With the rapid technological improvements in mobile devices and their inclusion in Internet of Things (IoT), secure key management becomes mandatory to ensure security of information exchange. For instance, IoT applications, such as smart health-care and smart homes, provide automated services to the users with less or no user intervention. As these application use user-sensitive data, ensuring their security and privacy should be paramount, especially during the key management process. However, traditional approaches for key management will not suit well in IoT environment because of the inherent resource constraint property of IoT devices. In this paper, we propose a novel distributed key management scheme for IoT ecosystem. The proposed scheme efficiently provides security to IoT devices by delegating most of the resource consuming cryptographic processing to a local entity. This entity coordinates with other peer entities to provide a distributed key as well as an authentication mechanism to network devices. In particular, the proposed scheme exploits the advantages of mobile agents by deploying them in different subnetworks as and when required: (1) to process the cryptography work for the IoT devices, and (2) to act as an local authenticated entity to perform fast authentication process. To verify the effectiveness and correctness of our proposed scheme, we have simulated it in a large IoT scenario and evaluated against relevant metrics that includes user mobility, certification generation time, and communication overhead.
相似文献Nowadays, next-generation networks such as the Internet of Things (IoT) and 6G are played a vital role in providing an intelligent environment. The development of technologies helps to create smart city applications like the healthcare system, smart industry, and smart water plan, etc. Any user accesses the developed applications; at the time, security, privacy, and confidentiality arechallenging to manage. So, this paper introduces the blockchain-defined networks with a grey wolf optimized modular neural network approach for managing the smart environment security. During this process, construction, translation, and application layers are created, in which user authenticated based blocks are designed to handle the security and privacy property. Then the optimized neural network is applied to maintain the latency and computational resource utilization in IoT enabled smart applications. Then the efficiency of the system is evaluated using simulation results, in which system ensures low latency, high security (99.12%) compared to the multi-layer perceptron, and deep learning networks.
相似文献One of the prominent applications of Internet of Things (IoT) in this digital era is the development of smart cities. In IoT based smart cities, the smart objects (devices) are connected with each other via internet as a backbone. The sensed data by the smart objects are transmitted to the sink for further processing using multi hop communication. The smart cities use the analyzed data to improve their infrastructure, public utilities and they enhance their services by using the IoT technology for the betterment of livelihood of the common people. For IoT based smart cities, waste collection is a prominent issue for municipalities that aim to achieve a clean environment. With a boom in population in urban areas, an increasing amount of waste is generated. A major issue of waste management system is the poor process used in waste collection and segregation. Public bins begin to overflow for a long period before the process of cleaning starts, which is resulting in an accumulation of bacteria causing bad odors and spreading of diseases. In order to overcome this issue, in this paper an IoT based smart predication and monitoring of waste disposal system is proposed which utilizes off-the-shelf components that can be mounted to a bin of any size and measure fill levels. An Arduino microcontroller is employed in the proposed model to interface the infrared (IR), ultraviolet (UV), weight sensors, and a Global Positioning System (GPS) module is used to monitor the status of bins at predetermined intervals. The proposed system transmits the data using the cluster network to the master module which is connected to the backend via Wi-Fi. As data is collected, an intelligent neural network algorithm namely Long Short-Term Memory (LSTM) is used which will intelligently learn and predict the upcoming wastage from waste generation patterns. Moreover, the proposed system uses Firebase Cloud Messaging to notify the appropriate people when the bins were full and needed to be emptied. The Firebase Cloud Messaging (FCM) JavaScript Application Programming Interface (API) is used to send notification messages in web apps in browsers that provide service work support. Hence, the proposed system is useful to the society by providing facilities to the governments for enforcing stricter regulations for waste disposal. Additional features such as automated calibration of bin height, a dynamic web data dashboard as well as collation of data into a distributed real-time firebase database are also provided in the proposed system.
相似文献The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased business productivity and enriched diverse areas of life over the years, the world is yet to see a methodical revolution of its humongous application and transformation given its ubiquity and highly interconnected global network structure. The main culprit for such lapses is principally attributed to security and privacy issues which have been widely discussed in research articles and reviews but remain largely unaddressed in the literature. Hence, this paper provides a state-of-the-art review of IoT security and its challenges. It overviews technical and legal solutions that are useful to private, organizational, and governmental enterprises. The study encompasses the review and security analysis of IoT’s evolution and revolution, IoT security assessments, requirements, current research challenges in security and much more. Consequently, it offers potential solutions to address the security challenges discussed and further present open research issues, research gaps, opportunities, future development, and recommendations. This overview is intended to serve as a knowledgebase that will proffer novel foresight to guide users and administrators in positioning themselves and their organizations in a manner that is consistent with their overall objectives, mission, and vision for remarkable outcomes. Likewise, interested scholars and researchers can explore topics and directions from the study in providing better solutions to the numerous problems in IoT security.
