres of life such as industry, social sphere, health care, and creating a com-fortable environment. The IoT security model method ensures the confidentiality, integrity, and availability of data that is transferred between devices and also guarantees the privacy and secu-rity of end users. The creation and use of IoT systems directly affect the security and privacy of the involved and connected components. The presented study introduces an analysis of IoT ar-chitecture models with end-to-end security support. The conducted literature review reveals the challenges of various aspects of security faced by the IoT environment. Some models imple-menting different security strategies at different layers of the IoT are described. These include the perception layer which provides the authentication process for identifying IoT entities, the network layer which focuses on the security processes of cloud platforms, and the application layer which provides authentication and authorization for end users. The results of the analysis show that building secure IoT systems is based on three main strategies: proper configuring and ensuring the protection of all IoT devices; using secure wireless networks to connect IoT devic-es to corporate or global networks; constant situational awareness of security threats to IoT de-vices; and implementing appropriate security solutions to protect them from attacks. The ma-turity model of the IoT security system based on the ISA/IEC 62443 document package is also described.
APA, Harvard, Vancouver, ISO, and other styles
19

P, Vivekanand, and Kamal Kumar Srivastava Dr. "Cyber security in the age of internet of things." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 836–41. https://doi.org/10.5281/zenodo.14246392.

Full text
Abstract:
Intelligent objects in the IoT are made up of a wide variety of sensors, networks, electrical devices, and process technologies that all work together to offer consumers with efficient and insightful services. The concept of a "smart city," in which residents enjoy improved quality of life thanks to cutting-edge infrastructure, has been presented as a means of addressing urban issues. The goal of this article is to present a comprehensive evaluation of IoT technology, with special attention paid to its potential for harm in the areas of privacy and security. Researchers are studying the services provided and the difficulties of IoT to improve the efficacy of Smart Cities. When it comes to ICT, there is still some room for improvement between theory and practice. Security and privacy needs of IoT users have been established to bring attention to the most pressing issues facing this demographic. This IoT privacy and security research makes use of a systematic literature review by searching for relevant publications across a variety of electronic databases and other sources, entering the material into a custom database, and producing summary tables. Collection of studies. As a result, the article provides a concise summary of the most recent developments in IoT privacy and security, draws attention to the most pressing problems, and makes recommendations for further study.
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.

Full text
Abstract:
The Internet of Things (IoT) represents a significant transformation in how devices communicate and interact, offering unprecedented convenience and efficiency. However, this interconnected environment also introduces substantial security challenges. Traditional network security measures are often inadequate for IoT environments due to their unique characteristics, such as resource constraints and diverse device types. This paper explores the current state of network security in the IoT era, examines the specific challenges posed by IoT environments, and presents innovative solutions and best practices for securing IoT networks. Through comprehensive analysis and experimental data, we demonstrate the effectiveness of these solutions in mitigating security risks associated with IoT.Specifically, we investigate the implementation of lightweight cryptography for resource-constrained devices, the use of blockchain technology for secure and decentralized authentication, the application of machine learning algorithms for anomaly detection, and the integration of fog computing to enhance real-time security services. Experimental results indicate significant improvements in security posture and performance, validating the proposed methodologies as viable solutions for IoT security challenges.
APA, Harvard, Vancouver, ISO, and other styles
21

Saidkulovich, Sanjar Muminov, Husanboy Shoraimov Uktamboyevich, and Umarbek Akramov Farkhodugli. "Internet-of-things security and vulnerabilities: Iot security, iot taxonomy." ACADEMICIA: An International Multidisciplinary Research Journal 11, no. 3 (2021): 620–24. http://dx.doi.org/10.5958/2249-7137.2021.00676.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Burhade, Samruddhi S., and Sonal N. Deshmukh. "Security Privacy in Internet of Things(IOT)." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (2018): 57. http://dx.doi.org/10.23956/ijarcsse.v7i12.504.

Full text
Abstract:
The Internet Of Things(IOT) is interconnection between identifiable embedded computing devices. Internet of Things is highly on the rise from smart cities, environment, health, energy, vehicle, transport, public safety to our daily essentials. Internet of Things has completely revitalized these areas. IOT expect the advanced connectivity with devices services. This paper highlighted the security and privacy aspect of IOT and various security threats which are given in each concept related to IOT. Various techniques are used for security and privacy of IOT devices and easy to adapt by users.
APA, Harvard, Vancouver, ISO, and other styles
23

Galatenko, V. A., and K. A. Kostyukhin. "IoT Information Security: Fundamental Statements Review." Programmnaya Ingeneria 11, no. 5 (2020): 259–69. http://dx.doi.org/10.17587/prin.11.259-269.

