Apostolos K. Gerodimos, Leandros A. Maglaras, Nicholas Ayres
{"title":"IoT: Communication Protocols and Security Threats","authors":"Apostolos K. Gerodimos, Leandros A. Maglaras, Nicholas Ayres","doi":"10.20944/preprints202111.0214.v1","DOIUrl":"https://doi.org/10.20944/preprints202111.0214.v1","url":null,"abstract":"The IoT is recognized as one of the most important areas of future technology and is gaining vast attention from a wide range of industries. Although, after 20 years from the first published literature (2002) the technology (as a whole) is not yet mature. In this study we will review the basics of IoT with a general approach, by addressing the problems of a standard architecture, vulnerabilities and use cases of this promising technology. Moreover, we will review some of the communication protocols that have invented especially for IoT technology, security threats and general implementation challenges.","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78763710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohan Krishna Kagita , Giridhar Reddy Bojja , Mohammed Kaosar
{"title":"A framework for intelligent IoT firmware compliance testing","authors":"Mohan Krishna Kagita , Giridhar Reddy Bojja , Mohammed Kaosar","doi":"10.1016/j.iotcps.2021.07.001","DOIUrl":"10.1016/j.iotcps.2021.07.001","url":null,"abstract":"<div><p>The recent mass production and usage of the Internet of Things (IoT) have posed serious concerns due to the unavoidable security complications. The firmware of IoT systems is a critical component of IoT security. Although multiple organizations have released security guidelines, few IoT vendors are following these guidelines properly, either due to a lack of accountability or the availability of appropriate resources. Some tools for this purpose can use static, dynamic, or fuzzing techniques to test the security of IoT firmware, which may result in false positives or failure to discover vulnerabilities. Furthermore, the vast majority of resources are devoted to a single subject, such as networking protocols, web interfaces, or Internet of Things computer applications. This paper aims to present a novel method for conducting compliance testing and vulnerability evaluation on IoT system firmware, communication interfaces, and networking services using static and dynamic analysis. The proposed system detects a broad range of security bugs across a wide range of platforms and hardware architectures. To test and validate our prototype, we ran tests on 4300 firmware images and discovered 13,000+ compliance issues. This work, we believe, will be the first step toward developing a reliable automated compliance testing framework for the IoT manufacturing industry and other stakeholders.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"1 ","pages":"Pages 1-7"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.iotcps.2021.07.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"111599462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Physical Systems: Analyses, challenges and possible solutions","authors":"Amit Kumar Tyagi , N. Sreenath","doi":"10.1016/j.iotcps.2021.12.002","DOIUrl":"10.1016/j.iotcps.2021.12.002","url":null,"abstract":"<div><p>It is becoming more difficult to protect the authentication of our data in today's world of smart living. On the one hand, we are able to live in smart homes and smart cities with ease. Even if we use the most complicated passwords, we can't be sure that the Internet of Things and the Internet of Everything are safe. One way to make sure people and things are safe is to use Multi-Factor Authentication. Also, a big and complicated system needs more efficient and robust solutions for real, and strong, security, so this is important. There are a lot of smart ways to solve problems today. For this reason, the internet of things is being used in every possible field or application. This new ecosystem, which is called Cyber Physical Systems, was built by IoTs. Cyber-Physical Systems use computing, communication, and control to make new technology or the next generation of engineered systems. In the last decade, there has been a lot of work done on cyber physical systems that we didn't expect. There have been a lot of threats, challenges, and important issues in the last decade. We have a big problem with the security of CPS because the basic blocks used to make them are very different. Even if we're talking about natural gas systems or transportation systems or other automated systems, they all have something to do with CPS, no matter what. These days, CPSs systems are used for energy, transportation, the environment, and health care, among other things. This article talks about a number of problems that need to be solved by researchers and scientists (working related to respective area, i.e., CPS). As a result, this article also talks about a partial survey of important research issues, and an overview of several research projects that have been done in the last decade by a number of different people to improve CPS.