• Tidak ada hasil yang ditemukan

Distributed, Cloud, and Fog Computing Motivations on Improving Security and Privacy of Internet of Things

N/A
N/A
Protected

Academic year: 2023

Membagikan "Distributed, Cloud, and Fog Computing Motivations on Improving Security and Privacy of Internet of Things "

Copied!
31
0
0

Teks penuh

In recent years, the Internet of Things (IoT) has received a lot of attention. Devices that are part of the Internet of Things can communicate with each other. The Internet of Things (IoT) universe includes a wide range of electronic devices such as desktop computers, laptops, smartphones, personal digital assistants (PDAs), tablets and other portable electronic gadgets[3].

There are significant limitations placed on the imagined space, which prevent the expansion of the Internet's capacity to provide greater services in the future. Building a smart environment and self-aware autonomous devices is one of the main goals of the Internet of Things (IoT), along with a number of other goals including smart health, smart living, smart products, and smart cities[2, 8] . The main objective of the Internet of Things is to create intelligent settings along with self-aware and self-sufficient devices.

Applications of IoT in industry, medical profession and home automation are discussed in the next section[48]. Earlier iterations of IoT were used to refer to the process of identifying individual objects via RFID[49]. The Internet of Things makes it possible to connect, track and control a wide variety of things in this way with the help of valuable information and confidential data that is collected automatically.

The home network receives a range of services from many different suppliers thanks to the use of a service platform[54].

IOTSecurity, Privacy, Threats and Challenges

  • Secure thing planning
  • Visible/usable security and privacy
  • Monitoring and personal information leakage
  • Protecting User Data: Another significant obstacle is protecting user data. It is essential to conceal oneself from any monitoring equipment on the Internet when data is being sent without
  • Concerns On Insurance: firms that install IoT devices in automobiles gather data regarding the driver's health and driving state in order to make choices regarding policies
  • A Lack of a Common Standard: Due to the fact that there are different standards for Internet of Things devices and businesses that manufacture Internet of Things devices, distinguishing between
  • Concerns Regarding the Technology: Because the Internet of Things (IoT) devices are becoming more widely used, the amount of traffic that is produced by these devices is also growing

It is not feasible to expect consumers to be able to accept these privacy regulations and complex security mechanism due to the high level of difficulty. It is essential to choose security and privacy regulations that can be automatically applied to the environment[65]. The potential threats to smart home security are broken down in the following figure: (3).

It is possible for malicious actors to gain access to the smart home network and send mass messages to clear smart devices using protocols such as Clear to Send (CTS)/Request to Send (RTS)[69]. Using the SSL approach in conjunction with an appropriate authentication mechanism is what is required to make the smart home network resilient to the attack. The Internet of Things (IoT) is a concept that envisions a future where physical objects connected to the Internet are able to interact with each other and identify themselves to other devices [15].

The Internet of Things consists of many “smart” objects such as smartphones, tablets and other electronic devices (8). The Internet of Things helps develop connections between people and between people and physical objects. Due to the exponential spread of data on the Internet, we need a network that is more useful and more secure[72].

For example, an application built on the Internet of Things could store patient health outcomes or store data. Even though the Internet of Things makes it easier for devices to communicate with each other, there are still issues with scalability, availability and response time. When data is sent over the Internet in a secure manner, there is a potential risk to one's security.

Due to the fact that there are different standards for Internet of Things devices and companies that manufacture Internet of Things devices, distinguish between Things devices and companies that manufacture Internet of Things devices distinguish between authorized and non- allowed devices that are connected to the Internet present a significant problem. In the field of Internet of Things (IoT) security, a significant amount of work has been done. System Security: System security primarily focuses on the Internet of Things (IoT) system to recognize various security issues, build various security frameworks and provide appropriate security recommendations with the aim of maintaining network security. ii.

