Threat-Based Security Analysis for the Internet of Things

Author(s):  
Ahmad W. Atamli ◽  
Andrew Martin
Author(s):  
Kundankumar Rameshwar Saraf ◽  
Malathi P. Jesudason

This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.


2019 ◽  
Vol 7 (2) ◽  
pp. 21-40 ◽  
Author(s):  
Parthasarathy Panchatcharam ◽  
Vivekanandan S.

Wellbeing is fundament requirement. What's more, it is human appropriate to get quality health care. These days, India is confronting numerous medical problems in light of fewer assets. This survey article displays the idea of solving health issues by utilizing a recent innovation, the Internet of Things (IOT). The Internet of Things with their developing interdisciplinary applications has changed our lives. Smart health care being one such IoT application interfaces brilliant gadgets, machines, patients, specialists, and sensors to the web. At long last, the difficulties and prospects of the improvement of IoT-based medicinal service frameworks are talked about in detail. This review additionally summarizes the security and protection worries of IoT, administrations and application of IoT and smart healthcare services that have changed the customary medicinal services framework by making healthcare administration more proficient through their applications.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


2020 ◽  
Vol 39 (6) ◽  
pp. 8633-8642
Author(s):  
Zhu, Hongwei ◽  
Wang, Xuesong

With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems emerge in endlessly. During the period of COVID-19, the Internet of Things have been widely used to fight virus outbreak. However, the most serious security problem of the Internet of things is network intrusion. This paper proposes a balanced quadratic support vector machine information security analysis method for Internet of things. Compared with the traditional support vector machine Internet of things security analysis method, this method has a higher accuracy, and can shorten the detection time, with efficient and powerful characteristics. The method proposed in this paper has certain reference value to the Internet of things network intrusion problem. It provides better security for the Internet of things during the protection period of covid-19.


2012 ◽  
Vol 35 (3) ◽  
pp. 434-445 ◽  
Author(s):  
Wei LI ◽  
Da-Wu GU ◽  
Chen ZHAO ◽  
Zhi-Qiang LIU ◽  
Ya LIU

2017 ◽  
Vol 83 ◽  
pp. 12-27 ◽  
Author(s):  
Mengmeng Ge ◽  
Jin B. Hong ◽  
Walter Guttmann ◽  
Dong Seong Kim

Sensors ◽  
2014 ◽  
Vol 14 (8) ◽  
pp. 14786-14805 ◽  
Author(s):  
Bruce Ndibanje ◽  
Hoon-Jae Lee ◽  
Sang-Gon Lee

Sign in / Sign up

Export Citation Format

Share Document