scholarly journals Blockchain-IoT Sensor (BIoTS): A Solution to IoT-Ecosystems Security Issues

Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4388
Author(s):  
Carlos Gonzalez-Amarillo ◽  
Cristian Cardenas-Garcia  ◽  
Miguel Mendoza-Moreno  ◽  
Gustavo Ramirez-Gonzalez ◽  
Juan Carlos Corrales

Sensor devices that act in the IoT architecture perception layer are characterized by low data processing and storage capacity. These reduced capabilities make the system ubiquitous and lightweight, but considerably reduce its security. The IoT-based Food Traceability Systems (FTS), aimed at ensuring food safety and quality, serve as a motivating scenario for BIoTS development and deployment; therefore, security challenges and gaps related with data integrity are analyzed from this perspective. This paper proposes the BIoTS hardware design that contains some modules built-in VHDL (SHA-256, PoW, and SD-Memory) and other peripheral electronic devices to provide capabilities to the perception layer by implementing the blockchain architecture’s security requirements in an IoT device. The proposed hardware is implemented on FPGA Altera DE0-Nano. BIoTS can participate as a miner in the blockchain network through Smart Contracts and solve security issues related to data integrity and data traceability in an Blockchain-IoT system. Blockchain algorithms implemented in IoT hardware opens a path to IoT devices’ security and ensures participation in data validation inside a food certification process.

Author(s):  
K. O. Toka ◽  
Y. Dikilitaş ◽  
T. Oktay ◽  
A. Sayar

Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most of the security deficiencies of heavily IoT based systems. The Hyperledger Fabric blockchain network used in this study provides confidentiality, data integrity, authentication, and data security for data obtained from IoT devices. Widely used IoT data transfer MQTT protocol is included in the proposed approach. The approach is demonstrated in a simple demo Hyperledger network with simulated IoT devices. The proposed approach is discussed in terms of network security dimensions. Based on the features of the Hyperledger Blockchain network, it is displayed that the IoT security deficiencies can largely be remedied with the proposed approach.


Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1339 ◽  
Author(s):  
Hasan Islam ◽  
Dmitrij Lagutin ◽  
Antti Ylä-Jääski ◽  
Nikos Fotiou ◽  
Andrei Gurtov

The Constrained Application Protocol (CoAP) is a specialized web transfer protocol which is intended to be used for constrained networks and devices. CoAP and its extensions (e.g., CoAP observe and group communication) provide the potential for developing novel applications in the Internet-of-Things (IoT). However, a full-fledged CoAP-based application may require significant computing capability, power, and storage capacity in IoT devices. To address these challenges, we present the design, implementation, and experimentation with the CoAP handler which provides transparent CoAP services through the ICN core network. In addition, we demonstrate how the CoAP traffic over an ICN network can unleash the full potential of the CoAP, shifting both overhead and complexity from the (constrained) endpoints to the ICN network. The experiments prove that the CoAP Handler helps to decrease the required computation complexity, communication overhead, and state management of the CoAP server.


2020 ◽  
Vol 3 (1) ◽  
pp. 75-105 ◽  
Author(s):  
Rahul Neware ◽  
Urmila Shrawankar

Fog computing spreads the cloud administrations and services to the edge of the system, and brings processing, communications and reserving, and storage capacity closer to edge gadgets and end-clients and, in the process, aims at enhancing versatility, low latency, transfer speed and safety and protection. This article takes an extensive and wide-ranging view of fog computing, covering several aspects. At the outset is the many-layered structural design of fog computing and its attributes. After that, chief advances like communication and inter-exchange, computing, etc. are delineated, while showing how these backup and facilitate the installations and various applications. Following that, it is shown that how, despite fog computing being a feature-rich platform, it is dogged by its susceptibility to several security, privacy, and safety concerns, which stem from the nature of its widely distributed and open architecture. Finally, some suggestions are advanced to address some of the safety challenges discussed so as to propel the further growth of fog computing.


Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2647
Author(s):  
Stefan Balogh ◽  
Ondrej Gallo ◽  
Roderik Ploszek ◽  
Peter Špaček ◽  
Pavol Zajac

Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.


2021 ◽  
pp. 308-318
Author(s):  
Hadeel T. Rajab ◽  
Manal F. Younis

 Internet of Things (IoT) contributes to improve the quality of life as it supports many applications, especially healthcare systems. Data generated from IoT devices is sent to the Cloud Computing (CC) for processing and storage, despite the latency caused by the distance. Because of the revolution in IoT devices, data sent to CC has been increasing. As a result, another problem added to the latency was increasing congestion on the cloud network. Fog Computing (FC) was used to solve these problems because of its proximity to IoT devices, while filtering data is sent to the CC. FC is a middle layer located between IoT devices and the CC layer. Due to the massive data generated by IoT devices on FC, Dynamic Weighted Round Robin (DWRR) algorithm was used, which represents a load balancing (LB) algorithm that is applied to schedule and distributes data among fog servers by reading CPU and memory values of these servers in order to improve system performance. The results proved that DWRR algorithm provides high throughput which reaches 3290 req/sec at 919 users. A lot of research is concerned with distribution of workload by using LB techniques without paying much attention to Fault Tolerance (FT), which implies that the system continues to operate even when fault occurs. Therefore, we proposed a replication FT technique called primary-backup replication based on dynamic checkpoint interval on FC. Checkpoint was used to replicate new data from a primary server to a backup server dynamically by monitoring CPU values of primary fog server, so that checkpoint occurs only when the CPU value is larger than 0.2 to reduce overhead. The results showed that the execution time of data filtering process on the FC with a dynamic checkpoint is less than the time spent in the case of the static checkpoint that is independent on the CPU status.


Sensors ◽  
2021 ◽  
Vol 21 (19) ◽  
pp. 6647
Author(s):  
Soo Fun Tan ◽  
Azman Samsudin

The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a general overview of IIoT security threats or a detailed analysis that explicitly focuses on specific technologies. However, recent studies fail to analyze the gap between security requirements of these technologies and their deployed countermeasure in the industry recently. Whether recent industry countermeasure is still adequate to address the security challenges of IIoT environment are questionable. This article presents a comprehensive survey of IIoT security and provides insight into today’s industry countermeasure, current research proposals and ongoing challenges. We classify IIoT technologies into the four-layer security architecture, examine the deployed countermeasure based on CIA+ security requirements, report the deficiencies of today’s countermeasure, and highlight the remaining open issues and challenges. As no single solution can fix the entire IIoT ecosystem, IIoT security architecture with a higher abstraction level using the bottom-up approach is needed. Moving towards a data-centric approach that assures data protection whenever and wherever it goes could potentially solve the challenges of industry deployment.


Author(s):  
Muhammad Rehan Yahya ◽  
Ning Wu ◽  
Zain Anwar Ali

The evolution of internet of things (IoT) applications, cloud computing, smart cities, and 4G/5G wireless communication systems have significantly increased the demands for on chip processing. Network on chip (NoC) is a viable alternative that can provide higher processing and bandwidth for increasing demands. NoC offers better performance and more flexibility with lower communication latency and higher throughput. However, use of NoC-based IoT devices have raised concerns on security and reliability of integrated chips (IC), which is used in almost every application. IoT devices share data that becomes vulnerable to attack and can be compromised during the data transfer. Keeping in view these security challenges, a detailed survey is presented that covers the security issues and challenges focusing on NoCs along with proposed countermeasures to secure on-chip communication. This study includes on-chip security issues for electrical as well as optical on-chip interconnects.


Author(s):  
Jasmine Norman ◽  
Paul Joseph

IoT is an acronym for Internet of Things. It is the revolutionary area that transforms the digital world into a device world. IoT helps in not only fulfilling human requirements, but also they act as a communication medium between humans and electronic devices. The birth of IoT started in early 2000s, but since then, it is an amazing fact that now at least 65% of devices are connected with IoT technology with the term “smart” in their prefix and it would be up by 30% at the end of 2016 (Gartner Survey, 2015). Since then, many security issues were raised, and have been risen all these years due to the flaws in that devices. This made attackers to take advantage over that devices and started controlling them. This chapter studies IoT application layer protocols, services offered and gives an idea of existing cyber attacks and threat. In addition, the authors give the possible attacks on the IoT devices, in particular at application layer, and give the necessary precautions to overcome the cyber attacks both for consumers and vendors.


Entropy ◽  
2020 ◽  
Vol 22 (12) ◽  
pp. 1438
Author(s):  
Carlos Alberto de Braganca Pereira ◽  
Adriano Polpo ◽  
Agatha Sacramento Rodrigues

With the increase in data processing and storage capacity, a large amount of data is available [...]


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3049
Author(s):  
Azza Allouch ◽  
Omar Cheikhrouhou ◽  
Anis Koubâa ◽  
Khalifa Toumi ◽  
Mohamed Khalgui ◽  
...  

Unmanned aerial systems (UAVs) are dramatically evolving and promoting several civil applications. However, they are still prone to many security issues that threaten public safety. Security becomes even more challenging when they are connected to the Internet as their data stream is exposed to attacks. Unmanned traffic management (UTM) represents one of the most important topics for small unmanned aerial systems for beyond-line-of-sight operations in controlled low-altitude airspace. However, without securing the flight path exchanges between drones and ground stations or control centers, serious security threats may lead to disastrous situations. For example, a predefined flight path could be easily altered to make the drone perform illegal operations. Motivated by these facts, this paper discusses the security issues for UTM’s components and addresses the security requirements for such systems. Moreover, we propose UTM-Chain, a lightweight blockchain-based security solution using hyperledger fabric for UTM of low-altitude UAVs which fits the computational and storage resources limitations of UAVs. Moreover, UTM-Chain provides secure and unalterable traffic data between the UAVs and their ground control stations. The performance of the proposed system related to transaction latency and resource utilization is analyzed by using cAdvisor. Finally, the analysis of security aspects demonstrates that the proposed UTM-Chain scheme is feasible and extensible for the secure sharing of UAV data.


Sign in / Sign up

Export Citation Format

Share Document