Security in the Context of Internet of Things, Cloud, Fog, and Edge (original) (raw)

Critical-Issues-in-the-Invasion-of-the-Internet-of-Things-(IoT) -Security-Privacy-and-Other-Vulnerabilities

https://www.researchgate.net/publication/331545884\_Critical-Issues-in-the-Invasion-of-the-Internet-of-Things-IoT\_-Security-Privacy-and-Other-Vulnerabilities, 2019

In this chapter, the authors collected data from issues related to threats in the applications of IoT-based technologies that describe the security and privacy issues from 30 peer reviewed publications from 2014 to 2017. Further, they analyzed each threat type and its percentages in each application of the internet of things. The results indicated that the applications of smart transportation (20%) face the highest amount of security and privacy issues followed by smart home (19%) and smart cities (18%) compared to the rest of the applications. Further, they determined that the biggest threats were denial of service attack (9%) followed by eavesdropping (5%), man in the middle (4%), and replay (4%). Denial of service attacks and man in the middle attack are active attacks that can severely damage human life whereas eavesdropping is a passive attack that steals information. This study has found that privacy issues have the biggest impacts on people. Therefore, researchers need to find possible solutions to these threats to improve the quality of IoT applications.

IOT Supported Security Considerations for Network

WSEAS TRANSACTIONS ON COMMUNICATIONS

The current IP and other networks such as Power Smart Grids are fast evolving, thus resulting in diverse connectivity methodologies. This has led to the emergence of "the Internet of Things” (IoT) methodologywhose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. It will seamlessly interconnect the globe via intelligent devices and sensors of varying types, this resulting in voluminousgeneration and exchange of data in excess of 20 billion Internet-connected objects and sensors (things) by 2022.The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned ofbeneficial services. In this paper, we overview both IoT enabled network architecture as well as security forassociated objects and devices. We commence with a description of a generalized IoT enabled network's security architecture as well as how the various elements constituting them interact. We then describe an approachthat allows t...

20 Cloud Security Considerations for Supporting the Internet of Things

IEEE Internet of Things Journal, 2015

To realise the broad vision of pervasive computing, underpinned by the "Internet of Things" (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and personal safety risks that arise beyond these subsystems; that is, from the wide-scale, crossplatform openness that cloud services bring to IoT. In this paper we focus on security considerations for IoT from the perspectives of cloud tenants, end-users and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies (be they things or entire IoT subsystems). Our contribution is to analyse the current state of cloud-supported IoT to make explicit the security considerations that require further work.

Twenty security considerations for cloud-supported Internet of Things

To realise the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and personal safety risks that arise beyond these subsystems; that is, from the wide-scale, cross-platform openness that cloud services bring to IoT. In this paper we focus on security considerations for IoT from the perspectives of cloud tenants, end-users and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies (be they things or entire IoT subsystems). Our contribution is to analyse the current state of cloud-supported IoT to make explicit the security considerations that require further work.

Security Ecosystem in IoT & Cloud

— The cloud computing and the Internet of things are tightly coupled with each other. The rapid growth of the Internet of Things (IoT) and the development of technologies created a widespread connection of " things ". This results in the production of large amounts of data which needs to be stored, processed and accessed. Cloud computing is a paradigm for big data storage and analytics while the Internet of Things is exciting on its own that the real innovation will come from combining it with cloud computing. This can enable sensing services and powerful processing of sensing data stream. More things are being connected to address a growing range of business needs. In fact, by the year 2020, more than 50 billion things will connect to the Internet—seven times our human population. Insufficient security will be a critical barrier to large-scale deployment of IoT systems and broad customer adoption of IoT applications using cloud. Simply extending the existing IT security architectures to the IoT and cloud will not be sufficient. The IoT world requires new security approaches, creating fertile ground for innovative thinking and solutions. This paper discusses key issues that are believed to have long-term significance in IoT and cloud computing security and privacy, based on documented problems and exhibited weaknesses.

Security and Privacy Concerns of the "Internet of Things" (IoT) in IT and its Help in the Various Sectors across the World

International Journal of Computer Trends and Technology (IJCTT), 2020

The so called internet of things (IoT) is a form of technology advancement that has a capacity for driving change in our daily lives in a variety of sectors. The fantastic opportunity will help in the collection of data that is relatively exponential and in a manner that is continuous to present changes that are significant on the lives. Devices growth and the speed in which they are developed to attain the IoT era of technology offers the challenges of security and the battling of freedom as people establish policies and governance that rebuilds the developments without interfering with the innovations. Among the issues, includes the concerns on the security and privacy brought by the technology. The vulnerabilities of security that are experienced by the IoT devices are as a result of the contributing factors like the low capabilities of the devices in terms of energy and the capabilities of computing, the wireless channels are seemingly unreliable, and the vulnerabilities on the physical nature of the devices. This paper will focus on the IoT evolution, the definitions attached to IoT, and some of the many applications of IoT. It will create an emphasis on the considerations of security and privacy, including the challenges that are tied to the general IoT and the IoT application context. A critical assessment of the works done for IoT is presented by the literature review on the perspective of the developmental era and the evaluation of the trend. The paper will also give the IoT security risks taxonomy, mechanisms, and attacks related to the technology.

Internet of Things: Financial Perspective and Associated Security Concerns

International journal of computer theory and engineering, 2020

The internet of things (IoT) has grown at a significant pace and has revolutionized the whole technological aspects of internet and things. In the paper around 800 IoT companies headquartered in various countries globally were analyzed. It was observed that the financial returns of select IoT companies for past five years have witnessed a decent growth however; the industry witnessed a slight dip in the year 2016. Appropriate privacy and security measures need to be in place to effectively secure the communications and storage of huge amounts of data generated.

Future with the Internet of Things: Is it Secure or not?

International Journal for Research in Applied Science & Engineering Technology, 2021

IoT has radically altered the workings of IT and networking environments, with significant benefits from wireless sensors and nanotechnologies. Although IoT is a growing forum, current data protection and security analysis has demonstrated that security and data security cannot be combined and united and that it will affect the use of the methodology for fear of personal information. Up to now, the polls have focused on vulnerabilities based on Internet-based information exchange technology. None of the polls have identified the user-centered integrated view on privacy and security. The main aim of this paper is to analyze the current state of IoT and to highlight the activities in the area of data security and privacy threats, surface attacks, vulnerabilities, and counteractions, and to suggest a taxonomy of the danger. To demonstrate basic user safety and privacy needs and concerns, IoT user's requirements and challenges have been identified and debated

INTERNET OF THINGS (IoT) : AN OVERVIEW OF SECURITY CONCERNS

The concept of combining computers, sensors, and networks to monitor and control devices has been around for decades, the recent confluence of key technologies and market trends is ushering in a new reality for the "Internet of Things''. IoT promises to usher in a revolutionary, fully interconnected "smart" world, with relationships between objects and their environment and objects and people becoming more tightly intertwined. The prospect of the Internet of Things as a ubiquitous array of devices bound to the Internet might fundamentally change how people think about what it means to be "online". While the potential ramifications are significant, a number of potential challenges may stand in the way of this vision -particularly in the areas of security. We discuss some of the issues related to this.