15 research outputs found

    Optimalisasi Infrastruktur Jaringan Menggunakan Link Aggregation Control Protocol Dengan Device Cloud Router Switch

    Get PDF
    The development of data in a company is getting bigger and requires fast access time. the existence of a system that uses computer networks and internet access to support the activities of the company becomes an important part in the use of infrastructure in the company. Computer networks are accessed by all staff and employees in the building and there are servers and databases that are accessed all the time. In the building part consists of several work processes that simultaneously access to the same network and server. Then each staff and employee will access the same network infrastructure, where the data transfer burden is delegated to only one (1) switch port to connect. This can result in a large burden and network access can be slowed. By providing a configuration to optimize the switch network that adopts the link agro-protocol protocol (LACP) method on the use of network infrastructure so that it can be a solution for overcoming large network loads and slow access. By applying PPDIOO to the infrastructure development method so that the expectations can be achieved in accordance with the desired result

    A study on IoT-related security issues, challenges, and solutions.

    Get PDF
    The Internet of Things is now being developed to be the most cutting-edge and user-centric technology in the works. Raising both an individual\u27s and society\u27s level of life is the goal of this endeavour. When a technology advances, it always acquires certain flaws, which are always open to being attacked and taken advantage of in some manner. In this work, the problems posed by the Internet of Things (IoT) based on the fundamental security principles of confidentiality, integrity, and availability are discussed. It has also been discussed how an overview of the security restrictions, requirements, processes, and solutions implemented for the challenges generated in secured communication inside the IoT ecosystem. In this paper, the vulnerabilities of the underlying Internet of Things network are brought to light, and many security concerns on multiple tiers of the Internet of Things ecosystem have been examined. Based on the findings of our research into the vulnerabilities that are now present, a variety of potential solutions have been proposed in order to solve the ongoing problems that are plaguing the IoT ecosystem. In addition to that, it provides an overview of the various protocols that are used for security in IoT

    Perceptions on smart home concept among the millennials in Johor

    Get PDF
    The concept of smart home is a rising trend within the housing industry in Malaysia. With the advance of technology, homeowners are able to control and monitor their home through the smartphone or other networked device. However, it was discovered that Malaysians are highly reluctant in adopting smart home concept and similar Internet of Things (IoT). Within the smart home market, there were cases where potential home buyer may be unaware of the technology, thus hinder its adoption and further development. This research aims to investigate the awareness of potential home buyers specifically among the young millennials on smart home concept; perception on the factors influencing them to buy and key features that they will consider in buying a smart home. Questionnaire survey has been conducted and descriptive analysis has been used to analyse the data. Findings showed that the knowledge on smart home concept is still low among the target population. Respondents with the intention to buy smart home has chosen 'saving energy, time and money' as the main factor influencing while 'wireless lighting system' as the key features that taken into consideration. These findings may encourage the adoption of the smart home concept among the Millennia Generation in Malaysia and therefore intensify its development in the future

    Abordagem de detecção de intrusão para ambientes IoT baseados em computação em névoa

    Get PDF
    TCC(graduação) - Universidade Federal de Santa Catarina. Centro Tecnológico. Sistemas de Informação.A quantidade de equipamentos da IoT tem crescido consideravelmente nos últimos anos, a ponto de que a comunicação na internet entre máquinas superaa comunicação máquina homem. Esse novo conceito traz novos desafios, principalmente para área de segurança da informação, dada a sua natureza heterogênea e osurgimento de novas arquiteturas que suportam esse paradigma. A computação em nevoeiro vem sendo utilizada como uma camada intermediária para dar mais robustez às aplicações da IoT, através do fornecimento de armazenamento, processamento e serviços mais próxima dos dispositivos sensores. Este trabalho tem como objetivo avaliar a aplicabilidade de sistemas de detecção de intrusão na IoT através da camada de nevoeiro, utilizando de ferramentas já tradicionais para a segurança de redes de computadores

    IoT Privacy and Security: Challenges and Solutions

    Get PDF
    Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. In this work, we are exploring the background of IoT systems and security measures, and identifying (a) different security and privacy issues, (b) approaches used to secure the components of IoT-based environments and systems, (c) existing security solutions, and (d) the best privacy models necessary and suitable for different layers of IoT driven applications. In this work, we proposed a new IoT layered model: generic and stretched with the privacy and security components and layers identification. The proposed cloud/edge supported IoT system is implemented and evaluated. The lower layer represented by the IoT nodes generated from the Amazon Web Service (AWS) as Virtual Machines. The middle layer (edge) implemented as a Raspberry Pi 4 hardware kit with support of the Greengrass Edge Environment in AWS. We used the cloud-enabled IoT environment in AWS to implement the top layer (the cloud). The security protocols and critical management sessions were between each of these layers to ensure the privacy of the users’ information. We implemented security certificates to allow data transfer between the layers of the proposed cloud/edge enabled IoT model. Not only is the proposed system model eliminating possible security vulnerabilities, but it also can be used along with the best security techniques to countermeasure the cybersecurity threats facing each one of the layers; cloud, edge, and IoT

    Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing

    Get PDF
    The Internet of Things (IoT) envisions a world wherein everyday objects may connect to the internet and exchange data, analyse, store, and gather data from their environment and efficiently mediate on it. Fog computing, closer to the IoT, is formulated in data processing, filtering, aggregating, and storing. In fog IoT network one of the main challenges is security. The existing security solutions are based on modern cryptography algorithms are computationally complex which causes the fog IoT network to slow down. Therefore, in fog IoT the operations must be lightweight and secure. The security considerations include attacks, especially Man in the Middle attack (MitM), challenges, requirements, and existing solutions that are deeply analyzed and reviewed. Hence, omega network key generation based on deoxyribonucleic acid (ONDNA) is proposed, which provides lightweight encryption and decryption in fog computing. The security level of ONDNA is tested using NIST test suite. ONDNA passes all the 17 recommended NIST Test Suite tests. Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. The modified protocol is noted as OCTOPUS++. We proved that the OCTOPUS++ provides confidentiality, mutual authentication, and resistance to MitM attack using the widely accepted Burrows Abdi Needham (BAN) logic. The OCTOPUS++ is evaluated in terms of execution time. The average execution time for 20-time execution of OCTOPUS++ is 1.018917 milliseconds. The average execution time for Octopus, LAMAS and Amor is 2.444324, 20.1638 and 14.1152 milliseconds respectively. The results show that the OCTOPUS++ has less execution time than other existing protocol
    corecore