Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference

Author(s):  
Igor Kotenko ◽  
Igor Saenko ◽  
Sergey Ageev
2019 ◽  
pp. 958-964 ◽  
Author(s):  
Wissam Abbass ◽  
◽  
Zineb Bakraouy ◽  
Amine Baina ◽  
Mostafa Bella

2019 ◽  
Vol 75 (3) ◽  
pp. 380-394
Author(s):  
Uday Khanapurkar

Huawei, the Chinese telecom giant, has emerged as a key player in the provision of infrastructure required to support 5G wireless networks, the adoption of which will be foundational to recipient countries’ deployment of emerging technologies such as artificial intelligence and the Internet of things.   At the same time, however, security concerns with respect to Huawei’s ties to the Chinese army and state abound, prompting a number of countries to ban the company from supplying them said telecom infrastructure. India, however, is on the fence in this regard. This article assesses India’s Huawei conundrum through a conceptual framework of economic dependence wherein the costs of a ban and willingness to ban are examined in detail. It is argued that since the expected costs of banning Huawei equipment and the security risks of using them are both substantially high, India’s course of action must be to defer a quick decision and bargain for benefits and assurances.


Author(s):  
Bagas Wahyu Prakoso ◽  
Anifatul Faricha ◽  
Dimas Adiputra ◽  
Mochamad Fauzan Rasyid ◽  
Moch. Bagus Indrastata Purahita ◽  
...  

Author(s):  
Mohamed A Eltayeb

In the contemporary world, we are surrounded by a complex network of interconnected sensors. These allows us to share, collate, transmit, and store vast amounts of data. These systems are known as the Internet of Things (IoT), and this technological offering has attracted a large amount of interest from academics, researchers, and developers in recent years due to its highly scalable and agile nature. However, while the IoT delivers significant benefits, it also poses some risks. The data that is stored and exchanged via the IoT is extremely valuable to individuals who have malevolent intent. In more recent years, the increasing popularity of the IoT as a means of sharing information has been associated with privacy and security risks that have undermined users' trust in the IoT. This paper examines what these risks are and some of the actions that can be taken to mitigate them.


2020 ◽  
Vol 23 (1) ◽  
pp. e9484
Author(s):  
Yigliana Alvarez Mendoza ◽  
Tania J. Londoño Gomez ◽  
Miguel Angel Leguizamón Páez

The technological advance of the new era has led to the interconnection of devices, applications, people and data, giving way to the generation of the Internet of Things (IoT). The multiple data collected is so voluminous and variable that it must be stored in Big Data architectures. This evolution has provided the opportunity to have better access, quality and analysis of information, but at the same time, there is a challenge to prevent and mitigate the security risks associated with the relationship between IoT and Big Data, endangering the information collected and the user’ sensitive data, among others. The purpose of this document is to carry out a literature review to collect the security risks found between the relationship of Big Data and IoT, as well as evaluate the current solutions implemented and conclude if they cover the needs for prevention and mitigation of the risk.


2017 ◽  
Vol 76 ◽  
pp. 275-284 ◽  
Author(s):  
Daniel Meana-Llorián ◽  
Cristian González García ◽  
B. Cristina Pelayo G-Bustelo ◽  
Juan Manuel Cueva Lovelle ◽  
Nestor Garcia-Fernandez

Author(s):  
Awad Saad Al-Qahtani, Mohammad Ayoub Khan Awad Saad Al-Qahtani, Mohammad Ayoub Khan

The Internet of things (IOT) users lack awareness of IOT security infrastructure to handle the risks including Threats, attack and penetration associated with its use. IOT devices are main targets for cyber-attacks due to variable personally identifiable information (PII) stored and transmit in the cyber centers. The security risks of the Internet of Things aimed to damage user's security and privacy. All information about users can be collected from their related objects which are stored in the system or transferred through mediums among diverse smart objects and may exposed to exposed dangerous of attacks and threats if it lack authentication so there are essential need to make IOT security requirements as important part of its efficient implementation. These requirements include; availability, accountability, authentication, authorization, privacy and confidentiality, Integrity and Non-repudiation. The study design is a survey research to investigate the visibility of the proposed model of security management for IOT uses, the security risks of IOT devices, and the changes IOT technology on the IT infrastructure of IOT users through answering of the research questionnaires. This work proposes a model of security management for IOT to predict IOT security and privacy threats, protect IOT users from any unforeseen dangers, and determine the right security mechanisms and protocols for IOT security layers, as well as give the most convenient security mechanisms. Moreover, for enhancing the performance of IOT networks by selecting suitable security mechanisms for IOT layers to increase IOT user's security satisfaction.


Sign in / Sign up

Export Citation Format

Share Document