scholarly journals An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things

Sensors ◽  
2019 ◽  
Vol 19 (17) ◽  
pp. 3663 ◽  
Author(s):  
Adel Ali Ahmed ◽  
Waleed Ali Ahmed

Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system. This eventually leads to the development of many smart applications such as smart cities, smart homes, smart healthcare, smart transportation, etc. Due to the fact that the IoT devices have limited resources, the cybersecurity approaches that relied on complex and long processing cryptography are not a good fit for these constrained devices. Moreover, the current IoT systems experience critical security vulnerabilities that include identifying which devices were affected, what data or services were accessed or compromised, and which users were impacted. The cybersecurity challenge in IoT systems is to find a solution for handling the identity of the user, things/objects and devices in a secure manner. This paper proposes an effective multifactor authentication (CMA) solution based on robust combiners of the hash functions implemented in the IoT devices. The proposed CMA solution mitigates the authentication vulnerabilities of IoT and defends against several types of attacks. Also, it achieves multi-property robustness and preserves the collision-resistance, the pseudo-randomness, the message authentication code, and the one-wayness. It also ensures the integrity, authenticity and availability of sensed data for the legitimate IoT devices. The simulation results show that CMA outperforms the TOTP in term of the authentication failure rate. Moreover, the evaluation of CMA shows an acceptable QoS measurement in terms of computation time overhead, throughput, and packet loss ratio.

Author(s):  
Puspanjali Mallik

The internet of things (IoT) fulfils abundant demands of present society by facilitating the services of cutting-edge technology in terms of smart home, smart healthcare, smart city, smart vehicles, and many more, which enables present day objects in our environment to have network communication and the capability to exchange data. These wide range of applications are collected, computed, and provided by thousands of IoT elements placed in open spaces. The highly interconnected heterogeneous structure faces new types of challenges from a security and privacy concern. Previously, security platforms were not so capable of handling these complex platforms due to different communication stacks and protocols. It seems to be of the utmost importance to keep concern about security issues relating to several attacks and vulnerabilities. The main motive of this chapter is to analyze the broad overview of security vulnerabilities and its counteractions. Generally, it discusses the major security techniques and protocols adopted by the IoT and analyzes the attacks against IoT devices.


2020 ◽  
Vol 12 (10) ◽  
pp. 4105
Author(s):  
Alaa Omran Almagrabi ◽  
Yasser D. Al-Otaibi

Nowadays, communication engineering technology is merging with the Internet of Things (IoT), which consists of numerous connected devices (referred to as things) around the world. Many researchers have shown significant growth of sensor deployments for multiple smart engineering technologies, such as smart-healthcare, smart-industries, smart-cities, and smart-transportation, etc. In such intelligent engineering technologies, sensors continuously generate a bunch of messages in the network. To enhance the value of the data in the messages, we must know the actuality of the data embedded inside the messages. For this purpose, the contextual information of the data creates a vital challenge. Recently, context-aware computing has emerged to be fruitful in dealing with sensor information. In the ubiquitous computing domain, location is commonly considered one of the most essential sources of context. However, whenever users or applications are concerned with objects, and their site or spatial relationships, location models or spatial models are necessary to form a model of the environment. This paper investigates the area of context-aware messaging and addressing services in diverse IoT applications. The paper examines the notion of context and the use of context within the data exchanged by the sensors in an IoT application for messaging and addressing purposes. Based on the importance and need for context of the information, we identify three critical categories of new IoT applications for context-aware messaging and addressing services: emergency applications, applications for guiding and reminding, and social networking applications. For this purpose, a representative range of systems is reviewed according to the application type, the technology being used, their architecture, the context information, and the services they provide. This survey assists the work of defining an approach for context-aware messaging services domain by discovering the area of context-aware messaging.


2014 ◽  
Vol 10 (1) ◽  
pp. 37-77 ◽  
Author(s):  
Antonio J. Jara ◽  
David Fernandez ◽  
Pablo Lopez ◽  
Miguel A. Zamora ◽  
Antonio F. Skarmeta

