8 research outputs found

    A metaheuristic optimization approach for energy efficiency in the IoT networks

    Get PDF
    © 2020 John Wiley & Sons, Ltd. Recently Internet of Things (IoT) is being used in several fields like smart city, agriculture, weather forecasting, smart grids, waste management, etc. Even though IoT has huge potential in several applications, there are some areas for improvement. In the current work, we have concentrated on minimizing the energy consumption of sensors in the IoT network that will lead to an increase in the network lifetime. In this work, to optimize the energy consumption, most appropriate Cluster Head (CH) is chosen in the IoT network. The proposed work makes use of a hybrid metaheuristic algorithm, namely, Whale Optimization Algorithm (WOA) with Simulated Annealing (SA). To select the optimal CH in the clusters of IoT network, several performance metrics such as the number of alive nodes, load, temperature, residual energy, cost function have been used. The proposed approach is then compared with several state-of-the-art optimization algorithms like Artificial Bee Colony algorithm, Genetic Algorithm, Adaptive Gravitational Search algorithm, WOA. The results prove the superiority of the proposed hybrid approach over existing approaches

    Systematic Analysis of Safety and Security Risks in Smart Homes

    Get PDF
    The revolution in Internet of Things (IoT)-based devices and applications has provided smart applications for humans. These applications range from healthcare to traffic-flow management, to communication devices, to smart security devices, and many others. In particular, government and private organizations are showing significant interest in IoT-enabled applications for smart homes. Despite the perceived benefits and interest, human safety is also a key concern. This research is aimed at systematically analyzing the available literature on smart homes and identifying areas of concern or risk with a view to supporting the design of safe and secure smart homes. For this systematic review process, relevant work in the most highly regarded journals published in the period 2016-2020 (a section of 2020 is included)was analyzed. A final set of 99 relevant articles (journal articles, book sections, conference papers, and survey papers) was analyzed in this study. This analysis is focused on three research questions and relevant keywords. The systematic analysis results and key insights will help researchers and practitioners to make more informed decisions when dealing with the safety and security risks of smart homes, especially in emergency situations.This publication was supported by Qatar University Internal Grant No. IRCC-2020-009

    LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment

    Get PDF
    In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication is successful, they establish a session key between them for secure communication. To achieve this goal, a novel device authentication and key management mechanism for the edge based IoT environment, called the lightweight authentication and key management scheme for the edge based IoT environment (LDAKM-EIoT), was designed. The detailed security analysis and formal security verification conducted by the widely used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool prove that the proposed LDAKM-EIoT is secure against several attack vectors that exist in the infrastructure of the edge based IoT environment. The elaborated comparative analysis of the proposed LDAKM-EIoT and different closely related schemes provides evidence that LDAKM-EIoT is more secure with less communication and computation costs. Finally, the network performance parameters are calculated and analyzed using the NS2 simulation to demonstrate the practical facets of the proposed LDAKM-EIoT

    A systematic review of crime facilitated by the consumer Internet of Things

    Get PDF
    The nature of crime is changing — estimates suggest that at least half of all crime is now committed online. Once everyday objects (e.g. televisions, baby monitors, door locks) that are now internet connected, collectively referred to as the Internet of Things (IoT), have the potential to transform society, but this increase in connectivity may generate new crime opportunities. Here, we conducted a systematic review to inform understanding of these risks. We identify a number of high-level mechanisms through which offenders may exploit the consumer IoT including profiling, physical access control and the control of device audio/visual outputs. The types of crimes identified that could be facilitated by the IoT were wide ranging and included burglary, stalking, and sex crimes through to state level crimes including political subjugation. Our review suggests that the IoT presents substantial new opportunities for offending and intervention is needed now to prevent an IoT crime harvest

