scholarly journals Autopolicy: Automated Traffic Policing for Improved IoT Network Security

Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4265
Author(s):  
Pawel Foremski ◽  
Sławomir Nowak ◽  
Piotr Fröhlich ◽  
José Hernández-Ramos ◽  
Gianmarco Baldini

A 2.3Tbps DDoS attack was recently mitigated by Amazon, which is a new record after the 2018 GitHub attack, or the famous 2016 Dyn DNS attack launched from hundreds of thousands of hijacked Internet of Things (IoT) devices. These attacks may disrupt the lives of billions of people worldwide, as we increasingly rely on the Internet. In this paper, we tackle the problem that hijacked IoT devices are often the origin of these attacks. With the goal of protecting the Internet and local networks, we propose Autopolicy: a system that automatically limits the IP traffic bandwidth—and other network resources—available to IoT devices in a particular network. We make use of the fact that devices, such as sensors, cameras, and smart home appliances, rarely need their high-speed network interfaces for normal operation. We present a simple yet flexible architecture for Autopolicy, specifying its functional blocks, message sequences, and general operation in a Software Defined Network. We present the experimental validation results, and release a prototype open source implementation.

2021 ◽  
Vol 6 (10) ◽  
pp. 81-91
Author(s):  
Sardor Turaev ◽  

The article deals with the criminological features of crimes committed by the author using the Internet. Also, as a result of the widespread use of high technologies in electronic payments and document processing systems and similar areas, not only economic damage to enterprises and organizations, but also the normal operation of local networks as a result of crimes against the system and industries. Author points that, this leads to the inability of its affiliated industries to function properly, which in turn impedes the work of a number of large enterprises and organizations, resulting in a high level of frustration and irreparable losses. In addition, the author argues that existing protection systems often fail to protect businesses and government agencies from robberies using theInternet. This situation is explained by the fact that it has tried to explain that thefight against robberies committed using the Internet is the result of the presence of vulnerable, weak points and low sensitivity in such protection systems.


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3328 ◽  
Author(s):  
Óscar Blanco-Novoa ◽  
Paula Fraga-Lamas ◽  
Miguel A. Vilar-Montesinos ◽  
Tiago M. Fernández-Caramés

Augmented Reality (AR) and Mixed Reality (MR) devices have evolved significantly in the last years, providing immersive AR/MR experiences that allow users to interact with virtual elements placed on the real-world. However, to make AR/MR devices reach their full potential, it is necessary to go further and let them collaborate with the physical elements around them, including the objects that belong to the Internet of Things (IoT). Unfortunately, AR/MR and IoT devices usually make use of heterogeneous technologies that complicate their intercommunication. Moreover, the implementation of the intercommunication mechanisms requires involving specialized developers with have experience on the necessary technologies. To tackle such problems, this article proposes the use of a framework that makes it easy to integrate AR/MR and IoT devices, allowing them to communicate dynamically and in real time. The presented AR/MR-IoT framework makes use of standard and open-source protocols and tools like MQTT, HTTPS or Node-RED. After detailing the inner workings of the framework, it is illustrated its potential through a practical use case: a smart power socket that can be monitored and controlled through Microsoft HoloLens AR/MR glasses. The performance of such a practical use case is evaluated and it is demonstrated that the proposed framework, under normal operation conditions, enables to respond in less than 100 ms to interaction and data update requests.


2018 ◽  
Vol 7 (4.38) ◽  
pp. 888
Author(s):  
Fazeel Ahmed Khan ◽  
Adamu Abubakar ◽  
Marwan Mahmoud ◽  
Mahmoud Ahmad Al-Khasawneh ◽  
Ala Abdulsalam Alarood ◽  
...  

The Internet of Things (IoT) smart city initiative has transformed technology spectrum into its new era of development. The increasing amount of data generated by millions of IoT devices and the rapid flow of data across distributed IoT devices are transmitting to remotely located cloud infrastructure over the Internet. Unfortunately, these large amounts of data and its flow based on the traditional energy-intensive network infrastructure is neither efficient nor substantially scalable. It is essential to design a comprehensive network infrastructure to handle large amount of high-speed data-processing in an IoT spectrum. Apparently, Blockchain and Software-Defined Networking (SDN) approaches can leveraged the scalability of the environment for IoT spectrum. In addition, the emergence of distributed cloud technology and Li-Fi spectrum can transform the capability of data-processing for IoT devices. The challenge lies in efficiently blend the integration of Li-Fi, Blockchain, SDN and Cloud technologies for IoT environment. To address this challenge, we design a multiaccess communication modulation model for efficient optimization of distributed network with an SDN based controller and integration of robust cloud infrastructure for high-speed data-processing. The proposed model is based on Li-Fi communication architecture which significantly reduced in the utilization of energy for managing large-scale infrastructure. We performed simulation and analysis across multiple dimensions to evaluate the performance and effectiveness of our proposed model. The evaluated output shows that our model significantly improved the overall performance and efficiency of the communication infrastructure as compared with other ultra-modern models.  


