264,036 research outputs found

    Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

    Get PDF
    Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy

    Analysis of the security and privacy risks and challenges in smart cities' traffic light system

    Get PDF
    Currently, the IoT network is the fastest growing network in the world that brings the smart cities revolution. The increase in the smart cities development poses several security and privacy risks. With the acceleration of times, we can now hastily observe the lack of privacy in our life. The major security and privacy issues occur because of either non-consideration of its security and privacy aspects or having inappropriate controls in place. Many of these issues could be resolved by applying advanced IoT-enabled solutions. This paper presents security and privacy risks and challenges against issues within traffic lights system, which is a complex and critical smart cities system. The paper also addresses a proposed secure and privacy-aware system for future traffic light system

    Analysis of the security and privacy risks and challenges in smart cities’ traffic light system

    Get PDF
    Currently, the IoT network is the fastest growing network in the world that brings the smart cities revolution. The increase in the smart cities development poses several security and privacy risks. With the acceleration of times, we can now hastily observe the lack of privacy in our life. The major security and privacy issues occur because of either non-consideration of its security and privacy aspects or having inappropriate controls in place. Many of these issues could be resolved by applying advanced IoT-enabled solutions. This paper presents security and privacy risks and challenges against issues within traffic lights system, which is a complex and critical smart cities system. The paper also addresses a proposed secure and privacy-aware system for future traffic light system

    Dependability in wireless networks: can we rely on WiFi?

    Get PDF
    WiFi - short for "wireless fidelity" - is the commercial name for the 802.11 products that have flooded the corporate wireless local area network (WLAN) market and are becoming rapidly ingrained in our daily lives via public hotspots and digital home networks. Authentication and confidentiality are crucial issues for corporate WiFi use, but privacy and availability tend to dominate pervasive usage. However, because a technology's dependability requirements are proportional to its pervasiveness, newer applications mandate a deeper understanding of how much we can rely on WiFi and its security promises. In this article, we present an overview of WiFi vulnerabilities and investigate their proximate and ultimate origins. The intended goal is to provide a foundation to discuss WiFi dependability and its impact on current and future usage scenarios. Although a wireless network's overall security depends on the network stack to the application layer, this article focuses on specific vulnerabilities at the physical (PHY) and data (MAC) layers of 802.11 network

    A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches

    Get PDF
    The world is undergoing a dramatic rapid transformation from isolated systems to ubiquitous Internet-based-enabled 2018;things2019; capable of interacting each other and generating data that can be analyzed to extract valuable information. This highly interconnected global network structure known as Internet of Things will enrich everyone2019;s life, increase business productivity, improve government efficiency, and the list just goes on. However, this new reality (IoT) built on the basis of Internet, contains new kind of challenges from a security and privacy perspective. Traditional security primitives cannot be directly applied to IoT technologies due to the different standards and communication stacks involved. Along with scalability and heterogeneity issues, major part of IoT infrastructure consists of resource constrained devices such as RFIDs and wireless sensor nodes. Therefore, a flexible infrastructure is required capable to deal with security and privacy issues in such a dynamic environment. This paper presents an overview of IoT, security and privacy challenges and the existing security solutions and identifying some open issues for future research

    The future of data privacy and security concerns in Internet of things

    Get PDF
    A global, immersive, invisible, ambient network computing environment built through the continued proliferation of smart sensors, cameras, software, databases,and massive data centers in a world-spanning information fabric known as the Internet of Things. The idea is to live in connected world. Altogether varieties of connected objects from smart home appliances like televisions, laundry machines,thermostats, refrigerators to Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) are going to conserve the potential of IoT connectivity in all paces of future smart world. However, it has high importance to preserve adherence of enormous benefits of IoT connectivity, which might lead to unseen security and privacy issues and vulnerabilities that will cause various malicious attacks including waterhole, ransomware, eavesdropping, and others to exploit the potential of smart objects. This paper will present and forecast advanced concepts for end-to end security and privacy issues in a highly distributed, heterogeneous and dynamic network of IoT devices, which may reveal a holistic approach of device identification, authentication, and management, security, and privacy concerns
    corecore