Integration of Cloud Computing with Internet of Things. Группа авторов
Читать онлайн книгу.pp. 1-4, August 15, 2007, archived from the original (PDF) on 6 Mar 2009.
23. Stojmenovic, I. and Wen, S., The FC paradigm: Scenarios and security issues, in: 2014 IEEE Federated Conference on Computer Science and Information Systems, pp. 1–8, 2014.
24. Visalakshi, P., Paul, S., Mandal, M., Green Computing, International Journal of Modern Engineering Research (IJMER), in: Proceedings of the National Conference on Architecture, Software systems and Green computing (NCASG), Paiyanoor (India), pp. 63–69, 2013.
25. Arshad, R., Zahoor, S., Shah, M.A., Wahid, A., Yu, H., Green IoT: An investigation on energy saving practices for 2020 and beyond. IEEE Access, 5, 667–681, 2017.
26. Ganzha, M., Paprzycki, M., Pawłowski, W., Szmeja, P., Wasielewska, K., Alignment-based semantic translation of geospatial data, in: 3rd IEEE International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall), pp. 1–8, 2017.
27. Gyrard, A. and Serrano, M., Connected smart cities: Interoperability with seg 3.0 for the internet of things, in: 30th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 796–802, 2016.
28. Palo, H.K. and Mohanty, M.N., Analysis of Speech Emotions Using Dynamics of Prosodic Parameters, in: Cognitive Informatics and Soft Computing, pp. 333–340, Springer, Singapore, 2020.
29. Palo, H.K., Behera, D., Rout, B.C., Comparison of Classifiers for Speech Emotion Recognition (SER) with Discriminative Spectral Features, in: Advances in Intelligent Computing and Communication, pp. 78–85, Springer, Singapore, 2020.
30. Palo, H.K., Chandra, M., Mohanty, M.N., Recognition of Human Speech Emotion Using Variants of Mel-Frequency Cepstral Coefficients, in: Advances in Systems, Control and Automation, Lecture Notes in Electrical Engineering, vol. 442, pp. 491–498, Springer Nature Singapore, 2018.
31. Palo, H.K., Kumar, P., Mohanty, M.N., Emotional Speech Recognition using Optimized Features. Int. J. Res. Electr. Comput. Eng., 5, 4, 4–9, 2017.
32. Mohanty, M.N. and Palo, H.K., Child emotion recognition using probabilistic neural network with effective features. Measurement, Elsevier, 152, 107369, 2020.
1 *Corresponding author: [email protected]
2
Measures for Improving IoT Security
Richa Goel1*, Seema Sahai1, Gurinder Singh1 and Saurav Lall2
1Amity International Business School, Noida, India
2Azure IoT, Microsoft Seattle, Seattle, Washington, USA
Abstract
In today’s world of Digital Transformation, IoT banking/online transaction is a major point of concern for the user. IoT security plays a vital role to develop the trust of end users for making frequent use of the same. There have been IoT security breaches in recent years. As a result, immoral hackers have ample opportunities to intercept and change or misuse the information. Through this paper we are going to discuss various issuse/problems faced in terms of IoT security along with the measure to be chosen to achieve higher security while going for online transactions.
Keywords: IoT security, digital transformation, breach of trust
2.1 Introduction
Through the World Wide Web, we’ve entered into a brand new era of connectivity. “Things have identities and virtual personalities operating in smart places using intelligent interfaces to connect and communicate inside social, environmental and user contexts [7].” More than twenty billion devices were connected with each other in 2017. This means that the potential risk of cyber-attacks is going on increasingly, equally.
Gartner’s special report indicates that there is a high level of risk to all the IoT devices, whether it is the platform, their operating systems or even the other devices to which they are connected [10]. The kind of risk that exists is that ranging from physical tampering to information hacking and impersonation and many more. Organizations’ functioning has completely changed with the coming in of IOT. With this change a whole range of risks have also emerged and it has become the utmost priority of organizations to manage these risks.
A variety of possible security threats are posed by IOT which could affect users: (1) Enabling unauthorized access and abuse of data and confidential information and (2) enabling attacks on linked networks and devices (3) developing security risks [22]. Scientists have proposed that privacy and online protection should not be segregated. All security policies need to be addressed with respect to IOT and its linking systems and apps. It’s also true that online protection is the main problem for cloud computing. “Safety is one of the key concerns required to avoid the occurrence and use of IOT,” the World Health Organization states. There are also several barriers to health at IoT. It would be necessary to explain:
1 a. Expansion of the ‘IoT’ to the ordinary network, network controls and cell network
2 b. website that links everyone
3 c. exchange of objects with each other
4 d. Accessible easily.
The code layer, information layer, physical layer and networking layer contain many technical obstacles to IoT security. To order to protect IoT, numerous reports discuss these security topics. Experiments that illustrate IoT’s human experience are rare, though. Some of the latest works on IoT defense still consider the technical aspect. In order to achieve success in technology performance or safety management, users need to understand Dhillon and Torkzadeh’s [9] expectations, values and beliefs.
We recognize that consumer expectations and values are balanced against technology to achieve positive results for information technology and the effective management of legislation. IoT Securing Science is in its infancy as it is a very active and recent research field. Further emphasis should also be placed on the confidentiality, fairness and privacy of IoT data and their credibility. Inside this article, we perform a thorough analysis to address numerous IoT security issues/problems along with the step to use the firewall for greater protection when performing online transactions.
2.2 Perceiving IoT Security
Researcher’s Agarwal and Dey [4] note, “a safe and secure world allowed by IoT promises to lead to truly connected environments, where people and things cooperate to improve the overall quality of life. Truly IoT will give us operating information at our fingertips, without us having to ask for it or even recognizing that it might be required.” According to some researchers, the IoT is “a dynamic global network infrastructure with self-configuring capabilities based on a standard and interoperable communication convention where physical and virtual ‘things’ have identities, physical attributes, and virtual personalities, use intelligent interfaces and are flawlessly united into the information network.” With regards to securing IoT, some authors state that “In this context the information pump of the real world of interest is represented across billions of ‘things,’ many of which are updating in real-time and a transaction or data change is updated across hundreds or thousands of ‘things’ with differing update policies, opens up for many security challenges and security techniques across multiple policies. In order to prevent the unauthorized use of private information, research is needed in the area of vigorous trust, security and privacy management.” Agarwal and Dey [4] also note that “security IoT means providing access control procedure and policies and being able to implement them, particularly in the