    IoMT Malware Detection Approaches: Analysis and Research Challenges

    Get PDF
    The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, privileged-insider, remote hijacking, password guessing and denial of service (DoS) attacks, and malware attacks. Among these attacks, the attacks which are performed through the malware botnet (i.e., Mirai) are the malignant attacks. The existence of malware botnets leads to attacks on confidentiality, integrity, authenticity and availability of the data and other resources of the system. In presence of such attacks, the sensitive data of IoT communication may be disclosed, altered or even may not be available to the authorized users. Therefore, it becomes essential to protect the IoT/IoMT environment from malware attacks. In this review paper, we first perform the study of various types of malware attacks, and their symptoms. We also discuss some architectures of IoT environment along with their applications. Next, a taxonomy of security protocols in IoT environment is provided. Moreover, we conduct a comparative study on various existing schemes for malware detection and prevention in IoT environment. Finally, some future research challenges and directions of malware detection in IoT/IoMT environment are highlighted

    Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

    No full text
    The Information and Communication Technology (ICT) has been used in wide range of applications, such as smart living, smart health and smart transportation. Among all these applications, smart home is most popular, in which the users/residents can control the various smart sensor devices of home by using the ICT. However, the smart devices and users communicate over an insecure communication channel, i.e., the Internet. There might be the possibility of various types of attacks, such as smart device capture attack, user, gateway node and smart device impersonation attacks and privileged-insider attack on a smart home network. An illegal user, in this case, can gain access over data sent by the smart devices. Most of the existing schemes reported in the literature for the remote user authentication in smart home environment are not secure with respect to the above specified attacks. Thus, there is need to design a secure remote user authentication scheme for a smart home network so that only authorized users can have access to the smart devices. To mitigate the aforementioned isses, in this paper, we propose a new secure remote user authentication scheme for a smart home environment. The proposed scheme is efficient for resource-constrained smart devices with limited resources as it uses only one-way hash functions, bitwise XOR operations and symmetric encryptions/decryptions. The security of the scheme is proved using the rigorous formal security analysis under the widely-accepted Real-Or-Random (ROR) model. Moreover, the rigorous informal security analysis and formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. Finally, the practical demonstration of the proposed scheme is also performed using the widely-accepted NS-2 simulation

    Security in 5G-Enabled Internet of Things Communication: Issues: Challenges, and Future Research Roadmap

    Get PDF
    5G mobile communication systems promote the mobile network to not only interconnect people, but also interconnect and control the machine and other devices. 5G-enabled Internet of Things (IoT) communication environment supports a wide-variety of applications, such as remote surgery, self-driving car, virtual reality, flying IoT drones, security and surveillance and many more. These applications help and assist the routine works of the community. In such communication environment, all the devices and users communicate through the Internet. Therefore, this communication agonizes from different types of security and privacy issues. It is also vulnerable to different types of possible attacks (for example, replay, impersonation, password reckoning, physical device stealing, session key computation, privileged-insider, malware, man-in-the-middle, malicious routing, and so on). It is then very crucial to protect the infrastructure of 5G-enabled IoT communication environment against these attacks. This necessitates the researchers working in this domain to propose various types of security protocols under different types of categories, like key management, user authentication/device authentication, access control/user access control and intrusion detection. In this survey paper, the details of various system models (i.e., network model and threat model) required for 5G-enabled IoT communication environment are provided. The details of security requirements and attacks possible in this communication environment are further added. The different types of security protocols are also provided. The analysis and comparison of the existing security protocols in 5G-enabled IoT communication environment are conducted. Some of the future research challenges and directions in the security of 5G-enabled IoT environment are displayed. The motivation of this work is to bring the details of different types of security protocols in 5G-enabled IoT under one roof so that the future researchers will be benefited with the conducted work

    Aceitação das tecnologias da casa inteligente: um estudo transversal com potenciais clientes do Brasil

