• Title/Summary/Keyword: IoTs

Search Result 36, Processing Time 0.028 seconds

Security Threats and Attacks in Internet of Things (IOTs)

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.107-118
    • /
    • 2021
  • The term Internet of Things (IoTs) refers to the future where things are known daily through the Internet, whether in one way or another, as it is done by the method of collecting various information from various sensors to form a huge network through which people, things and machines are helped to make a link between them at all time and anywhere. The IoTs is everywhere around us such as connected appliances, smart homes security systems and wearable health monitors. However, the question is what if there is a malfunction or outside interference that affects the work of these IoTs based devises? This is the reason of the spread of security causes great concern with the widespread availability of the Internet and Internet devices that are subject to many attacks. Since there aren't many studies that combines requirements, mechanisms, and the attacks of the IoTs, this paper which explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality Additionally, the paper addresses the different types of attacks in IoTs. We have also addressed the different approaches aim to prevention mechanisms according to several researchers' conclusions and recommendations.

Social Impacts of IoT: Job Prospects through Scenario Planning (사물인터넷의 사회적 영향: 시나리오 플래닝을 통한 일자리 영향 전망)

  • Soyoung Yoo;Ingoo Han
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.173-187
    • /
    • 2016
  • This study on the social effects of Internet of Things (IoTs) provides an overview of future job prospects through the scenario planning approach, highlighting the challenges and opportunities that IoTs will bring in the future. IoTs and the related field of technological innovations have become increasingly important in both academic and business communities in the past few years because of computing power breakthrough and its price drop. IoTs enables people to deal with routine works efficiently and challenges them even in non-routine and/or cognitive tasks, which are considered a unique area for individuals. The scenario planning analysis helps us to define the uncertain boundary and to estimate the potential opportunities and inherent threats to provide decision makers with a mind map on how the development of IoTs can influence employment. To assess the potential effects on jobs described in our scenarios, we briefly examine the local structure of employment and discuss which careers are expected to decline or grow in particular among the 52 standard occupational classifications in Korea.

Cloud of Things (CoTs): Security Threats and Attacks

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.229-237
    • /
    • 2021
  • Cloud of things (CoTs) is a newer idea which combines cloud computing (CC) with the Internet of Things (IoT). IoT capable of comprehensively producing data, and cloud computing can be presented pathways that allow for the progression towards specific destinations. Integrating these technologies leads to the formation of a separate element referred to as the Cloud of Things (CoTs). It helps implement ideas that make businesses more efficient. This technology is useful for monitoring a device or a machine and managing or connecting them. Since there are a substantial amount of machines that can run the IoT, there is now more data available from the IoT that would have to be stored on a local basis for a provisional period, and this is impossible. CoTs is used to help manage and analyze data to additionally create usable information by permitting and applying the development of advanced technology. However, combining these elements has a few drawbacks in terms of how secure the process is. This investigation aims to recent study literature from the past 3 years that talk about how secure the technology is in terms of protecting by authentication, reliability, availability, confidentiality, and access control. Additionally, this investigation includes a discussion regarding some kinds of potential attacks when using Cloud of Things. It will also cover what the various authors recommend and conclude with as well as how the situation can be approached to prevent an attack.

Design and Evaluation of a Quorum-Based Adaptive Dissemination Algorithm for Critical Data in IoTs (IoT에서 중요한 데이터를 위한 쿼럼 기반 적응적 전파 알고리즘의 설계 및 평가)

  • Bae, Ihn Han;Noh, Heung Tae
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.8
    • /
    • pp.913-922
    • /
    • 2019
  • The Internet of Things (IoT) envisions smart objects collecting and sharing data at a massive scale via the Internet. One challenging issue is how to disseminate data to relevant data consuming objects efficiently. In such a massive IoT network, Mission critical data dissemination imposes constraints on the message transfer delay between objects. Due to the low power and communication range of IoT objects, data is relayed over multi-hops before arriving at the destination. In this paper, we propose a quorum-based adaptive dissemination algorithm (QADA) for the critical data in the monitoring-based applications of massive IoTs. To design QADA, we first design a new stepped-triangular grid structures (sT-grid) that support data dissemination, then construct a triangular grid overlay in the fog layer on the lower IoT layer and propose the data dissemination algorithm of the publish/subscribe model that adaptively uses triangle grid (T-grid) and sT-grid quorums depending on the mission critical in the overlay constructed to disseminate the critical data, and evaluate its performance as an analytical model.