Mobility management is a desired feature for the emerging Internet of Things (IoT). Mobility aware solutions increase the connectivity and enhance adaptability to changes of the location and infrastructure. IoT is enabling a new generation of dynamic ecosystems in environments such as smart cities and hospitals. Dynamic ecosystems require ubiquitous access to Internet, seamless handover, flexible roaming policies, and an interoperable mobility protocol with existing Internet infrastructure. These features are challenges for IoT devices, which are usually constrained devices with low memory, processing, communication and energy capabilities. This work presents an analysis of the requirements and desirable features for the mobility support in the IoT, and proposes an efficient solution for constrained environments based on Mobile IPv6 and IPSec. Compatibility with IPv6-existing protocols has been considered a major requirement in order to offer scalable and inter-domain solutions that were not limited to specific application domains in order to enable a new generation of application and services over Internet-enabled dynamic ecosystems, and security support based on IPSec has been also considered, since dynamic ecosystems present several challenges in terms of security and privacy. This work has, on the one hand, analysed suitability of Mobile IPv6 and IPSec for constrained devices, and on the other hand, analysed, designed, developed and evaluated a lightweight version of Mobile IPv6 and IPSec. The proposed solution of lightweight Mobile IPv6 with IPSec is aware of the requirements of the IoT and presents the best solution for dynamic ecosystems in terms of efficiency and security adapted to IoT-devices capabilities. This presents concerns in terms of higher overhead and memory requirements. But, it is proofed and concluded that even when higher memory is required and major overhead is presented, the integration of Mobile IPv6 and IPSec for constrained devices is feasible.


2021 ◽  
Vol 11 (22) ◽  
pp. 10793
Author(s):  
Azin Moradbeikie ◽  
Ahmad Keshavarz ◽  
Habib Rostami ◽  
Sara Paiva ◽  
Sérgio Ivan Lopes

Large-scale deployments of the Internet of Things (IoT) are adopted for performance improvement and cost reduction in several application domains. The four main IoT application domains covered throughout this article are smart cities, smart transportation, smart healthcare, and smart manufacturing. To increase IoT applicability, data generated by the IoT devices need to be time-stamped and spatially contextualized. LPWANs have become an attractive solution for outdoor localization and received significant attention from the research community due to low-power, low-cost, and long-range communication. In addition, its signals can be used for communication and localization simultaneously. There are different proposed localization methods to obtain the IoT relative location. Each category of these proposed methods has pros and cons that make them useful for specific IoT systems. Nevertheless, there are some limitations in proposed localization methods that need to be eliminated to meet the IoT ecosystem needs completely. This has motivated this work and provided the following contributions: (1) definition of the main requirements and limitations of outdoor localization techniques for the IoT ecosystem, (2) description of the most relevant GNSS-free outdoor localization methods with a focus on LPWAN technologies, (3) survey the most relevant methods used within the IoT ecosystem for improving GNSS-free localization accuracy, and (4) discussion covering the open challenges and future directions within the field. Some of the important open issues that have different requirements in different IoT systems include energy consumption, security and privacy, accuracy, and scalability. This paper provides an overview of research works that have been published between 2018 to July 2021 and made available through the Google Scholar database.


2021 ◽  
Vol 2021 ◽  
pp. 1-23
Author(s):  
Saeed H. Alsamhi ◽  
Faris A. Almalki ◽  
Hatem Al-Dois ◽  
Soufiene Ben Othman ◽  
Jahan Hassan ◽  
...  

The number of Internet of Things (IoT) devices to be connected via the Internet is overgrowing. The heterogeneity and complexity of the IoT in terms of dynamism and uncertainty complicate this landscape dramatically and introduce vulnerabilities. Intelligent management of IoT is required to maintain connectivity, improve Quality of Service (QoS), and reduce energy consumption in real time within dynamic environments. Machine Learning (ML) plays a pivotal role in QoS enhancement, connectivity, and provisioning of smart applications. Therefore, this survey focuses on the use of ML for enhancing IoT applications. We also provide an in-depth overview of the variety of IoT applications that can be enhanced using ML, such as smart cities, smart homes, and smart healthcare. For each application, we introduce the advantages of using ML. Finally, we shed light on ML challenges for future IoT research, and we review the current literature based on existing works.


2021 ◽  
Vol 29 (6) ◽  
pp. 1-18
Author(s):  
Bingqian Zhang ◽  
Guochao Peng ◽  
Fei Xing ◽  
Si Chen

Aligned with the global trend of smartness, China has invested heavily in over 700 smart city projects across over 500 cities. Hundreds of smart city apps, initiated by local authorities, have so emerged in the daily lives of Chinese citizens, but anecdotal evidence showed that these official apps have many problems and deficiencies. This study captures a snapshot of current development and problems of official smart city apps in China. A total of 333 such apps, together with 15754 comments, were collected, reviewed and analyzed. The results showed that China’s smart city apps fall into three application areas, i.e. smart transportation, smart healthcare, and smart livelihood, of which each provides some promising features and services. However, a range of functional, interface, design, usage and service-related problems were found in these apps. This paper concluded that further to the very efforts on infrastructure and hardware, local authorities in China and worldwide need to pay more attention to smart apps, in order to maximize potential return of their smart city investments.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3375 ◽  
Author(s):  
Luis Sánchez ◽  
Jorge Lanza ◽  
Juan Santana ◽  
Rachit Agarwal ◽  
Pierre Raverdy ◽  
...  