Full text
Abstract:
Internet of things technology is developing at an exceptionally fast pace. This applies to both industrial and consumer Internet. The "things" account for billions, and many areas of application have been formed. At the same time, the state of information security of the Internet of things is not satisfactory, and protective measures are clearly inferior to Commerce. This is especially dangerous because the Internet of things spans two worlds: digital and physical, and security breaches can cause both informational and physical damage. The Internet of things is developing rapidly, so it is natural that it experiences typical growth diseases-fragmentation and uneven development. The base for ensuring security is mostly formed (but continues to be formed), the question is how quickly there will be a harmonization of approaches, and advanced ideas will be accepted by device manufacturers. Many state and non-state agencies actively promote security tools, inform and train manufacturers and consumers. The article is an overview of the main provisions of information security of the Internet of things. An attempt is made to consider software and technical and legislative levels of Internet of things security. This makes it different from other publications of a similar nature. Only a holistic, integrated approach can improve real information security. Authors outline basic concepts and describe a reference model of Internet of things, draw attention to the peculiarities of the Internet of things that are important from the security point of view, enumerate typical threats for Internet of things. The legislative level of information security, security recommendations for the Internet of things, manufacturers description of usage, and installation of software corrections are considered in detail.
APA, Harvard, Vancouver, ISO, and other styles
24

Hasan*, Md Aaqeel, Dr Jaypal Medida, and N. Laxmi Prasanna. "Sliding Window Protocol for Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 3 (2021): 46–54. http://dx.doi.org/10.35940/ijrte.c6417.0910321.

Full text
Abstract:
Internet of Things (IoT) refers to the concept of connecting non-traditional computers and related sources with the help of the internet. This includes incorporating basic computing and communication technologies for daily use into Physical things. Security and Confidentiality are two major challenges in IoT. In the current security mechanisms available for IoT, the limitations in the memory, energy resources, and CPU of IoT devices compromises the critical security specifications in IoT devices. Also, the centralized architectures for security are not appropriate for IoT because of a Single attack point. It is costly to defend against attacks targeted on centralized infrastructure. Therefore, it is important to decentralize the IoT security architecture to meet the requirements of resource constraints. Blockchain is a decentralized encryption system with a large number of uses. However, because of its high computational complexity and poor scalability, the Traditional Blockchain environment is not suitable for IoT applications. So, we introduce a Sliding window protocol to the traditional blockchain so that it will better suit the applications in the IoT environment. Changing the conventional blockchain and introducing a sliding window to it makes it use previous blocks in proof of work to shape the next hash block. SWBC's results are analyzed on a data stream generated from an IoT testbed (Smart Home) in real-time. The results show that the proposed sliding window protocol improves security and reduces memory overhead and consumes fewer resources for Security.
APA, Harvard, Vancouver, ISO, and other styles
25

Md., Aaqeel Hasan, Medida Jaypal, and Laxmi Prasanna. N. "Sliding Window Protocol for Internet of Things." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 3 (2021): 46–54. https://doi.org/10.35940/ijrte.C6417.0910321.

Full text
Abstract:
Internet of Things (IoT) refers to the concept of connecting non-traditional computers and related sources with the help of the internet. This includes incorporating basic computing and communication technologies for daily use into Physical things. Security and Confidentiality are two major challenges in IoT. In the current security mechanisms available for IoT, the limitations in the memory, energy resources, and CPU of IoT devices compromises the critical security specifications in IoT devices. Also, the centralized architectures for security are not appropriate for IoT because of a Single attack point. It is costly to defend against attacks targeted on centralized infrastructure. Therefore, it is important to decentralize the IoT security architecture to meet the requirements of resource constraints. Blockchain is a decentralized encryption system with a large number of uses. However, because of its high computational complexity and poor scalability, the Traditional Blockchain environment is not suitable for IoT applications. So, we introduce a Sliding window protocol to the traditional blockchain so that it will better suit the applications in the IoT environment. Changing the conventional blockchain and introducing a sliding window to it makes it use previous blocks in proof of work to shape the next hash block. SWBC's results are analyzed on a data stream generated from an IoT testbed (Smart Home) in real-time. The results show that the proposed sliding window protocol improves security and reduces memory overhead and consumes fewer resources for Security. 
APA, Harvard, Vancouver, ISO, and other styles
26

Mr., Kottureswara M. S. "Blockchain for the Internet of Things (IoT)." Journal of Scholastic Engineering Science and Management 1, no. 3 (2021): 34–40. https://doi.org/10.5281/zenodo.8312887.

