scholarly journals INXU - A Security Extension for RFC 8520 to Give Fast Response to New Vulnerabilities on Domestic IoT Networks

2020 ◽  
Author(s):  
Sávyo Morais ◽  
Claudio Farias

As domestic Internet of Things (DIoT) devices become more popular, the number of devices connected to the Internet increases. It may also represent a risk to the end-user’s security and privacy. The infected devices can be used in DIoT botnets affecting the Internet’s stability. Although there are efforts to enhance IoT security, such as RFC 8520, there still needs for improvements in the DIoT context. To ensure DIoT security, this paper proposes INXU, an extension of RFC 8520 that enables blocking traffic related to well-known malicious activities. INXU introduces the concept of Malicious Traffic Description, a data model to describe traffic related to malicious activities, and enables Security Operation Centers to protect domestic networks.

Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


Author(s):  
Awad Saad Al-Qahtani, Mohammad Ayoub Khan Awad Saad Al-Qahtani, Mohammad Ayoub Khan

The Internet of things (IOT) users lack awareness of IOT security infrastructure to handle the risks including Threats, attack and penetration associated with its use. IOT devices are main targets for cyber-attacks due to variable personally identifiable information (PII) stored and transmit in the cyber centers. The security risks of the Internet of Things aimed to damage user's security and privacy. All information about users can be collected from their related objects which are stored in the system or transferred through mediums among diverse smart objects and may exposed to exposed dangerous of attacks and threats if it lack authentication so there are essential need to make IOT security requirements as important part of its efficient implementation. These requirements include; availability, accountability, authentication, authorization, privacy and confidentiality, Integrity and Non-repudiation. The study design is a survey research to investigate the visibility of the proposed model of security management for IOT uses, the security risks of IOT devices, and the changes IOT technology on the IT infrastructure of IOT users through answering of the research questionnaires. This work proposes a model of security management for IOT to predict IOT security and privacy threats, protect IOT users from any unforeseen dangers, and determine the right security mechanisms and protocols for IOT security layers, as well as give the most convenient security mechanisms. Moreover, for enhancing the performance of IOT networks by selecting suitable security mechanisms for IOT layers to increase IOT user's security satisfaction.


The Internet of Things (IoT) has been growing to market from the past several years with great potential. Many several devices have been now available in the market based on IoT, which enables it to connect with your smart phones or with any other kind of smart resources, and then that device is ready to perform smart work via the Internet. With the help of IoT, we are now able to make our devices connect with the internet and then can be operated from anywhere from the geo location as well as it can store and retrieve a large amount of data for better communication between the end-user and the device. IoT also has a wide range of applications that are being used on many platforms. However, this great technology also has to face many problems and among all the problems the main issue arises with its security aspects. The major concern on using IoT security is the hacker wants to enter into the large network system using a particular device as all the devices are connected over the network. Not only this, many other security threats and malware are also a major concern in IoT. So taking these security aspects as a major concern this research paper reviews several security issues and challenges that occur in IoT. As there in every field when it comes to cyber security for any kind of data, we need to follow CIA Security Triangle i.e., Confidentiality, Integrity, and Availability of data. CIA security triangle is the most important concept in terms of security and also must be taken into consideration in the IoT domain. Therefore, considering all these facts and reviewing some of the latest documents as well as researches in the field of IoT, this paper has been based on all the facts related to IoT security issues and its desirable solution which is needed to be done and should follow the security triangle to an extent.


2020 ◽  
Author(s):  
Vinod Kumar Verma

BACKGROUND COVID- 19 pandemics has affected the life of every human being in this world dramatically. The daily routine of the human has been changed to an uncertain extent. Some of the people are affected by the COVID-19, and some of the people are in fear of this epidemic. This has completely changed the thorough process of the people, and now, they are looking for solutions of this pandemic at different levels of the human addressable areas. These areas include medicine, vaccination, precautions, psychology, technology-assisted solutions like information technology, etc. There is a need to think in the direction of technology compliant solutions in the era of COVID-19 pandemic. OBJECTIVE The objective of this paper is to discuss the existing views and focus on the recommendations for the enhancement in the current situation from COVID-19. METHODS Based on the literature, perceptions, challenges, and viewpoints, the following opinions are suggested to the research community for the prevention and elimination of global pandemic COVID-19. The research community irrespective of the discipline focus on the following: 1. The comprehensive thought process for the designing of the internet of things (IoT) based solutions for healthcare applications used in the prevention from COVID-19. 2. Strategies for restricting outbreak of COVID-19 with the emerging trends in Ehealthcare applications. Which should be the optimal strategy to deal with a global pandemic? 3. Explorations on the data analysis as derived from the advanced data mining and warehousing associated with IoT. Besides, cloud-based technologies can be incorporated for the global spread of healthcare-related information to serve the community of different countries in the world. 4. The most adaptable method and technology can be deployed for the development of innovative solutions for COVID-19 related people like smart, patient-centric healthcare information systems. 5. Implementation of smart solutions like wearable technology for mask and PPE along with their disposal can be considered to deal with a global epidemic like COVID-19. This will lead to the manufacturing and incorporation of wearable technologies in the healthcare sector by industries. 6. A Pervasive thought process can be standardized for dealing with global pandemic like COVID-19. In addition, research measures should be considered for the security and privacy challenges of IoT services carrying healthcare-related information. These areas and directions are diverse but, in parallel, the need for healthy bonding and correlation between the people like researchers and scientists irrespective of their discipline. The discipline may vary from medical, engineering, computing, finance, and management, etc. In addition, standard protocols and interoperability measures can be worked out for the exchange of information in the global pandemic situations. RESULTS Recommendations Discussed CONCLUSIONS In this paper, the opinions have been discussed in the multi-disciplinary areas of research like COVID-19 challenges, medicines and vaccines, precautionary measures, technology assistance, and the Internet of Things. These opinions and discussion serve as an integrated platform for researchers and scientists to think about future perspectives to deal with healthcare-related COVID-19 pandemic situation. This includes the original, significant, and visionary automation based ideas, innovations, scientific designs, and applications focusing on Inter-disciplinary technology compliant solutions like IoT, vaccinations, manufacturing, preventive measures, etc. for the improvement of efficiency and reliability of existing healthcare systems. For the future, there is dire need to strengthen the technology not only in the one area but also for the interdisciplinary areas to recover from the pandemic situation rapidly and serve the community.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


Author(s):  
Martin Victor K ◽  
J. Immanuel Johnraja ◽  
Getzi Jeba Leelipushpam ◽  
J. Jebaveerasingh Jebadurai ◽  
I. Bildass Santhosam

2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


Sign in / Sign up

Export Citation Format

Share Document