696 research outputs found
Securing Our Future Homes: Smart Home Security Issues and Solutions
The Internet of Things, commonly known as IoT, is a new technology transforming businesses, individuals’ daily lives and the operation of entire countries. With more and more devices becoming equipped with IoT technology, smart homes are becoming increasingly popular. The components that make up a smart home are at risk for different types of attacks; therefore, security engineers are developing solutions to current problems and are predicting future types of attacks. This paper will analyze IoT smart home components, explain current security risks, and suggest possible solutions. According to “What is a Smart Home” (n.d.), a smart home is a home that always operates in consideration of security, energy, efficiency and convenience, whether anyone is home or not
Chapter Blockchain Applications in Cybersecurity
Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we analyze different aspects that relate to the application of blockchain with techniques commonly used in the field of cybersecurity. Beginning by introducing the use of blockchain technology as a secure infrastructure, the document delves into how blockchain can be useful to achieve several security requirements, common to most applications. The document has been focused on some specific cybersecurity disciplines to maintain simplicity: backup and recovery, threat intelligence and content delivery networks. As illustrated, some projects and initiatives are in the process of joining these two fields to provide solutions to existing problems
Blockchain Applications in Cybersecurity
Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we analyze different aspects that relate to the application of blockchain with techniques commonly used in the field of cybersecurity. Beginning by introducing the use of blockchain technology as a secure infrastructure, the document delves into how blockchain can be useful to achieve several security requirements, common to most applications. The document has been focused on some specific cybersecurity disciplines to maintain simplicity: backup and recovery, threat intelligence and content delivery networks. As illustrated, some projects and initiatives are in the process of joining these two fields to provide solutions to existing problems
Blockchain's adoption in IoT: The challenges, and a way forward
© 2018 Elsevier Ltd The underlying technology of Bitcoin is blockchain, which was initially designed for financial value transfer only. Nonetheless, due to its decentralized architecture, fault tolerance and cryptographic security benefits such as pseudonymous identities, data integrity and authentication, researchers and security analysts around the world are focusing on the blockchain to resolve security and privacy issues of IoT. However, presently, not much work has been done to assess blockchain's viability for IoT and the associated challenges. Hence, to arrive at intelligible conclusions, this paper carries out a systematic study of the peculiarities of the IoT environment including its security and performance requirements and progression in blockchain technologies. We have identified the gaps by mapping the security and performance benefits inferred by the blockchain technologies and some of the blockchain-based IoT applications against the IoT requirements. We also discovered some practical issues involved in the integration of IoT devices with the blockchain. In the end, we propose a way forward to resolve some of the significant challenges to the blockchain's adoption in IoT
Blockchain-enhanced Roots-of-Trust
Establishing a root-of-trust is a key early step in establishing trust throughout the lifecycle of a device, notably by attesting the running software. A key technique is to use hardware security in the form of specialised modules or
hardware functions such as TPMs. However, even if a device supports such features, other steps exist that can compromise the overall trust model between devices being manufactured until decommissioning. In this paper, we discuss how blockchains, and smart contracts in particular, can be used to harden the overall security management both in the case of existing hardware enhanced security or when only software attestation is possible
Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use Case
The security of Industrial Internet of Things (IIoT) systems is a challenge that needs to be
addressed immediately, as the increasing use of new communication paradigms and the abundant
use of sensors opens up new opportunities to compromise these types of systems. In this sense,
technologies such as Trusted Execution Environments (TEEs) and Hardware Security Modules
(HSMs) become crucial for adding new layers of security to IIoT systems, especially to edge nodes
that incorporate sensors and perform continuous measurements. These technologies, coupled with
new communication paradigms such as Blockchain, offer a high reliability, robustness and good
interoperability between them. This paper proposes the design of a secure sensor incorporating
the above mentioned technologies—HSMs and a TEE—in a hardware device based on a dual-core
architecture. Through this combination of technologies, one of the cores collects the data extracted by
the sensors and implements the security mechanisms to guarantee the integrity of these data, while
the remaining core is responsible for sending these data through the appropriate communication
protocol. This proposed approach fits into the Blockchain networks, which act as an Oracle. Finally,
to illustrate the application of this concept, a use case applied to wine logistics is described, where
this secure sensor is integrated into a Blockchain that collects data from the storage and transport of
barrels, and a performance evaluation of the implemented prototype is providedEuropean Union’s Horizon Europe research and innovation program through the funding project
“Cognitive edge-cloud with serverless computing” (EDGELESS) under grant agreement number
101092950FEDER/Junta de Andalucia-Consejeria de Transformacion
Economica, Industria, Conocimiento y Universidades under Project B-TIC-588-UGR2
- …