Full text
Abstract:
<strong>The Internet of Things (IoT) is a rapidly growing network of interconnected devices that collect and exchange data. However, the IoT faces a number of challenges, such as security, privacy, and scalability. Blockchain technology can be used to address these challenges and improve the security, privacy, and scalability of IoT systems. This paper provides a comprehensive overview of the use of blockchain for the IoT. The paper begins by discussing the benefits of using blockchain for the IoT. It then reviews the existing literature on blockchain for the IoT. The paper then presents a survey of the different blockchain-based IoT systems that have been proposed. Finally, the paper discusses the challenges and future research directions for blockchain for the IoT.</strong>
APA, Harvard, Vancouver, ISO, and other styles
27

Navod, Neranjan Thilakarathne. "Security and Privacy Issues in IoT Environment." International Journal of Engineering and Management Research 10, no. 1 (2020): 26–29. https://doi.org/10.31033/ijemr.10.1.5.

Full text
Abstract:
<strong>&nbsp;Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically decreasing so everyone can afford the technology. As Internet of Things provides a great opportunity to develop an important industrial systems and applications with the help of various kind of sensors that can sense out the environment using number of devices that is connected to the internet, usage of IoT is drastically increasing and becoming a common thing. With this sky-rocketed usage and the demand, Communication and storing of the information faces serious security issues as the security of IoT devices become just an afterthought when manufacturing most of the devices. This study tries to summarize this IoT security issues in terms of primary information security concepts confidentiality, integrity and availability with regards to its architecture.</strong>
APA, Harvard, Vancouver, ISO, and other styles
28

Zhou, Juncheng. "Network Security Applications in the Internet of Things." Applied and Computational Engineering 109, no. 1 (2024): 139–44. http://dx.doi.org/10.54254/2755-2721/2024.17894.

Full text
Abstract:
In the realm of Internet of Things (IoT) network security, encryption algorithms serve as one of the core means to protect data and device security. Given the extensive connectivity of IoT devices to the Internet, ensuring security becomes a paramount challenge. Encryption algorithms effectively guarantee confidentiality, integrity, and authentication during data transmission while thwarting malicious attackers from unauthorized access or tampering. Therefore, this paper proposes employing hash storage for encrypting IoT data to enhance its protection. The subsequent sections will demonstrate how the data is stored and encrypted through code implementation. The method adopted in this research involves writing code and testing code to assess its reliability in terms of security measures. This investigation reveals that utilizing hash storage encryption of data provides a robust means for managing data securely within an IoT framework; moreover, longer encrypted data lengths contribute to enhanced security levels with the adoption of the SHA-256 algorithm.
APA, Harvard, Vancouver, ISO, and other styles
29

Biedermann, Christopher. "Cybersecurity and the Internet of Things." Zagadnienia Informacji Naukowej - Studia Informacyjne 54, no. 2(108) (2016): 22–36. http://dx.doi.org/10.36702/zin.301.

Full text
Abstract:
PURPOSE/THESIS: The purpose of this paper is to use a recent cyber-attack to highlight the current state of readiness of Internet of Things (IoT) technologies with regard to security vulnerabilities as well as fundamental – in the author’s opinion – changes that will need to take place within these industries and technologies to mitigate the overall cybersecurity risk. APPROACH/METHODS: The analysis of the findings from numerous existing published security studies. RESULTS AND CONCLUSIONS: The following conclusions were reached: (1) in the world becoming more and more interconnected through the web enabled devices (IoT devices), new forms of security threats have been developed; (2) at present IoT devices introduce a high level of vulnerability; (3) many of these risks may be mitigated with already existing technologies; (4) however, due to the fragmented and heterogeneous nature of the IoT devices, the implementation of even basic levels of security is more challenging than in the case of traditional Internet connected devices (e.g. personal computers); (5) the industry needs to face and address three key issues that will in turn help to mitigate the unique security threats posed by IoT devices, namely: the drive towards open standards, the industry cooperation and consolidation, and the improvement of consumer awareness. ORIGINALITY/VALUE: The value of the research is to highlight the security issues related to the Internet of Things and propose solutions that must be implemented to increase the level of security awareness within the IoT environment.
APA, Harvard, Vancouver, ISO, and other styles
30

Eltayeb, Mohamed A. "Internet of Things." International Journal of Hyperconnectivity and the Internet of Things 1, no. 1 (2017): 1–18. http://dx.doi.org/10.4018/ijhiot.2017010101.

