Low-Energy Security: Limits and Opportunities in the Internet of Things

2015 ◽  
Vol 13 (1) ◽  
pp. 14-21 ◽  
Author(s):  
Wade Trappe ◽  
Richard Howard ◽  
Robert S. Moore
Author(s):  
Promise Agbedanu ◽  
Anca Delia Jurcut

In this era of explosive growth in technology, the internet of things (IoT) has become the game changer when we consider technologies like smart homes and cities, smart energy, security and surveillance, and healthcare. The numerous benefits provided by IoT have become attractive technologies for users and cybercriminals. Cybercriminals of today have the tools and the technology to deploy millions of sophisticated attacks. These attacks need to be investigated; this is where digital forensics comes into play. However, it is not easy to conduct a forensic investigation in IoT systems because of the heterogeneous nature of the IoT environment. Additionally, forensic investigators mostly rely on evidence from service providers, a situation that can lead to evidence contamination. To solve this problem, the authors proposed a blockchain-based IoT forensic model that prevents the admissibility of tampered logs into evidence.


Energies ◽  
2021 ◽  
Vol 14 (17) ◽  
pp. 5381
Author(s):  
Zbysław Dobrowolski

Energy firms are the beneficiaries and initiators of innovation, and energy investments are a crucial area of business activity that is specially protected in any country. This is no wonder, as energy security is the basis for the functioning of states and economies. The Internet of Things and Big Data create both new challenges and new threats. This study aimed to identify the potential threats and determine preventive measures, as well as to establish the agile principles related to energy firms’ logistics. The method of the narrative summary in combination with the literature searching method was used. Two conclusions emerged: first, research serves to develop the discipline of management science; second, the identification of risks associated with innovation serves practitioners. In addition, the study defined further research directions.


Fog Computing ◽  
2018 ◽  
pp. 54-81
Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

This Chapter provides several comparable studies of some of the major evolving and enabling wireless technologies in the Internet of Things (IoT). Particularly, it focuses on the ZigBee, 6lowpan, Bluetooth Low Energy, LTE, and the different versions of Wi-Fi protocols including the IEEE 802.11ah. The studies, reported in this chapter, evaluate the capabilities and behaviors of these technologies in terms of various metrics including the data range and rate, network size, RF Channels and Bandwidth, Antenna design considerations, Power Consumption, and their Ecosystem. It is concluded that the requirements of each IoT application play a significant role in the selection of a suitable wireless technology.


In this paper, a review on the LoRa antenna design for IoT application is studied. The expansion of the Internet of Things ( IoT) has led the industry to develop new communication solutions, as current protocols are inadequate in terms of scope and energy efficiency to satisfy IoT requirements. Before studying antenna design, some background LoRa and IoT were discussed at beginning of the paper. LoRaWAN is an open LPWAN standard developed by LoRa Alliance and has main characteristics such as low energy consumption, long-range communication, builtin protection and GPS-free positioning. Besides, a comparison according to the method, resonance frequency, material, size of the antenna and the output is shown in the form of table. In addition, the strength and the weakness of each of the antenna design were discussed before the end of the paper.


IEEE Network ◽  
2014 ◽  
Vol 28 (6) ◽  
pp. 83-90 ◽  
Author(s):  
Johanna Nieminen ◽  
Carles Gomez ◽  
Markus Isomaki ◽  
Teemu Savolainen ◽  
Basavaraj Patil ◽  
...  

2021 ◽  
Vol 27 (2) ◽  
Author(s):  
O.C. Ngige ◽  
C.E. Chibudike ◽  
D.O. Omotosho

This paper accesses the Internet of Things (IoT) in conjunction with the emergence of Wireless Technologies. Internet of Things (IoT) refers to a type of network to connect anything with the Internet, based on stipulated protocols through information sensing equipment to conduct information exchange and communications; in order to achieve smart recognitions, positioning, tracing, monitoring, and administration. This investigates the Internet of Things (IoT) and its incorporation of multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. Particularly, it focuses on ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and so on. This enables numerous business opportunities in fields as diverse as e-health, smart cities, and smart homes, among many others. This research briefly discussed about IoT, some of the major evolving and enabling wireless technologies in the IoT, Smart Environnent Application Domain, and Application of IoT. Benefits and Challenges of IoT.


Author(s):  
Rohit Chawla, Et. al.

The interpretability and secured communication are major challenge in internet of things. The embedding of wireless device has low energy and bandwidth. The low energy and bandwidth cannot effort computational overhead and compromised with security threats. Primary the conventional cryptography algorithm is applied for generation and sharing of key for mode of communication. The conventional cryptography algorithms have several bottleneck issues related to generation of key and distribution of key. The NIST models provides the secured communication channel in the environments of mobility. Lack of integrity, confidentiality and authorization process of data transmitted over the network of internet of things used the concept of key generation and allocation. The process of key generation and authentication provides the authorization and authentication of data over the internet of things. In this paper present the review of security threats of internet of things.


Sign in / Sign up

Export Citation Format

Share Document