相似文献Internet of Things (IoT) is a widely adoptable technology in industrial, smart home, smart grid, smart city and smart healthcare applications. The real world objects are remotely connected through internet and it provides services with the help of friendly devices. Currently IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) standard is gaining a part of consideration among the IoT research community because of its effectiveness to improvise the reliability of communication which is orchestrated by the scheduling. As TSCH is an emerging Medium Access Control (MAC) protocol, it is used in the proposed work to enhance the network scheduling by throughput maximization and delay minimization. The paper focuses on proper utilization of the channel through node scheduling. NeuroGenetic Algorithm (NGA) has been proposed for TSCH scheduling and its performance is evaluated with respect to time delay and throughput. The system is implemented in real time IoT devices and results are perceived and analyzed. The proposed algorithm is compared with existing TSCH scheduling algorithms.
相似文献The emergence of the internet of things (IoT) has drastically influenced and shaped the world of technology in the contexts of connectivity, interconnectivity, and interoperability with smart connected sensors, objects, devices, data, and applications. In fact, IoT has brought notable impacts on the global economy and human experience that span from industry to industry in a variety of application domains, including healthcare. With IoT, it is expected to facilitate a seamless interaction and communication of objects (devices) with humans in the environment. Therefore, it is imperative to embrace the potentials and benefits of IoT technology in healthcare delivery to ensure saving lives and to improve the quality of life using smart connected devices. In this paper, we focus on the IoT based healthcare system for cancer care services and business analytics/cloud services and also propose the adoption and implementation of IoT/WSN technology to augment the existing treatment options to deliver healthcare solution. Here, the business analytics/cloud services constitute the enablers for actionable insights, decision making, data transmission and reporting for enhancing cancer treatments. Furthermore, we propose a variety of frameworks and architectures to illustrate and support the functional IoT-based solution that is being considered or utilized in our proposed smart healthcare solution for cancer care services. Finally, it will be important to understand and discuss some security issues and operational challenges that have characterized the IoT-enabled healthcare system.
相似文献Nowadays, the unparalleled growth of Internet of Things (IoT) is a new digital disruption which intelligent devices are connected and working together. IoT connects personal computers, tablets, and smart phones in our daily communications from leisure purposes to business tasks. However, the security concern of IoT can’t be overemphasized due to the connectivity among communication gadgets. Sustainably, Twitter is one of the most popular Instant Message (IM) toolkits today. When Twitter is being utilized, there will be some negligible and imperceptible digital remnants left in the computing devices, which could be probative digital evidences in a court of law when IoT application is involved. Hence, the digital forensics of IM has been a relatively rigorous, competitive, and novel research field by the law enforcement agency officers and the information security staffs with respect to some cybercrimes concerning IoT. Consequently, this research is targeting on the utilization of Twitter on the desktop PC under Windows 7 operating system via the acquisition of volatile digital bread crumbs inside physical memory of the computing device for the purpose of presenting supportive digital evidences for some information security concerns. The proposed various scenarios in the design of the experiment could be the paradigms for digital forensics specialists or law enforcement agencies to follow in order to reconstruct the previous operations in the Twitter sessions of a certain user under the IoT ecosystems.
相似文献The smart home is considered as an essential domain in Internet of Things (IoT) applications, it is an interconnected home where all types of things interact with each other via the Internet. This helps to automate the home by making it smart and interconnected. However, at the same time, it raises a great concern of the privacy and security for the users due to its capability to be controlled remotely. Hence, the rapid technologically growth of IoT raises abundant challenges such as how to provide the home users with safe and secure services keeping privacy in the account and how to manage the smart home successfully under the controlled condition to avoid any further secrecy or theft of personal data. A number of the research papers are available to address these critical issues, researchers presented different approaches to overcome these stated issues. This research review will analyze smart home approaches, challenges and will suggest possible solutions for them and illustrate open issues that still need to be addressed.
相似文献Internet of Things (IoT) is a heterogeneous network of interconnected things where users, smart devices and wireless technologies, collude for providing services. It is expected that a great deal of devices will get connected to the Internet in the near future. Opportunistic networks(OppNet) are a class of disruption tolerant networks characterized by uncertain topology and intermittent connectivity between the nodes. Opportunistic Internet of Things(OppIoT) is an amalgamation of the OppNet and IoT exploiting the communication between the IoT devices and the communities formed by humans. The data is exposed to a wide unfamiliar audience and the message delivery is dependent on the residual battery of the node, as most of the energy is spent on node discovery and message transmission. In such a scenario where a huge number of devices are accommodated, a scalable, adaptable, inter-operable, energy-efficient and secure network architecture is required. This paper proposes a novel defense mechanism against black hole and packet fabrication attacks for OppIoT, GFRSA, A Green Forwarding ratio and RSA (Rivest, Shamir and Adleman) based secure routing protocol. The selection of the next hop is based on node’s forwarding behavior, current energy level and its predicted message delivery probability. For further enhancing the security provided by the protocol, the messages are encrypted using asymmetric cryptography before transmission. Simulations performed using opportunistic network environment (ONE) simulator convey that GFRSA provides message security, saves energy and outperforms the existing protocols, LPRF-MC (Location Prediction-based Forwarding for Routing using Markov Chain) and RSASec (Asymmetric RSA-based security approach) in terms of correct packet delivery by 27.37%, message delivery probability is higher by 34.51%, number of messages dropped are reduced by 15.17% and the residual node energy is higher by 14.08%.
相似文献