Full text
Abstract:
In the contemporary world, we are surrounded by a complex network of interconnected sensors. These allows us to share, collate, transmit, and store vast amounts of data. These systems are known as the Internet of Things (IoT), and this technological offering has attracted a large amount of interest from academics, researchers, and developers in recent years due to its highly scalable and agile nature. However, while the IoT delivers significant benefits, it also poses some risks. The data that is stored and exchanged via the IoT is extremely valuable to individuals who have malevolent intent. In more recent years, the increasing popularity of the IoT as a means of sharing information has been associated with privacy and security risks that have undermined users' trust in the IoT. This paper examines what these risks are and some of the actions that can be taken to mitigate them.
APA, Harvard, Vancouver, ISO, and other styles
31

Raghuvanshi, Abhishek, Umesh Kumar Singh, Thanwamas Kassanuk, and Khongdet Phasinam. "Internet of Things: Security Vulnerabilities and Countermeasures." ECS Transactions 107, no. 1 (2022): 15043–52. http://dx.doi.org/10.1149/10701.15043ecst.

Full text
Abstract:
People's lives will be transformed by the Internet of Things (IoT), which connects everything from smart phones and sensors to the cloud to mobile apps and web-based controls. Security concerns are on the rise as the number of heterogeneous devices and data processing grows. Most IoT apps and devices are also well-known for their security flaws, making them vulnerable to many forms of attacks. To further complicate matters, threats have variable consequences on the device's security and quality. Unfortunately, enterprises are having difficulty determining which risks they face from their data assets and how to mitigate them. To better identify IoT security risks, this article has built a taxonomy based on the application domain and the design of the architecture. Servers, clients, IoT development boards, sensors, cloud subscriptions, and other components all play a role in this test setup. Vulnerability and network host scanning technologies are used to obtain raw data relevant to IoT-based smart city projects. This article also includes a mitigation approach for IoT network flaws.
APA, Harvard, Vancouver, ISO, and other styles
32

Wu, Qi Wu, and Ling Zhi Jiang. "A Flexible Security Architecture for the Internet of Things." Applied Mechanics and Materials 241-244 (December 2012): 3255–59. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.3255.

Full text
Abstract:
Security architecture is the key problem of each network construction, Internet of things (IoT) is no exception. Firstly, existing research results in relation to security architecture of IoT are summarized. Then, on the basis of the analysis of the IoT security problem, this paper discusses the network security service requirements of IoT. Finally, a novel hierarchical and flexible secure architecture for IoT is proposed, which includes the security perception layer, security network layer and security application layer. Meanwhile, it involves security services entity and security management entity. The security architecture can provide strong technical support for security construction of IoT.
APA, Harvard, Vancouver, ISO, and other styles
33

Nurrisma. "Information System Security Analysis in the Internet of Things (IoT) Era." Journal Informatic, Education and Management (JIEM) 5, no. 1 (2023): 16–20. http://dx.doi.org/10.61992/jiem.v5i1.71.

Full text
Abstract:
The presence of the Internet of Things (IoT) has provided a new foundation in the development of information systems, but has also raised new challenges related to information security. This research aims to analyze the level of information system security in the context of the IoT era. The research methods used include an in-depth literature survey and critical analysis of security frameworks relevant to IoT. The research results show that while IoT offers great potential to increase efficiency and convenience, it also opens up new avenues for complex and serious security attacks. Security threats related to IoT include network attacks, data theft, and unauthorized access. To overcome this challenge, a holistic and layered approach is needed in securing information systems connected via IoT. The importance of implementing strong security protocols, data encryption, and continuous monitoring of IoT networks cannot be overstated. In conclusion, the success of widespread IoT implementation will be largely determined by efforts to strengthen the security of the information systems involved.
APA, Harvard, Vancouver, ISO, and other styles
34

Sonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.

