61 research outputs found

    Security and Privacy Challenges in the Internet of Things

    Get PDF
    The future Internet of Things as an intelligent collaboration of miniaturized sensors poses new challenges to security and end-user privacy. The ITU has identified that the protection of data and privacy of users is one of the key challenges in the Internet of Things [Int05]: lack of confidence about privacy will result in decreased adoption among users and therefore is one of the driving factors in the success of the Internet of Things. This paper gives an overview, categorization, and analysis of security and privacy challenges in the Internet of Things

    Vorwort

    Get PDF

    INTELLIGENT WIRELESS SENSOR BASED BOMB DETECTION: AN INTEGRATION QUALITY OF SERVICE MODEL FOR INTERNET OF THINGS PLATFORM

    Get PDF
    Owing to the global security concerns, intelligent Wireless Sensor Networks (iWSN) have been a major outcome of technological breakthrough. It thus becomes a practical platform where the information about the real world could be obtained via data fusion and computational embedded hardware systems. This paper presents a new perspective to Bomb Detection Technology (BDT) using an integration model that is based on the Internet of Things (IoT)ideology. QoS performance evaluation of selected algorithms, that is, the LEACH, Direct, as well as, a proposed cluster head (CH) algorithm for event based sensing and communication within an IoT deployment context was undertaken. Detection of suicide bombers and their related security frontiers is addressed in the IoT integration processed at the network level. The obtained results validate the need to integrate WSN devices into the IoT stack. In this regard, the IoT based CH algorithm is proposed for efficient communication system and energy utilization in bomb detonation hardware designs

    ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability

    Get PDF
    Virtualization of Internet of Things(IoT) is a concept of dynamically building customized high-level IoT services which rely on the real time data streams from low-level physical IoT sensors. Security in IoT virtualization is challenging, because with the growing number of available (building block) services, the number of personalizable virtual services grows exponentially. This paper proposes Service Object Capability(SOC) ticket system, a decentralized access control mechanism between servers and clients to effi- ciently authenticate and authorize each other without using public key cryptography. SOC supports decentralized partial delegation of capabilities specified in each server/- client ticket. Unlike PKI certificates, SOC’s authentication time and handshake packet overhead stays constant regardless of each capability’s delegation hop distance from the root delegator. The paper compares SOC’s security bene- fits with Kerberos and the experimental results show SOC’s authentication incurs significantly less time packet overhead compared against those from other mechanisms based on RSA-PKI and ECC-PKI algorithms. SOC is as secure as, and more efficient and suitable for IoT environments, than existing PKIs and Kerberos

    Implementasi Multichain sebagai Alternatif Solusi Keamanan dan Privasi Data pada Komunikasi Perangkat Pintar Rumah

    Get PDF
    Abstrak— IoT berkembang dengan cepat dan diperkirakan akan tumbuh hingga 26 miliar perangkat di tahun 2020. Keamanan dan privasi dianggap sebagai hambatan utama agar paradigma IoT dapat diterima secara penuh. Keterbatasan pada perangkat IoT dan jaringan juga mengakibatkan sulitnya menerapkan solusi keamanan yang ada secara langsung, khususnya protokol keamanan tradisional dan kriptografi primitif yang membutuhkan banyak memori dan sumber daya komputer. Pada penelitian ini menerapkan teknologi yang menopang sistem cryptocurrency bitcoin yaitu blockchain, untuk memberikan keamanan dan privasi data pada arsitektur IoT dalam konteks smart home. Jenis blockchain yang digunakan adalah private blockchain dengan menggunakan platform MultiChain. Dengan menggunakan MultiChain maka hanya perangkat yang memiliki izin saja yang dapat bergabung ke dalam jaringan blockchain.  Dari pengujian yang telah dilakukan didapatkan hasil bahwa teknologi private blockchain dapat diterapkan dengan baik dengan menggunakan platform MultiChain.  Hasil dari pengujian keamanan menunjukkan bahwa permissionless device tidak dapat menyimpan data ke dalam blockchain ataupun mencari dan membaca data yang berasal dari dalam blockchain tanpa seizin node admin baik melalui API yang dimiliki MultiChain atau melalui aplikasi yang bertindak sebagai perangkat smart home yang mengirimkan data sehingga data di dalam blockchain menjadi aman dan kerahasiaannya terjaga. Kata Kunci— Blockchain, Smart Home, Keamanan, Privasi, Internet of Things
    corecore