    Get PDF
    Tese (doutorado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós-Graduação em Engenharia de Produção, Florianópolis, 2023.O desenvolvimento de tecnologias associadas a produtos inteligentes tem se difundido globalmente e em diversas áreas, incluindo empreendimentos residenciais. Nesse contexto, as casas inteligentes surgem como um novo produto e se tornam o foco de diversos estudos, do mercado da construção civil e de discussões tecnológicas, políticas e ambientais. Porém, o processo de disseminação da casa inteligente para uso dos clientes vem ocorrendo de forma lenta e distinta conforme a região que se desenvolvem as tecnologias da casa inteligente. Existem os benefícios percebidos pelo usuário que promovem o uso dessas tecnologias, mas existem fatores que interferem como barreiras no processo de aceitação da casa inteligente. Dessa forma, o objetivo desse trabalho é propor um modelo e estimar o efeito dos fatores que determinam a aceitação das tecnologias da casa inteligente pelos usuários. A fim de alcançar este objetivo, foram utilizadas algumas técnicas e ferramentas como método para o desenvolvimento deste trabalho. A revisão sistemática da literatura e a meta análise foram utilizadas para análise e síntese do portfólio dos estudos. Para identificação dos fatores que interferem na aceitação de tecnologias da casa inteligente por parte do usuário, foi utilizada a abordagem de Strucutural Equation Modeling. Por meio desse estudo, foi possível identificar que os constructos Expectativa de Esforço e Expectativa de Performance apresentam efeito significativo em relação a Atitude e que os constructos Influência Social, Motivação Hedônica, Valor de Preço e Atitude são significativos para a Intenção de Uso. Para identificação do valor percebido pelo cliente diante das funcionalidades da casa inteligente foi utilizada a técnica de preferência declarada e o Willingness to Pay. Esse estudo permitiu identificar que as funcionalidades Eletrodomésticos, Iluminação, Ar Condicionado, Segurança, Medidor, TV e Som e Janelas e Cortinas possuem utilidade significativa pela percepção do usuário. O maior valor médio disposto a pagar pelo usuário é em relação a funcionalidade Segurança, R3.059,30,eomenorvalormeˊdiodispostoapagareˊemrelac\ca~oafuncionalidadeJanelaseCortinas,R3.059,30, e o menor valor médio disposto a pagar é em relação a funcionalidade Janelas e Cortinas, R501,70. Contudo, esta tese apresenta o ineditismo da realização da meta análise sobre aceitação de tecnologias da casa inteligente, da estimação de aceitação das tecnologias da casa inteligente com potenciais clientes da América do Sul, mais precisamente do sul e sudeste do Brasil, e da estimação conjunta da utilidade de diversas funcionalidades integrantes da casa inteligente e incluindo a disposição a pagar por estas funcionalidades.Abstract: The new technologies associated with smart products have spread globally and in several areas, including residential developments. In this context, smart homes emerge as a new product and become the focus of research in many areas, such as the civil construction market, technological innovation, political and environmental. However, the dissemination of smart home technologies to the customer has been taking place slowly and differently depending on the region of the country. There are many benefits perceived by the user that promote the use of these technologies. However, there are still numerous barriers to accepting the smart home. Thus, this work aims to propose a model and estimate the effect of factors that determine the acceptance of smart home technologies by users. The current research utilized some techniques and tools to reach the thesis goal. A systematic literature review and meta-analysis were used to analyze and synthesize the study portfolio. The Structural Equation Modeling approach was used to identify the factors that interfere with the user's acceptance of smart home technologies. Through this study, it was possible to identify that the Effort Expectation and Performance Expectation constructs have a significant effect on Attitude and that the Social Influence, Hedonic Motivation, Price Value, and Attitude constructs are significant for Intention to Use. The stated preference technique and the Willingness to Pay were used to identify the value perceived by the customer of the features of the smart home. This study allowed us to identify that the functionalities of Appliances, Lighting, Air Conditioning, Security, Meter, TV and Sound, and Windows and Curtains have significant utility in the user's perception. The highest average amount willing to pay by the user is for the Security feature, R3,059.30,andthelowestaverageamountisfortheWindowsandCurtainsfeature,R3,059.30, and the lowest average amount is for the Windows and Curtains feature, R501.70. Moreover, this thesis presents some innovative contributions to the literature, such as the meta-analysis of acceptance of smart home technologies, the estimation of acceptance of smart home technologies with potential customers in South America, more precisely in the south and southeast of Brazil, and estimation of the utility of several functionalities that are part of the smart home, including the willingness to pay for these functionalities
    corecore