Full text
Abstract:
The IOT is changing the way we communicate and interact across businesses, enabling unprecedented productivity, efficiency, and data storage simulation. Development of IOT has brought many benefits but also significant challenges to network security. This article explores the key challenges in securing IoT environments, including device diversity, limited budgets, lack of security protocols, and vulnerability of transmitted information. Evaluate solutions such as the use of lightweight encryption algorithms, zerotrust architectures, and AI driven security systems to assess their potential effectiveness. The findings of this study highlight requirement of a multilayered and adaptive approach to securing the IoT ecosystem that can counter current and emerging threats.
APA, Harvard, Vancouver, ISO, and other styles
35

Savytska, Liudmyla, Tetiana Korobeinikova, Oleh Kostiuk, Iryna Kolesnyk, and Oleksandr Dudnyk. "INTERNET OF THINGS PROTECTION MEANS IN THE CORPORATE COMPUTER NETWORK." Information technology and computer engineering 59, no. 1 (2024): 83–93. http://dx.doi.org/10.31649/1999-9941-2024-59-1-83-93.

Full text
Abstract:
This work pertains to the analysis and enhancement of security measures for the Internet of Things (IoT) in corporate computer networks. The Internet of Things encompasses a wide range of data, including personal information, making the issue of security during their transmission highly relevant. The primary goal of the research is the development of an advanced technological design for the IoT system to ensure a high level of security and confidentiality of information. The modern world of the Internet of Things demands an analysis and improvement of IoT security in corporate computer networks. In the process of analysis, publicly available information sources and scientific approaches were utilized, including contemporary scientific publications, analytical reports, and resources from leading companies, such as Cisco, specializing in network equipment and configuration of corporate networks. This approach allows for the consideration of the latest trends and technological solutions in the field of IoT security. One of the key issues addressed is the development of an extended and improved technological design for the IoT system. Considering the constant evolution of technologies, it is essential to ensure a high level of adaptability and flexibility of security measures to effectively operate in various conditions and circumstances. An additional emphasis is placed on studying the impact of an extended and improved technological design of the IoT system. It is crucial to establish synergy between new technological solutions and existing network structures to achieve maximum effectiveness in enhancing security and efficiency. Therefore, the scientific work focuses on a comprehensive analysis and implementation of cutting-edge security measures for IoT in corporate networks, taking into account contemporary trends and data security requirements.
APA, Harvard, Vancouver, ISO, and other styles
36

Li, Shancang, Theo Tryfonas, and Honglei Li. "The Internet of Things: a security point of view." Internet Research 26, no. 2 (2016): 337–59. http://dx.doi.org/10.1108/intr-07-2014-0173.

Full text
Abstract:
Purpose – The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications. Design/methodology/approach – Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management. Findings – IoT calls for new security infrastructure based on the new technical standards. As a consequence, new security design for IoT shall pay attention to these new standards. Security at both the physical devices and service-applications is critical to the operation of IoT, which is indispensable for the success of IoT. Open problems remain in a number of areas, such as security and privacy protection, network protocols, standardization, identity management, trusted architecture, etc. Practical implications – The implications to various applications including supervisory control and data acquisition, enterprise systems, social IoT are discussed. The paper will serve as a starting point for future IoT security design and management. The security strategies for IoT should be carefully designed by managing the tradeoffs among security, privacy, and utility to provide security in multi-layer architecture of IoT. Originality/value – The paper synthesizes the current security requirements for IoT and provides a clear framework of security infrastructure based on four layers. Accordingly, the security requirements and potential threats in the four-layer architecture are provided in terms of general devices security, communication security, network security, and application security.
APA, Harvard, Vancouver, ISO, and other styles
37

Alasmary, Hisham. "RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things." Mathematics 11, no. 12 (2023): 2710. http://dx.doi.org/10.3390/math11122710.

Full text
Abstract:
The Internet of Things (IoT) has experienced significant growth and is now a fundamental part of the next-generation Internet. Alongside improving daily life, IoT devices generate and collect vast amounts of data that can be leveraged by AI-enabled big data analytics for diverse applications. However, due to the machine-to-machine communication inherent in IoT, ensuring data security and privacy is crucial to mitigate various malicious cyber attacks, including man-in-the-middle, impersonation, and data poisoning attacks. Nevertheless, designing an efficient and adaptable IoT security framework poses challenges due to the limited computational and communication power of IoT devices, as well as their wide-ranging variety. To address these challenges, this paper proposes an Access Key Agreement (AKA) scheme called the “Reliable Device-Access Framework for the Industrial IoT (RDAF-IIoT)”. RDAF-IIoT verifies the user’s authenticity before granting access to real-time information from IIoT devices deployed in an industrial plant. Once authenticated at the gateway node, the user and IIoT device establish a session key for future encrypted communication. The security of the proposed RDAF-IIoT is validated using a random oracle model, while the Scyther tool is employed to assess its resilience against various security attacks. Performance evaluations demonstrate that the proposed scheme requires lower computational and communication costs compared to related security frameworks while providing enhanced security features.
APA, Harvard, Vancouver, ISO, and other styles
38

Azrour, Mourade, Jamal Mabrouki, Azidine Guezzaz, and Ambrina Kanwal. "Internet of Things Security: Challenges and Key Issues." Security and Communication Networks 2021 (September 14, 2021): 1–11. http://dx.doi.org/10.1155/2021/5533843.