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Insaf Ullah ◽  
Ali Alkhalifah ◽  
Muhammad Asghar Khan ◽  
Samih M. Mostafa

The Internet of things (IoT) has emerged into a revolutionary technology that enables a wide range of features and applications given the proliferation of sensors and actuators embedded in everyday objects, as well as the ubiquitous availability of high-speed Internet. When nearly everything is connected to the Internet, security and privacy concerns will become more significant. Furthermore, owing to the resource-constrained nature of IoT devices, they are unable to perform standard cryptographic computations. As a result, there is a critical need for efficient and secure lightweight cryptographic scheme that can meet the demands of resource-constrained IoT devices. In this study, we propose a lightweight proxy in which a person/party can delegate its signing authority to a proxy agent. Existing proxy signcryption security approaches are computationally costly and rely on RSA, bilinear pairing, and elliptic curves cryptography (ECC). The hyperelliptic curve cryptosystem (HECC), on the other hand, employs a smaller key size while maintaining the same level of security. When assessed using the random oracle model (ROM), the proposed scheme provides resilience against indistinguishable under adaptive chosen ciphertext attacks (IND-CCA) and unforgeable under adaptive chosen message attacks (UU-ACMA). To demonstrate the viability of the proposed scheme, security analyses and comparisons with existing schemes are performed. The findings show that the proposed scheme provides high security while reducing computational and communication costs.


2018 ◽  
Vol 4 (1) ◽  
pp. 57
Author(s):  
Yuli Anwar ◽  
Dahlar .

Abstract. One of the advances in information technology that now has changed the outlook and human life, business process and business strategy of an institution is the internet. The internet is a very large networks that connected to computers and serves throughout the world in one centralized network. With the internet we can access data and information anytime and anywhere.    As one provider of high-speed data communications services and the pioneer of the internet network service provider in Indonesia that provides integrated services, as well as one of the pioneer development of internet services that provide extensive services in the building and apply it throughout Indonesia. Indosat ready to seize opportunities for sustainable growth of business spectrum are still sprawling Indonesia.    Therefore, Indosat continues to focus on the development of increased efforts to provide the best service for customers of Indosat. Indosat will continue to develop and expand network coverage and a larger investment that the company will achieve excellence in the field of integrated telecommunications services.    Ranking by region of the IP Providers can be seen by grouping IP Providers, and management over IP Providers prefer to choose providers based on where it orginates as an example for the region of the U.S if it will be preferred providers that come from U.S. providers.With the commencement of the internet network optimization start early in 2008 with the selection of the appropriate IP Upstream Provider criteria, it is up to date according to data obtained from Indosat, seen any significant changes to the cost of purchasing capacity of the IP Upstream.    Based on the data obtained that until Q3 or September 2008, the number of IP Upstream Providers that previously there were 20 to 10 IP Upstream Provider, IP Transit Price total decrease of 11% to the price of IP Transit Price / Mbps there is a decrease of 78%, while from the capacity bandwith an increase of 301% capacity from 2008.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Network ◽  
2021 ◽  
Vol 1 (1) ◽  
pp. 28-49
Author(s):  
Ehsan Ahvar ◽  
Shohreh Ahvar ◽  
Syed Mohsan Raza ◽  
Jose Manuel Sanchez Vilchez ◽  
Gyu Myoung Lee

In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill a part of these requirements by providing a data rate of up to terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constraints. On the other hand, the next generation of software-defined networking (SDN) with emerging cloudrelated technologies (e.g., fog and edge computing) can play an important role in supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid cloud-fog systems to support 5G and beyond-enabled applications.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


2020 ◽  
Vol 20 (1) ◽  
Author(s):  
Tatsuya Manabe ◽  
Mitsuhiro Takasaki ◽  
Takao Ide ◽  
Kenji Kitahara ◽  
Seiji Sato ◽  
...  

Abstract Background Effective education about endoscopic surgery (ES) is greatly needed for unskilled surgeons, especially at low-volume institutions, to maintain the safety of patients. We have tried to establish the remote educational system using videoconference system through the internet for education about ES to surgeons belonging to affiliate institutions. The aim of this manuscript was to report the potential to establish a comfortable remote educational system and to debate its advantages. Methods We established a local remote educational conference system by combining the use of a general web conferencing system and a synchronized remote video playback system with annotation function through a high-speed internet. Results During 2014–2019, we conducted 14 videoconferences to review and improve surgeons’ skills in performing ES at affiliated institutions. At these conferences, while an uncut video of ES that had been performed at one of the affiliated institutions was shown, the surgical procedure was discussed frankly, and expert surgeons advised improvements. The annotation system is useful for easy, prompt recognition among the audience regarding anatomical structures and procedures that are difficult to explain verbally. Conclusions This system is of low initial cost and offers easy participation and high-quality videos. It would therefore be a useful tool for regional ES education.


2011 ◽  
Vol 52-54 ◽  
pp. 109-114
Author(s):  
Yun Jie Xu

In order to meet requirements of increasingly high-speed, large and intelligent mechanical equipments on fault diagnosis, the Internet-based reconfigurable mechanical system fault diagnosis program was presented. The overall structure and networking schema of distance mechanical fault diagnosis system were analyzed, and the distance fault diagnosis network model based on J2EE framework was also described. The structural model and reconfigurable manner of the reconfigurable distance diagnosis system was provided, which used CORBA component technology to achieve reconfiguration. The detail steps of system that take some type of diesel engine as diagnosis object was described, and the intelligent diagnosing methods were also researched. The Internet-based fault diagnosis technology effectively improves the efficiency and accuracy of diagnostic systems.


Sign in / Sign up

Export Citation Format

Share Document