The Internet of Things (IoT) concept has attracted a lot of attention from the research and innovation community for a number of years already. One of the key drivers for this hype towards the IoT is its applicability to a plethora of different application domains. However, infrastructures enabling experimental assessment of IoT solutions are scarce. Being able to test and assess the behavior and the performance of any piece of technology (i.e., protocol, algorithm, application, service, etc.) under real-world circumstances is of utmost importance to increase the acceptance and reduce the time to market of these innovative developments. This paper describes the federation of eleven IoT deployments from heterogeneous application domains (e.g., smart cities, maritime, smart building, crowd-sensing, smart grid, etc.) with over 10,000 IoT devices overall which produce hundreds of thousands of observations per day. The paper summarizes the resources that are made available through a cloud-based platform. The main contributions from this paper are twofold. In the one hand, the insightful summary of the federated data resources are relevant to the experimenters that might be seeking for an experimental infrastructure to assess their innovations. On the other hand, the identification of the challenges met during the testbed integration process, as well as the mitigation strategies that have been implemented to face them, are of interest for testbed providers that can be considering to join the federation.


2020 ◽  
Vol 10 (21) ◽  
pp. 7699
Author(s):  
Shin-Hung Pan ◽  
Shu-Ching Wang

Because the Internet of Things (IoT) can provide a global service network through various smart devices, the IoT has been widely used in smart transportation, smart cities, smart healthcare, and factory automation through the Internet connection. With the large-scale establishment and 5G (fifth generation) wireless networks, the cellular Internet of Things (CIoT) will continue to be developed and applied to a wide range of applications. In order to provide a reliable application of CIoT, a safe and reliable network topology MECIoT is proposed in this study. To improve the reliability and fault-tolerant capability of the network proposed, the problem of reaching agreement should be revisited. Therefore, the applications in the system can still be performed correctly even if some processing units (PUs) in the system have failed. In this study, a new protocol is proposed to allow all normal PUs in MECIoT to reach an agreement with the minimum amount of data exchanges required and the maximum number of failed PUs allowed in MECIoT. In the end, the optimality of the protocol has been proven by mathematical method.


Information ◽  
2021 ◽  
Vol 12 (5) ◽  
pp. 195
Author(s):  
Davide Andrea Guastella ◽  
Guilhem Marcillaud ◽  
Cesare Valenti

Smart cities leverage large amounts of data acquired in the urban environment in the context of decision support tools. These tools enable monitoring the environment to improve the quality of services offered to citizens. The increasing diffusion of personal Internet of things devices capable of sensing the physical environment allows for low-cost solutions to acquire a large amount of information within the urban environment. On the one hand, the use of mobile and intermittent sensors implies new scenarios of large-scale data analysis; on the other hand, it involves different challenges such as intermittent sensors and integrity of acquired data. To this effect, edge computing emerges as a methodology to distribute computation among different IoT devices to analyze data locally. We present here a new methodology for imputing environmental information during the acquisition step, due to missing or otherwise out of order sensors, by distributing the computation among a variety of fixed and mobile devices. Numerous experiments have been carried out on real data to confirm the validity of the proposed method.


2021 ◽  
Author(s):  
Bhawana Bhawana ◽  
Sushil Kumar

Abstract The Internet of Things (IoT) recently gained attention from the last few years due to various smart city applications deployment. The existing literature discusses different public emergency service (PES) aspects from smart-healthcare to smart-home automation. However, less work explores for the smart-fire-brigade system. The PESs require high computation, timely service fulfillment, service transparency, and trust, which are difficult to achieve through a centralized system. In recent years, blockchain technology has gained enormous popularity for immutable data management that ensures transparency, reliability, and data integrity using distributed storage. This paper presents a blockchain based model for secure and trusted public emergency service in IoT-enabled smart cities (BMSTP) to handle the PES requests in real-time fairly. An edge compute server (ECS) is introduced to enhance data processing speed and local data storage. Simultaneously, a queuing theory model is used to process PES requests quickly. The ECS manages an access control list (ACL) for smart-home IoT devices to protect against the illegal placement of any new IoT devices near smart-home to misguiding public emergency service departments (PESDs). Further, a reputation model is designed for PESDs to scale their service quality. We explored the BMSTP for smart-homes placed under different sub-areas of a smart-city. The experiment results show the proposed system model is efficient in scheduling the smart-home PES requests to an appropriate PESD and minimizing the delay to reaching the smart-home location.


Sign in / Sign up

Export Citation Format

Share Document