{"title":"基于物联网监控系统的安全可靠的设备访问控制方案","authors":"Divya Paikaray, Jayneel Gandhi","doi":"10.1109/IC3I56241.2022.10072568","DOIUrl":null,"url":null,"abstract":"Almost all industries, including engineering, medicine, transportation, and agriculture, are paying close attention to IoT-based monitoring systems at the moment. To increase the security of the systems under surveillance, monitoring systems are incorporated. Therefore, it is crucial to ensure that the system is highly reliable. The following subsystems—sensors, converters, microcontrollers, actuators, communication frameworks, and related devices which perfectly cooperate for an IoT monitoring system to function. The authors’ goal is to highlight the many dependability issues and difficulties that these systems provide. Additionally, it is expanded to describe subcomponent dependability based on functional responsibility. Any gadget may be imitated by an attacker by simply listening to the communication channel and utilizing public parameters. It is also possible to perform a successful man-in-the-middle attack using community parameters and conversations via a public channel. The paper goes on to recommend an enhanced protocol named iLACKA-IoT. Evidence is given through both formal validations using the random or real (ROR) model and informal validation utilizing talks of attack resilience. The iLACKA-IoT delivers resistance to a range of threats and the requisite degree of security. The iLACKA-IoT provides performance efficiency in addition to greater security when compared to LACKA-IoT and similar systems.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Secure and Reliable Device Access Control Scheme for IoT based Monitoring Systems\",\"authors\":\"Divya Paikaray, Jayneel Gandhi\",\"doi\":\"10.1109/IC3I56241.2022.10072568\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Almost all industries, including engineering, medicine, transportation, and agriculture, are paying close attention to IoT-based monitoring systems at the moment. To increase the security of the systems under surveillance, monitoring systems are incorporated. Therefore, it is crucial to ensure that the system is highly reliable. The following subsystems—sensors, converters, microcontrollers, actuators, communication frameworks, and related devices which perfectly cooperate for an IoT monitoring system to function. The authors’ goal is to highlight the many dependability issues and difficulties that these systems provide. Additionally, it is expanded to describe subcomponent dependability based on functional responsibility. Any gadget may be imitated by an attacker by simply listening to the communication channel and utilizing public parameters. It is also possible to perform a successful man-in-the-middle attack using community parameters and conversations via a public channel. The paper goes on to recommend an enhanced protocol named iLACKA-IoT. Evidence is given through both formal validations using the random or real (ROR) model and informal validation utilizing talks of attack resilience. The iLACKA-IoT delivers resistance to a range of threats and the requisite degree of security. The iLACKA-IoT provides performance efficiency in addition to greater security when compared to LACKA-IoT and similar systems.\",\"PeriodicalId\":274660,\"journal\":{\"name\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3I56241.2022.10072568\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10072568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure and Reliable Device Access Control Scheme for IoT based Monitoring Systems
Almost all industries, including engineering, medicine, transportation, and agriculture, are paying close attention to IoT-based monitoring systems at the moment. To increase the security of the systems under surveillance, monitoring systems are incorporated. Therefore, it is crucial to ensure that the system is highly reliable. The following subsystems—sensors, converters, microcontrollers, actuators, communication frameworks, and related devices which perfectly cooperate for an IoT monitoring system to function. The authors’ goal is to highlight the many dependability issues and difficulties that these systems provide. Additionally, it is expanded to describe subcomponent dependability based on functional responsibility. Any gadget may be imitated by an attacker by simply listening to the communication channel and utilizing public parameters. It is also possible to perform a successful man-in-the-middle attack using community parameters and conversations via a public channel. The paper goes on to recommend an enhanced protocol named iLACKA-IoT. Evidence is given through both formal validations using the random or real (ROR) model and informal validation utilizing talks of attack resilience. The iLACKA-IoT delivers resistance to a range of threats and the requisite degree of security. The iLACKA-IoT provides performance efficiency in addition to greater security when compared to LACKA-IoT and similar systems.