An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment

Q3 Environmental Science
Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, B. K. Pattanayak, Saumendra Pattnaik, Rami Ahmad Habboush
{"title":"An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment","authors":"Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, B. K. Pattanayak, Saumendra Pattnaik, Rami Ahmad Habboush","doi":"10.25130/tjes.30.4.16","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"26 12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Tikrit Journal of Engineering Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25130/tjes.30.4.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Environmental Science","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.
防止物联网(IoT)环境遭受网络攻击的端到端安全方案
物联网(IoT)技术近来已成为一种潜在的全球通信媒介,可有效促进人与人之间、人与机器之间以及机器与机器之间的通信。最重要的是,与传统互联网不同,物联网支持机器与机器之间的通信,无需人工干预。然而,连接到物联网环境中的数十亿台设备大多是无线、小型、手持、资源有限且存储容量有限的设备。这些设备极易受到外部攻击。如今,网络犯罪分子经常试图对这些设备发起攻击,这给在整个物联网环境中有效实施通信带来了重大挑战。本文探讨了物联网环境中的网络攻击问题。本文提出了一种端到端加密方案,以保护物联网设备免受网络攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.50
自引率
0.00%
发文量
56
审稿时长
8 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信