Full text
Abstract:
Internet of Things (IoT) refers to a vast network that provides an interconnection between various objects and intelligent devices. The three important components of IoT are sensing, processing, and transmission of data. Nowadays, the new IoT technology is used in many different sectors, including the domestic, healthcare, telecommunications, environment, industry, construction, water management, and energy. IoT technology, involving the usage of embedded devices, differs from computers, laptops, and mobile devices. Due to exchanging personal data generated by sensors and the possibility of combining both real and virtual worlds, security is becoming crucial for IoT systems. Furthermore, IoT requires lightweight encryption techniques. Therefore, the goal of this paper is to identify the security challenges and key issues that are likely to arise in the IoT environment in order to guide authentication techniques to achieve a secure IoT service.
APA, Harvard, Vancouver, ISO, and other styles
39

Surianarayanan, Chellammal, and Pethuru Raj Chelliah. "Integration of the Internet of Things and Cloud." International Journal of Cloud Applications and Computing 13, no. 1 (2023): 1–30. http://dx.doi.org/10.4018/ijcac.325624.

Full text
Abstract:
The integration of IoT and cloud poses increased security challenges. Implementing security mechanisms in IoT systems is challenging due to the availability of limited resources, large number of devices, heterogeneity of devices, generation of bulk data, etc. Likewise, cloud resources are also vulnerable to security issues due to virtualization, insider threats, data loss, data breaches, insecure APIs, etc. Security is of major concern with the integration of IoT and cloud. The primary objective of this review is to highlight the security issues associated with an IoT system and cloud system and with the integration of the two, as well as to highlight solutions in each case. The secondary objective is to describe popular IoT-cloud platforms and also to highlight how such platforms facilitate secure integration. Ultimately a highlight on a shared responsibility model of implementing security is emphasized as both IoT users and cloud service providers have to cooperatively share the responsibility to deploy secure cloud-based IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
40

Yousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.

Full text
Abstract:
Purpose Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that need to be addressed from the perspective of new architectures such as software defined networking, cryptographic algorithms, federated cloud and edge computing. Design/methodology/approach The paper analyzes the IoT security from three perspectives: three-layer security architecture, security issues at each layer and security countermeasures. The paper reviews the current state of the art, protocols and technologies used at each layer of security architecture. The paper focuses on various types of attacks that occur at each layer and provides the various approaches used to countermeasure such type of attacks. Findings The data exchanged between the different devices or applications in the IoT environment are quite sensitive; thus, the security aspect plays a key role and needs to be addressed efficiently. This indicates the urgent needs of developing general security policy and standards for IoT products. The efficient security architecture needs to be imposed but not at the cost of efficiency and scalability. The paper provides empirical insights about how the different security threats at each layer can be mitigated. Originality/value The paper fulfills the need of having an extensive and elaborated survey in the field of IoT security, along with suggesting the countermeasures to mitigate the threats occurring at each level of IoT protocol stack.
APA, Harvard, Vancouver, ISO, and other styles
41

Odame, Frederick Asumang. "Privacy Preserving Internet of Things (IoT) Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 109–12. http://dx.doi.org/10.22624/aims/crp-bk3-p18.

Full text
Abstract:
The Internet of Things (IoT) envisions a network of pervasive, connected, and intelligent nodes that interact autonomously and provide a variety of services. IoT objects were a perfect target for cyber assaults because of their wide dispersion, openness, and relatively high processing power. Furthermore, because many IoT nodes collect and process personal or private data, they are becoming a goldmine of information for cybercriminals. As a result, security, particularly the ability to detect compromised nodes, as well as the collection and preservation of evidence of an attack or malicious activity, emerge as a top priority in the effective deployment of IoT networks. Key words: Information Security, IoT, Privacy Preserving, Cyber Security, Cyber Criminals
APA, Harvard, Vancouver, ISO, and other styles
42

Rajasekhar, J., T. Thanusha, G. Naga Jyothi, K. Tejaswi, and Laith Abualigah. "IoT based security and privacy implementation in smart home." Applied and Computational Engineering 44, no. 1 (2024): 202–7. http://dx.doi.org/10.54254/2755-2721/44/20230067.

