IoT Security

Khuda Bux Jalbani, A. H. Jalbani, S. Soomro
{"title":"IoT Security","authors":"Khuda Bux Jalbani, A. H. Jalbani, S. Soomro","doi":"10.4018/978-1-7998-2803-7.ch006","DOIUrl":null,"url":null,"abstract":"The usage of the internet of things (IoT) devices is growing for the ease of life. From smart homes to smart cars, from smart transportation to smart cities, from smart hospitals to smart highways, these IoT devices send and receive highly sensitive data regarding the privacy of users or other information regarding the movement of users from one location to another location. The timing traces users when present at home and out of the home. But how does one secure this information from the attacker? There is a need for IoT devices security. As there are three layers of IoT devices—the application layer, network layer, and perception layer—three layers to be secure. IoT devices are heterogeneous and constrain energy consumption. The proposed solution in this chapter is three-way authentication of IoT devices by generating tokens from the device serial number and from the few configuration devices at the network layer. For high availability of IoT device services, the protection against distributed denial of service attack is implemented at the network layer.","PeriodicalId":298570,"journal":{"name":"Industrial Internet of Things and Cyber-Physical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"32","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Industrial Internet of Things and Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-2803-7.ch006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 32

Abstract

The usage of the internet of things (IoT) devices is growing for the ease of life. From smart homes to smart cars, from smart transportation to smart cities, from smart hospitals to smart highways, these IoT devices send and receive highly sensitive data regarding the privacy of users or other information regarding the movement of users from one location to another location. The timing traces users when present at home and out of the home. But how does one secure this information from the attacker? There is a need for IoT devices security. As there are three layers of IoT devices—the application layer, network layer, and perception layer—three layers to be secure. IoT devices are heterogeneous and constrain energy consumption. The proposed solution in this chapter is three-way authentication of IoT devices by generating tokens from the device serial number and from the few configuration devices at the network layer. For high availability of IoT device services, the protection against distributed denial of service attack is implemented at the network layer.
物联网安全
为了方便生活,物联网(IoT)设备的使用正在增长。从智能家居到智能汽车,从智能交通到智能城市,从智能医院到智能高速公路,这些物联网设备发送和接收有关用户隐私的高度敏感数据或有关用户从一个位置移动到另一个位置的其他信息。时间跟踪用户在家和外出时的情况。但是如何保护这些信息不被攻击者窃取呢?人们需要物联网设备的安全性。由于物联网设备有三层——应用层、网络层和感知层,所以三层是安全的。物联网设备是异构的,限制了能源消耗。本章提出的解决方案是通过从设备序列号和网络层的少数配置设备生成令牌来对物联网设备进行三向认证。为了保证物联网设备服务的高可用性,在网络层对分布式拒绝服务攻击进行防范。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信