scholarly journals SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things

2021 ◽  
Vol 2021 ◽  
pp. 1-24
Author(s):  
Tidiane Sylla ◽  
Mohamed Aymen Chalouf ◽  
Francine Krief ◽  
Karim Samaké

IoT technologies facilitate the development and the improvement of pervasive computing by enabling effective context-awareness features. These features enable the IoT applications to detect the user’s situation and adapt their behavior. They also enable context-aware security and privacy, which consist in adapting security and privacy mechanisms’ deployment to the user’s situation. Research studies on context-aware security and privacy focus on security and privacy mechanisms’ implementation but do not consider the secure and trustworthy context management. In this paper, we introduce a new secure and trustworthy context management system for context-aware security and privacy in the smart city: “SETUCOM.” SETUCOM is the implementation of the DTM (Device Trust Management) module of the CASPaaS (Context-Aware Security and Privacy as a Service) architecture. It secures context information exchange by using a lightweight hybrid encryption system adapted to IoT devices and manages trust through artificial intelligence techniques such as Bayesian networks and fuzzy logic. A detailed description of the proposed system is provided, and its main performances are evaluated. The results prove SETUCOM feasibility in context-aware security and privacy for the smart city.

Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


2013 ◽  
Vol 401-403 ◽  
pp. 1792-1795 ◽  
Author(s):  
Tao Liu ◽  
Ya Wen Guan ◽  
Yi Qun Yan ◽  
Li Liu ◽  
Qi Chao Deng

Aimed to the security and privacy issues which restrict the construction and development of the Internet of Things, a WSN-oriented key agreement protocol in the Internet of Things ( IOT) has been proposed . Trust management was introduced the security mechanism of IOT, the use of bilinear pairing technology, the identity-based key agreement was realized. Using the protocol not only can effectively prevent attacks from outside the network and can recognize the abnormal nodes which were captured or lapsed efficacy. Thus it can reduce communication with abnormal nodes to improve network security, extending the lifetime of the network. The distributed self-organizing key negotiation process without credible third-party management can enhance the survivability of IOT, and the network has a good scalability.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Chao Huang ◽  
Shah Nazir

With the passage of time, the world population is growing. Proper utilization of resources and other devices is tremendously playing an important role to easily examine, manage, and control the resources of the Internet of Things (IoT) in the smart city. Research in the field of IoT has revolutionized the services mostly in smart cities. In the smart city, the applications of IoT are utilized without human involvement. Diverse IoT devices are connected with each other and communicate for different tasks. With the existence of a huge number of IoT devices in the forthcoming years, the chances of privacy breach and information leakage are increasing. Billions of devices connected on IoT producing huge volume of data bound to cloud for processing, management, and storage. Sending of whole data to the cloud might create risk of security and privacy. Various needs of the smart city should be considered for both urgent and effective solutions to support requirements of the growing population. On the other side of rising technology, the IoT evolution has massively produced diverse research directions for the smart city. Keeping in view the use cases of the smart city, the proposed study presents the analytic network process (ANP) for evaluating smart cities. The approach of ANP works well in the situation of complexity, and vagueness exists among the available alternatives. The experimental results of the planned approach show that the approach is effective for evaluating the smart cities for IoT based on the use cases.


2016 ◽  
pp. 379-402 ◽  
Author(s):  
Scott Amyx

This chapter identifies concerns about, and the managerial implications of, data privacy issues related to wearables and the IoT; it also offers some enterprise solutions to the complex concerns arising from the aggregation of the massive amounts of data derived from wearables and IoT devices. Consumer and employee privacy concerns are elucidated, as are the problems facing managers as data management and security become an important part of business operations. The author provides insight into how companies are currently managing data as well as some issues related to data security and privacy. A number of suggestions for improving the approach to data protection and addressing concerns about privacy are included. This chapter also examines trending issues in the areas of data protection and the IoT, and contains thought-provoking discussion questions pertaining to business, wearables/IoT data, and privacy issues.


Author(s):  
Kenji Tei ◽  
Shunichiro Suenaga ◽  
Yoshiyuki Nakamura ◽  
Yuichi Sei ◽  
Hikotoshi Nakazato ◽  
...  

In pervasive computing environment (Satyanarayanan, 2001), common context management system, that make context of the real world be shared among the context-aware applications, is required to reduce development cost of each context-aware applications. A wireless sensor network (WSN) will be a key infrastructure for the context management system. Towards pervasive computing, a WSN integrated into context management system should be open infrastructure. In an open WSN should (1)handle various kinds of tasks, (2)manage tasks at runtime, (3)save resource consumption, and (4)adapt to changes of environments. To develop such an open WSN, middleware supports are needed, and our XAC project tries to develop a middleware for the open WSN. The XAC project is a research project to develop a middleware for open WSN. In this chapter, the auhors show research issues related to open WSN from the viewpoints of task description language, runtime task management, self-adaptability, and security.


Author(s):  
Rahul Verma

The internet of things (IoT) is the new buzzword in technological corridors with most technology companies announcing a smart device of sorts that runs on internet of things (IoT). Cities around the world are getting “smarter” every day through the implementation of internet of things (IoT) devices. Cities around the world are implementing individual concepts on their way to becoming smart. The services are automated and integrated end to end using internet of things (IoT) devices. The chapter presents an array of internet of things (IoT) applications. Also, cyber physical systems are becoming more vulnerable since the internet of things (IoT) attacks are common and threatening the security and privacy of such systems. The main aim of this chapter is to bring more research in the application aspects of smart internet of things (IoT).


Author(s):  
Khattab M. Ali Alheeti ◽  
Ibrahim Alsukayti ◽  
Mohammed Alreshoodi

<p class="0abstract">Innovative applications are employed to enhance human-style life. The Internet of Things (IoT) is recently utilized in designing these environments. Therefore, security and privacy are considered essential parts to deploy and successful intelligent environments. In addition, most of the protection systems of IoT are vulnerable to various types of attacks. Hence, intrusion detection systems (IDS) have become crucial requirements for any modern design. In this paper, a new detection system is proposed to secure sensitive information of IoT devices. However, it is heavily based on deep learning networks. The protection system can provide a secure environment for IoT. To prove the efficiency of the proposed approach, the system was tested by using two datasets; normal and fuzzification datasets. The accuracy rate in the case of the normal testing dataset was 99.30%, while was 99.42% for the fuzzification testing dataset. The experimental results of the proposed system reflect its robustness, reliability, and efficiency.</p>


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5898
Author(s):  
Patrícia R. Sousa ◽  
Luís Magalhães ◽  
João S. Resende ◽  
Rolando Martins ◽  
Luís Antunes

The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate and circumvent current trust mechanisms. Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems. While digital certificates are one of the most prevalent ways to establish identity and perform authentication, their provision at scale remains open. This provisioning process is usually an arduous task that encompasses device configuration, including identity and key provisioning. Human configuration errors are often the source of many security and privacy issues, so this task should be semi-autonomous to minimize erroneous configurations during this process. In this paper, we propose an identity management (IdM) and authentication method called YubiAuthIoT. The overall provisioning has an average runtime of 1137.8 ms ±65.11+δ. We integrate this method with the FIWARE platform, as a way to provision and authenticate IoT devices.


Sign in / Sign up

Export Citation Format

Share Document