Open Hardware Platforms for Internet of Things : Evaluation & Analysis

  • Seo, Jae-Yeon;Kim, Myung-Hwi;Jang, Beakcheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.47-53
    • /
    • 2017
  • In this paper, we present open hardware platforms for Internet of Things (IoTs) emphasizing their strengths and weaknesses. We introduce six representative platforms, Raspberry PI, Arduino, Garileo, Edison, Beagle board and Artik. We define important performance issues for open hardware platforms for IoTs and analyze recent platforms according to the performance issues. We present recent research project using open hardware platforms introduced in this paper. We believe that this paper provide wise view and necessary information for open hardware platforms for Internet of Things (IoT).

Anti-complementary Activities of Exo- and Endo-biopolymer Produced by Submerged Mycelial Culture of Eight Different Mushrooms

  • Yang, Byung-Keun;Gu, Young-Ah;Jeong, Yong-Tae;Song, Chi-Hyun
    • Mycobiology
    • /
    • v.35 no.3
    • /
    • pp.145-149
    • /
    • 2007
  • The Elfvingia applanata (EA), Hericium erinaceum (HE), Grifola frondosa (GF), Pholiota nameko (PN), Pleurotus eryngii (PE), Trametes suaveolens (TS), Fomes fomentarius (FF), and Inonotus obliquus (IO) could produce the endo- (EN) and exo-biopolymer (EX) in submerged culture. The highest anti-complementary activity of the EN was exhibited by PN (49.1%), followed by HE (38.6%), TS (37.0%), and FF (33.0%), whereas the high activity of the EX was found with GF (59.8%), followed by HE (36.3%), TS (30.8%), and IO (28.8%). The EN of P. nameko (EN-PN) and EX of G. frondosa (EX-GF) were found to contain 78.6% and 41.2% carbohydrates, while 21.4% and 58.8% protein, respectively. The sugar and amino acid compositions of EN-PN and EX-GF were also analyzed in detail.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

Effects of the Pelvic Compression Belt on Trunk Muscles Activities During Sit-to-Stand, and Stand-to-Sit Tasks (골반압박벨트가 앉아서 일어서기와 일어서서 앉기 동작 시 체간근육 근활성도에 미치는 영향)

  • Jang, Hyun-Jeong;Kim, Suhn-Yeop;Park, Hyun-Ju
    • Physical Therapy Korea
    • /
    • v.20 no.1
    • /
    • pp.1-9
    • /
    • 2013
  • The purpose of this study was to determine the effect of the pelvic compression belt (PCB) on the electromyography (EMG) activities of trunk muscles during sit-to-stand (SitTS), and stand-to-sit (StandTS) tasks. Twenty healthy subjects (7 men and 13 women) were recruited for this study. The subjects performed SitTS, and StandTS tasks, with and without a PCB. Surface EMG was used to record activity of the internal oblique (IO), external oblique (EO), rectus abdominis (RA), erector spinae (ES), and multifidus (MF) of the dominant limb. EMG activity significantly decreased in the RA (without the PCB, $8.34{\pm}6.04$ %maximal voluntary isometric contraction [%MVIC]; with the PCB, $7.64{\pm}5.11$ %MVIC), EO (without the PCB, $14.83{\pm}11.82$ %MVIC; with the PCB, $11.98{\pm}7.60$ %MVIC), MF (without the PCB, $21.74{\pm}7.76$ %MVIC; with the PCB, $18.50{\pm}8.04$ %MVIC), and ES (without the PCB, $18.39{\pm}7.16$ %MVIC; with the PCB, $16.63{\pm}6.31$ %MVIC) during the SitTS task and in the IO (without the PCB, $20.58{\pm}15.60$ %MVIC; with the PCB, $17.27{\pm}12.32$ %MVIlC), RA (without the PCB, $8.04{\pm}5.68$ %MVIC; with the PCB, $7.40{\pm}4.71$ %MVIC), EO (without the PCB, $13.29{\pm}8.80$ %MVIC; with the PCB, $11.24{\pm}6.14$ %MVIC), MF (without the PCB, $18.59{\pm}7.64$ %MVIC; with the PCB, $15.86{\pm}6.48$ %MVIC), and ES (without the PCB, $17.14{\pm}6.44$ %MVIC; with the PCB, $15.46{\pm}5.62$ %MVIC) during the StandTS task when a PCB was used (p<.05). In men the EMG activity of the MF significantly decreased during the SitTS task when a PCB was used (p<.05): in women, the EMG activity of the RA, EO, MF, and ES during the SitTS task and that of the EO, MF, and ES during the SitTS task significantly decreased when a PCB was used (p<.05). In addition, the rates of change in the EMG activity of each muscle differed significantly during the SitTS and StandTS tasks before and after the use of the PCB. However, the EMG activity did not significantly differ between the male and female subjects. These findings suggest that the PCB may contribute to the modification of activation patterns of the trunk muscles during SitTS, and StandTS tasks.

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.