Full text
Abstract:
Internet-of-Things technology is being increasingly important in our daily lives. As IoT technology evolved, IoT devices face a data protection hazard, particularly smart home IoT gateway devices, which became evident. The demand for a low-cost, secure smart home gateway device or router among smart home users. The problem is that as the internet of things (IoT) becomes more ubiquitous, there is a growing need to simplify wireless network control mechanisms. Because data collecting and the process includes processes such as monitoring, judging, and controlling are all involved in IoT, the control mechanism is challenging to simplify. Many internets of things technology offer memory and communication capabilities, and are easily vulnerable to hacking, due to the mobile software available at the tip of one's fingers to operate the linked gadgets to the web. In the Internet of Things, secure data transfer is always a concern. To increase safety in IoT and wireless networks, the current study introduces a unique RSA-based method, as well as the AES algorithm and the lightweight protocol message queue telemetry transport (MQTT).
APA, Harvard, Vancouver, ISO, and other styles
43

Adamova, A., T. Zhukabayeva, and Khu Ven-Tsen. "Internet of Things: Security and Privacy standards." Bulletin of L.N. Gumilyov Eurasian National University Technical Science and Technology Series 144, no. 3 (2023): 29–40. http://dx.doi.org/10.32523/2616-7263-2023-144-3-29-40.

Full text
Abstract:
Ensuring security in the interaction of the Internet of Things (IoT) has focused the attention of many researchers. At present, the issue of standards is a very complex and important one that directly affects both the development and implementation of the Internet of Things in everyday life. There are many standards and protocols that may not be consistent across different layers of the architecture. This paper provides an overview of the current International Internet of Things Security Standards, which are discussed in various aspects such as terminology, architecture models, security and integration scenarios, classification and protocols. A comparative analysis of standards and related research is conducted to help inform decisions about the security of IoT systems during their development and production. This research aims to overcome the difficulties encountered and develop practical recommendations for the selection of controls and security of connected IoT devices. The research methodology included identification of gaps in IoT standards, analysis of existing problems and proposed solutions.
APA, Harvard, Vancouver, ISO, and other styles
44

Kaur, Rasmeet, B. L. Raina, and Avinash Sharma. "Internet of Things: Architecture, Applications, and Security Concerns." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2468–74. http://dx.doi.org/10.1166/jctn.2020.8917.

Full text
Abstract:
Internet of Things (IoT) appears to be a signature phrase in the field of Information technology. The term immensely strikes our lives. It becomes more recognized in recent years. Today we are experiencing technology called IoT which is revolutionizing almost every branch of activity. Internet of things envisaged as a network of billions of objects amenable to communicate with one another. The Internet of Things strives to a malgamate all the devices under one roof. These devices can be monitored and controlled at any moment. They can communicate, exchange information and perform the desired operations. Taking note of this, the paper addresses the IoT concept using analysis of research papers, corporate persuasive reports, scholarly review articles, and online databases. Furthermore, the paper comes up with an overview of IoT including definition, Genesis, the chronology of IoT, Obligations for IoT, Aliases, architecture and different technologies regularly used in IoT in a systematic approach. The paper also discusses the application areas of its and security concerns.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhang, Jiayi. "Design of Security Chips in the IoT Ecosystem." Highlights in Science, Engineering and Technology 70 (November 15, 2023): 306–15. http://dx.doi.org/10.54097/hset.v70i.12478.

Full text
Abstract:
With the rapid growth of IoT devices, security issues are becoming increasingly prominent. The main research object of this article is the Internet of Things security chip. In response to the difficulties faced by the current Internet of Things security and the importance of Internet of Things security, this article mainly introduces the basic design principles of Internet of Things security chips, and provides a detailed introduction to the structures and applications of three classic models: TEE, HSM, and TPM. In addition, comparative analysis was conducted on these models. IoT security is a highly challenging field that requires comprehensive consideration of security issues at different levels and stages. The IoT security chips play a crucial role in ensuring the security and data privacy of IoT devices. In the future, IoT security chips may be combined with emerging technologies such as blockchain, artificial intelligence, and quantum encryption to enhance security and credibility.
APA, Harvard, Vancouver, ISO, and other styles
46

Toth, Andreas. "Internet of Things Vulnerabilities in Military Environments." Vojenské rozhledy 30, no. 3 (2021): 45–58. http://dx.doi.org/10.3849/2336-2995.30.2021.03.045-058.