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"1 ","pages":"Pages 22-33"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345221000055/pdfft?md5=64c472bb257bee895b12206ef895dea3&pid=1-s2.0-S2667345221000055-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79638699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensible and secure IoT communication for digital twins, cyber twins, web twins","authors":"Hailin Feng , Dongliang Chen , Haibin Lv","doi":"10.1016/j.iotcps.2021.12.003","DOIUrl":"10.1016/j.iotcps.2021.12.003","url":null,"abstract":"<div><p>In order to effectively solve the current security problems encountered by smart wireless terminals in the digital twin biological network, to ensure the stable and efficient operation of the wireless communication network. This research aims to reduce the interference attack in the communication network, an interference source location scheme based on Mobile Tracker in the communication process of the Internet of Things (IoT) is designed. Firstly, this paper improves Attribute-Based Encryption (ABE) to meet the security and overhead requirements of digital twin networking communication. The access control policy is used to encrypt a random key, and the symmetric encryption scheme is used to hide the key. In addition, in the proposed interference source location technology, the influence of observation noise is reduced based on the principle of unscented Kalman filter, and the estimated interference source location is modified by the interference source motion model. In order to further evaluate the performance of the method proposed as the interference source, this paper simulates the jamming attack scenario. The Root Mean Square Error (RMSE) value of the proposed algorithm is 0.245 m, which is better than the ErrMin algorithm (0.313 m), and the number of observation nodes of the proposed algorithm is less than half of the ErrMin algorithm. To sum up, satisfactory results can be achieved by taking the Jamming Signal Strength (JSS) information as the observation value and estimating the location of the interference source and other state information based on the untracked Kalman filter algorithm. This research has significant value for the secure communication of the digital twins in the IoT.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"1 ","pages":"Pages 34-44"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345221000067/pdfft?md5=21aa05f757dbeb4eb5c2137e1030b919&pid=1-s2.0-S2667345221000067-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80773922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G network slice for digital real-time healthcare system powered by network data analytics","authors":"Hemant Jain , Vinay Chamola , Yash Jain , Naren","doi":"10.1016/j.iotcps.2021.12.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2021.12.001","url":null,"abstract":"<div><p>In the wake of the COVID-19 pandemic, where almost the entire global healthcare ecosystem struggled to handle patients, it’s evident that the healthcare segment needs a virtual real-time digital support system. The recent advancements in technology have enabled machine-to-machine communication, enhanced mobile broadband, and real-time biometric data analytics. These could potentially fulfill the requirements of an end-to-end digital healthcare system. For building such a system, there is also a need for a dedicated and specialized communication network. Such a system will not only support dynamic throughput, latency and payload but also provide guaranteed QoS (Quality of Service) at every instant. The motive of our study was to define an implementable low-level architecture for the digital healthcare system by using the 5G Network Slice that incorporates all these features. Best-in-class wearable devices will collect the biometric data and transmit it via the 5G network slice. Data analytics is then applied to the collected data to build a knowledge graph used for quick predictions and prescriptions. The architecture also keeps in mind the security and integrity aspects of healthcare data.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"1 ","pages":"Pages 14-21"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345221000043/pdfft?md5=4593c54a9728287439cc44167d513d6b&pid=1-s2.0-S2667345221000043-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134670775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A proactive role of IoT devices in building smart cities","authors":"Shahzad Ashraf","doi":"10.1016/j.iotcps.2021.08.001","DOIUrl":"10.1016/j.iotcps.2021.08.001","url":null,"abstract":"<div><p>Due to rapid advancement in technology the world is rapidly changed to face the upcoming challenges and going towards automation. The use of various IoT devices is making a vast approach and every happening becomes part of the network and due to that towns are converting into smart cities. The IoT devices collect the data of every happening smartly and send it for further processing. An imperative part of these devices is containing the wireless sensors used for building smart cities. A giant set of data is collected in the sensors and is stored in the data center. Subsequently, the huge data becomes an exorbitant mountain that must be managed smartly if a smooth operation is required. In this study, how such big data can be managed shrewdly is going to explore and the proactive role of IoT sensors are investigated which helps in building the future smart cities more independently. The impact of services such as Smart transport, smart energy, smart infrastructure, smart health, smart agriculture, and smart recreation in respect of smart cities and the old traditional city has been analyzed through an Analytic Hierarchy Process (AHP). The obtained results showed a satisfactory level of local communities about 98% of people living in smart cities are satisfied in contrast to people living in old traditional cities and others having a neutral opinion.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"1 ","pages":"Pages 8-13"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.iotcps.2021.08.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90317507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}