Cybersecurity and Power Electronics: Addressing the Security Vulnerabilities of the Internet of Things

2017 ◽  
Vol 4 (4) ◽  
pp. 37-43 ◽  
Author(s):  
Juan Carlos Balda ◽  
Alan Mantooth ◽  
Rick Blum ◽  
Paolo Tenti
2020 ◽  
Author(s):  
Shamim Muhammad ◽  
Inderveer Chana ◽  
Supriya Thilakanathan

Edge computing is a technology that allows resources to be processed or executed close to the edge of the internet. The interconnected network of devices in the Internet of Things has led to an increased amount of data, increasing internet traffic usage every year. Also, edge computing is driving applications and computing power away from the integrated points to areas close to users, leading to improved performance of the application. Despite the explosive growth of the edge computing paradigm, there are common security vulnerabilities associated with the Internet of Things applications. This paper will evaluate and analyze some of the most common security issues that pose a serious threat to the edge computing paradigm.


2017 ◽  
pp. 241-259 ◽  
Author(s):  
Edewede Oriwoh ◽  
Geraint Williams

The Internet of Things (IoT), a metaphor for smart, functional Cyberphysical Environments (CPE), is finding some usefulness in various sectors including healthcare, security, transportation, and the Smart Home (SH). Within the IoT, objects potentially operate autonomously to provide specified services and complete assigned tasks. However, the introduction of new technologies and/or the novel application of existing ones usually herald the discovery of unfamiliar security vulnerabilities, which lead to exploits and sometimes to security breaches. There is existing research that identifies IoT-related security concerns and breaches. This chapter discusses existing Digital Forensics (DF) models and methodologies for their applicability (or not) within the IoT domain using the SH as a case in point. The chapter also makes the argument for smart forensics, the use of a smart autonomous system (tagged the Forensics Edge Management System [FEMS]) to provide forensic services within the self-managed CPE of the SH.


Author(s):  
Parikshit N. Mahalle ◽  
Bayu Anggorojati ◽  
Neeli R. Prasad ◽  
Ramjee Prasad

In the last few years the Internet of Things (IoT) has seen widespreadapplication and can be found in each field. Authentication and accesscontrol are important and critical functionalities in the context of IoTto enable secure communication between devices. Mobility, dynamicnetwork topology and weak physical security of low power devices in IoTnetworks are possible sources for security vulnerabilities. It ispromising to make an authentication and access control attack resistant andlightweight in a resource constrained and distributed IoT environment.This paper presents the Identity Authentication and Capability basedAccess Control (IACAC) model with protocol evaluation and performanceanalysis. To protect IoT from man-in-the-middle, replay and denial ofservice (Dos) attacks, the concept of capability for access control isintroduced. The novelty of this model is that, it presents an integratedapproach of authentication and access control for IoT devices. Theresults of other related study have also been analyzed to validate andsupport our findings. Finally, the proposed protocol is evaluated byusing security protocol verification tool and verification results showsthat IACAC is secure against aforementioned attacks. This paper alsodiscusses performance analysis of the protocol in terms of computationaltime compared to other existing solutions. Furthermore, this paper addresseschallenges in IoT and security attacks are modelled with the use casesto give an actual view of IoT networks.


Author(s):  
Edewede Oriwoh ◽  
Geraint Williams

The Internet of Things (IoT), a metaphor for smart, functional Cyberphysical Environments (CPE), is finding some usefulness in various sectors including healthcare, security, transportation, and the Smart Home (SH). Within the IoT, objects potentially operate autonomously to provide specified services and complete assigned tasks. However, the introduction of new technologies and/or the novel application of existing ones usually herald the discovery of unfamiliar security vulnerabilities, which lead to exploits and sometimes to security breaches. There is existing research that identifies IoT-related security concerns and breaches. This chapter discusses existing Digital Forensics (DF) models and methodologies for their applicability (or not) within the IoT domain using the SH as a case in point. The chapter also makes the argument for smart forensics, the use of a smart autonomous system (tagged the Forensics Edge Management System [FEMS]) to provide forensic services within the self-managed CPE of the SH.


2019 ◽  
Vol 11 (3) ◽  
pp. 1-22 ◽  
Author(s):  
Junaid Latief Shah ◽  
Heena Farooq Bhat ◽  
Asif Iqbal Khan

The Internet of Things (IoT) is seen as a novel paradigm enabling ubiquitous and pervasive communication of objects with each other and with the physical/virtual world via internet. With the exponential rise of sensor and RFID-based communication, much data is getting generated; which becomes arduous to manage given the constrained power and computation of low-powered devices. To resolve this issue, the integration of Cloud and IoT, also known as CloudIoT, is seen as panacea to create more heterogeneous smart services and handle increasing data demands. In this article, the authors examine and survey literature with a focus on the integration components of CloudIoT and present diverse applications including driving factors for CloudIoT integration. The article also identifies security vulnerabilities implied by the integration of Cloud and IoT and outlines some suggested measures to mitigate the challenge. Finally, the article presents some open issues and challenges providing potential directions for future research in this area.


2019 ◽  
Vol 13 (2) ◽  
pp. 312-321
Author(s):  
José Custodio Najar-Pacheco ◽  
John Alexander Bohada-Jaime ◽  
Wilmar Yovany Rojas-Moreno

The Internet of Things has allowed the connection of a countless number of devices, which has facilitated control and even decision-making by them, but at the same time security vulnerabilities in operating systems, wireless security protocols, its applications, as well as the vulnerabilities in IoT, acronym in English of Internet of Things, devices, have allowed considerable sums of money to be paid to health institutions and patients for allowing the functionality of their equipment, according to security experts the world is facing a perfect storm which can allows attacks and system hijackings increasing in number, volume and gravity, since when adding more devices, they become access doors for intruders. However, it is important to be aware that everything that connects to the Internet is vulnerable; it has been demonstrated since birth, as well as the IoT.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2019 ◽  
pp. 4-44 ◽  
Author(s):  
Peter Thorns

This paper discusses the organisations involved in the development of application standards, European regulations and best practice guides, their scope of work and internal structures. It considers their respective visions for the requirements for future standardisation work and considers in more detail those areas where these overlap, namely human centric or integrative lighting, connectivity and the Internet of Things, inclusivity and sustainability.


Sign in / Sign up

Export Citation Format

Share Document