Full text
Abstract:
IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.
APA, Harvard, Vancouver, ISO, and other styles
47

Chehal, Naman, and Karandeep Singh. "Security & Privacy Challenges in IOT Based Smart Homes." International Journal of Engineering Research in Computer Science and Engineering 9, no. 3 (2022): 13–18. http://dx.doi.org/10.36647/ijercse/09.03.art003.

Full text
Abstract:
The Internet of Things (IoT) is a collection of Internet-connected networks, objects, and gadgets. Internally and outwardly, it interacts with the surroundings. The Internet of Things (IoT) detects and reacts to its surroundings. It provides modern approaches to the environment, hence improving mankind's quality of life. IoT enables devices to communicate with one another either in person or online. The Internet of Things (IoT) allows the environment to become smarter and connect with any device at any one time. People nowadays desire to use the Internet to converse with all non-living entities. The Internet of Things (IoT) is used to collect and analyse data from numerous actuators and sensors and then it is analysed before being sent wirelessly to cellphones or computers connection
APA, Harvard, Vancouver, ISO, and other styles
48

MaryJohn Rukmony, Sheeba, and Suganthi Gnanamony. "Rough set method-cloud internet of things: a two-degree verification scheme for security in cloud-internet of things." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 2233. http://dx.doi.org/10.11591/ijece.v13i2.pp2233-2239.

Full text
Abstract:
The quick development of innovations and increasing use of the internet of things (IoT) in human life brings numerous challenges. It is because of the absence of adequate capacity resources and tremendous volumes of IoT information. This can be resolved by a cloud-based architecture. Consequently, a progression of challenging security and privacy concerns has emerged in the cloud based IoT context. In this paper, a novel approach to providing security in cloud based IoT environments is proposed. This approach mainly depends on the working of rough set rules for guaranteeing security during data sharing (rough set method-cloud IoT (RSM-CIoTD)). The proposed RSM-CIoTD conspire guarantees secure communication between the user and cloud service provider (CSP) in a cloud based IoT. To manage unauthorized users, an RSM-CIoTD scheme utilizes a registered authority which plays out a two-degree confirmation between the network substances. The security and privacy appraisal techniques utilize minimum and maximum trust benefits of past communication. The experiments show that our proposed system can productively and safely store the cloud service while outperforming other security methods.
APA, Harvard, Vancouver, ISO, and other styles
49

Sheeba, MaryJohn Rukmony, and Gnanamony Suganthi. "Rough set method-cloud internet of things: a two-degree verification scheme for security in cloud-internet of things." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 2233–39. https://doi.org/10.11591/ijece.v13i2.pp2233-2239.

Full text
Abstract:
The quick development of innovations and increasing use of the internet of things (IoT) in human life brings numerous challenges. It is because of the absence of adequate capacity resources and tremendous volumes of IoT information. This can be resolved by a cloud-based architecture. Consequently, a progression of challenging security and privacy concerns has emerged in the cloud based IoT context. In this paper, a novel approach to providing security in cloud based IoT environments is proposed. This approach mainly depends on the working of rough set rules for guaranteeing security during data sharing (rough set method-cloud IoT (RSM-CIoTD)). The proposed RSM-CIoTD conspire guarantees secure communication between the user and cloud service provider (CSP) in a cloud based IoT. To manage unauthorized users, an RSM-CIoTD scheme utilizes a registered authority which plays out a two-degree confirmation between the network substances. The security and privacy appraisal techniques utilize minimum and maximum trust benefits of past communication. The experiments show that our proposed system can productively and safely store the cloud service while outperforming other security methods.
APA, Harvard, Vancouver, ISO, and other styles
50

Sachin, Upadhyay. "ONGOING CHALLENGES AND RESEARCH OPPORTUNITIES IN INTERNET OF THINGS (IOT)." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (2018): 216–22. https://doi.org/10.5281/zenodo.1202147.

Full text
Abstract:
The Internet of Things (IoT) opens opportunities for handheld devices, home appliances, and software to share and communicate information on the Internet. Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This &ldquo;Internet of Things (IoT)&rdquo; infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper. We begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters. The future is Internet of Things, which will transform the real world objects into intelligent virtual objects.The Internet of Things (IoT) opens opportunities for handheld devices, home appliances, and software to share and communicate information on the Internet. Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This &ldquo;Internet of Things (IoT)&rdquo; infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper. We begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters. The future is Internet of Things, which will transform the real world objects into intelligent virtual objects.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography