Secured Transaction In Iot using Digital Finger Print

Author(s):  
Kalaivani S ◽  
Shalini Dhiman ◽  
Rajagopal T.K.P.

Internet of Things (IoT) can be seen as a pervasive network of networks: numerous heterogeneous entities both physical and virtual interconnected with any other entity or entities through unique addressing schemes, interacting with each other to provide/request all kinds of services. Given the enormous number of connected devices that are potentially vulnerable, highly significant risks emerge around the issues of security, privacy, and governance; calling into question the whole future of IoT. During the data exchange, it is mandatory to secure the messages between sender and receiver to handle the malicious human based attacks. The main problem during Fingerprint based approaches is the computational overhead due to large real numbers required for Fingerprint and verification processes. This paper presents a light weight Shortened Complex Digital Fingerprint Algorithm (SCDSA) for providing secure communication between smart devices in human centered IoT. We have used less extensive operations to achieve Fingerprint and verification processes like human beings do Fingerprints on legal documents and verify later as per witness. It enhances the security strength to guard against traffic analysis attacks.

Sensors ◽  
2020 ◽  
Vol 20 (14) ◽  
pp. 3928 ◽  
Author(s):  
Rateb Jabbar ◽  
Mohamed Kharbeche ◽  
Khalifa Al-Khalifa ◽  
Moez Krichen ◽  
Kamel Barkaoui

The concept of smart cities has become prominent in modern metropolises due to the emergence of embedded and connected smart devices, systems, and technologies. They have enabled the connection of every “thing” to the Internet. Therefore, in the upcoming era of the Internet of Things, the Internet of Vehicles (IoV) will play a crucial role in newly developed smart cities. The IoV has the potential to solve various traffic and road safety problems effectively in order to prevent fatal crashes. However, a particular challenge in the IoV, especially in Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications, is to ensure fast, secure transmission and accurate recording of the data. In order to overcome these challenges, this work is adapting Blockchain technology for real time application (RTA) to solve Vehicle-to-Everything (V2X) communications problems. Therefore, the main novelty of this paper is to develop a Blockchain-based IoT system in order to establish secure communication and create an entirely decentralized cloud computing platform. Moreover, the authors qualitatively tested the performance and resilience of the proposed system against common security attacks. Computational tests showed that the proposed solution solved the main challenges of Vehicle-to-X (V2X) communications such as security, centralization, and lack of privacy. In addition, it guaranteed an easy data exchange between different actors of intelligent transportation systems.


Author(s):  
Yessenia Berenice Llive ◽  
Norbert Varga ◽  
László Bokor

In the near future with the innovative services and solutions being currently tested and deployed for cars, homes, offices, transport systems, smart cities, etc., the user connectivity will considerably change. It means that smart devices will be connected to the internet and produce a big impact on the internet traffic, increasing the service demand generated by devices and sensors. However most of these devices are vulnerable to attacks. Hence, the security and privacy become a crucial feature to be included in towards its appropriate deployment. Interconnected, cooperative, service-oriented devices and their related hardware/software solutions will contain sensitive data making such systems susceptible to attacks and leakage of information. Therefore, robust secure communication infrastructures must be established to aid suitable deployment. This chapter is a state-of-the-art assessment of US and EU C-ITS security solutions.


2020 ◽  
Vol 11 (2) ◽  
pp. 80-111 ◽  
Author(s):  
Gladys Gnana Kiruba B. ◽  
Debi Prasanna Acharjya

The growth of new technologies and ambient intelligence is an emerging technology that enhances our life by adding sensors and networks. Ambient technology is a revolution on smart devices that makes human life efficient. Smartwatches are one that provides flexibility in people's daily lives by adopting sensing and reasoning of their activities and the surrounding environment. Analyzing a customer's behaviour towards smartwatches that use ambient intelligence is a critical issue. This article analyses the behavioural intention of customer satisfaction towards smartwatch users in an ambient environment with the help of structured equation modeling using partial least squares and fuzzy rough sets. The structural equation modeling is used to check the reliability and validity of the constructs whereas a fuzzy rough set is used for rule generation and studying customer satisfaction. This enhances the personalization of human beings with the assistance of human-computer interaction capabilities of ambient intelligence.


Author(s):  
Zhenzhen Huang ◽  
Qiang Niu ◽  
Shuo Xiao

The development of sensor technologies and smart devices has made it possible to realize real-time data acquisition of human beings. Human behavior monitoring is the process of obtaining activity information with wearables and computer technology. In this paper, we design a data preprocessing method based on the data collected by a single three-axis accelerometer. We first use Butterworth filter as low-pass filtering to remove the noise. Then, we propose a KGA algorithm to remove abnormal data and smooth them at the same time. This method uses genetic algorithm to optimize the parameters of Kalman filter. After that, we use a threshold-based method to identify falls that are harmful to the elderly. The key point of this method is to distinguish falls from people’s daily activities. According to the characteristics of human falls, we extract eigenvalues that can effectively distinguish daily activities from falls. In addition, we use cross-validation to determine the threshold of the method. The results show that in the analysis of 11 kinds of human daily activities and 15 types of falls, our method can distinguish 15 types of falls. The recognition recall rate in our method reaches 99.1%.


Wireless sensor networks (WSNs) are a promising technology for several industrial real-time and quotidian applications. Due to inherent limitations in WSN, security is a crucial issue. Cryptographic primitives are the fundamental components for designing security protocols to achieve security and privacy in WSN. Based on the review, it has been analyzed that the majority of security protocols for WSN are based on encryption and key distribution. The main open issue for these approaches concerns the establishment of security with an involvement of complex procedure, which presents considerable memory overheads, in contrast with the limited resources of sensor nodes. Therefore, the proposed work presents the modeling of an analytical approach for efficient encryption using temporal key management for robust security services to resists potential attacks and enables secure communication. The utilization of temporal-key mechanism in encryption operation offers additional support to routing operation in the network for secure data transmission with negligible computational overhead, thus preserving a higher level of energy savings in packet transmission operation. The validation of the proposed system performance is carried out a simulation study, which shows the effectiveness of the proposed system in terms of node remaining energy and processing time.


Author(s):  
Guyi Yi ◽  
Ilaria Di Carlo

AbstractThe proliferation of digital technology has swelled the amount of time people spent in cyberspace and weakened our sensibility of the physical world. Human beings in this digital era are already cyborgs as the smart devices have become an integral part of our life. Imagining a future where human totally give up mobile phones and embrace nature is neither realistic nor reasonable. What we should aim to explore is the opportunities and capabilities of digital technology in terms of fighting against its own negative effect - cyber addiction, and working as a catalyst that re-embeds human into outdoor world.Cyborgian systems behave through embedded intelligence in the environment and discrete wearable devices for human. In this way, cyborgian approach enables designers to take advantages of digital technologies to achieve two objectives: one is to improve the quality of environment by enhancing our understanding of non-human creatures; the other is to encourage a proper level of human participation without disturbing eco-balance.Finally, this paper proposed a cyborgian eco-interaction design model which combines top-down and bottom-up logics and is organized by the Internet of Things, so as to provide a possible solution to the concern that technologies are isolating human and nature.


2018 ◽  
Vol 9 (2) ◽  
pp. 62-76
Author(s):  
Sahil Sholla ◽  
Roohie Naaz Mir ◽  
Mohammad Ahsan Chishti

Notwithstanding the potential of IoT to revolutionise our personal and social lives, the absence of a solid framework of ethics may lead to situations where smart devices are used in ways uncongenial to the moral fabric of a society. In this work, the authors seek to provide a conceptual framework toward incorporating ethics in IoT. They employ the concept of object for each smart device in order to represent ethics relevant to its context. Moreover, the authors propose dedicating a separate ethics layer in the protocol stack of smart devices to account for socio-cultural ethical aspects of a society. The ethics layer enables us to account for ethical responsibilities of smart devices vis-a-vis society so that inadvertent physical, emotional or psychological harm to human beings is avoided. Such mechanism ensures that devices operate ethically not only at individual level but also at D2D level to give rise to high order ethical structures e.g. ethical home, ethical office, ethical university, ethical city, etc.


2019 ◽  
Vol 16 (10) ◽  
pp. 4345-4349
Author(s):  
Latika Kakkar ◽  
Deepali Gupta ◽  
Sapna Saxena ◽  
Sarvesh Tanwar

The Internet of Things (IoT) comprises of various smart devices which are networked together to detect, accumulate, process, improve and interchange significant data over the Internet. IoT has improved our lifestyle by offering various applications such as intelligent home, smart healthcare, traffic monitoring and smart city devices. The IoT devices have restriction of power, battery life, memory and network constraints, so cloud can be used for accumulating and analyzing the IoT data. Due to the considerable increase in data transfer over Internet and other devices, the confidential information from the IoT sources required to be secure from any third party access. Cloud computing (CC) on the other side provides a protected, abrupt and advantageous data storage and computing services all over the internet. The integration of both these technologies can prove to be beneficial for each other. Therefore, we need an efficient and authentic method for secure communication in the IoT and cloud based big data environment. This paper provides a review of amalgamation of the IoT and cloud by featuring the implementation challenges and integration benefits.


2018 ◽  
Vol 12 (1) ◽  
pp. 42-52 ◽  
Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication delay. An authentication technique having significant delay may enhance the possibility of several security threats. A number of authentication protocols have been proposed in the literature but if existing practices are deliberated then to optimize one of the constraint other parameters are affected radically. In this manuscript, a Diffie-Hellman elliptic curve technique is used over WMN which reduces latency and computational overhead issues. Further to prove the integrity of proposed work, the performance is measured theoretically and analyzed experimentally over ns2 simulator.


Sign in / Sign up

Export Citation Format

Share Document