Network Security: Network security refers to the protection of the communication network that different IoT devices use to communicate with each other. The Internet of Things is vulnerable to many different types of attacks, such as active and passive attacks, which can quickly disrupt its operation and negate the benefits of its services.

Privacy

Related work

78] A lightweight protocol for the secure remote control of Internet of Things devices by gateway controllers such as tablets or smartphones was proposed in 2013. However, the fact that each Internet of Things device must exchange symmetric keys with the trust center, as well as any valid input controllers operating that device, introduces certain problems with the scalability of the protocol as a whole. 79] An adaptive security solution for Internet of Things (IoT) devices based on Markov game theory was presented as a contribution in 2014.

They started by constructing a mathematical model that would reflect the context of the Internet of Things ecosystem. In addition, a model based on game theory was presented to guarantee a balance between security and power consumption, which is a significant obstacle regarding Internet of Things systems. The creation of an intelligent industrial ecosystem is the goal of the Industrial Internet of Things, which it does by using modern technology such as Wireless Sensor Networks.

The Internet of Things (IoT) and Industry 4.0 are two current concepts that offer creative business models and new user experiences. Due to lax security and the prevalence of hidden beliefs, the Internet of Things (IoT) is an attractive target for cyber attacks, which in turn cause physical harm to people and make their lives more difficult. Due to the complexity of these systems and the potential consequences of cyber attacks, connected industrial Internet of Things systems are facing new challenges.

The currently available Internet of Things platforms are not quite advanced enough to provide the required level of functionality. In short, this is because the interconnection of networks in the Internet of Things enables access from the anonymous and. When it comes to the implementation of an Internet of Things security system, on the other hand, it is essential to pay close attention to the basic standards and principles that underpin a cyber security framework.

82] and colleagues developed a system for adaptive security for Internet of Things devices that takes into account the reliability of sensor devices. Their approach makes use of a key exchange protocol that is password protected and developed exclusively for the Industrial Internet of Things (IIoT). This article presents the latest advances in the PAKE protocol and offers a viable solution for authenticated key establishment in the Internet of Things (IIoT) while using limited devices.

Conclusion

Researching the many different security protocols used in IoT devices and networks is also very significant. Askar, "IoT QoS Assurance Based on Cloud and Fog Computing," Journal of Applied Science and Technology Trends, vol. Salih, et al., "A study of the move from cloud computing to fog computing," Qubahan Academic Journal, vol.

Ageed, et al., "State-of-the-art study of IoT effects on smart city technology: challenges, opportunities and solutions". Zeebaree, "Massive MIMO-OFDM performance enhancement on 5G," in 2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2021, p. Salih, et al., "A survey of the application of data mining in smart city applications," Qubahan Academic Journal, vol.

Zebari, et al., "Clustering Document based on Semantic Similarity Using Graph Base Spectral Algorithm," in 2022 5th International Conference on Engineering Technology and its Applications (IICETA), 2022, pp. Mahmood, et al., "Ensemble of Handcrafted and Deep Learning Model for Histopathological Image Classification," CMC-COMPUTERS MATERIALS & CONTINUA, vol. Sharif, "State of Art Survey for Deep Learning Effects on Semantic Web Performance," in 2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM), 2021, pp.

Liu, “FogRoute: DTN-based data distribution model in fog computing,” IEEE Internet of Things Journal , vol. El-Shafai, et al., "Bio-Inspired Dynamic Trust and Secure Internet of Things of Infill Area-Based Drones (SIoDT)," Drones, vol. Liu, “A distributed position-based routing algorithm in the 3-D wireless Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol.

Hosseinzadeh, "Development of a Lightweight Centralized Authentication Mechanism for the Fog-Powered Internet of Things," Mathematics, vol. Dhanalakshmi, "Recent Advances and Challenges of the Internet of Things in Smart Agriculture: A Survey," Future Generation Computer Systems, vol. Li, et al., "Enabling AI in future wireless networks: A data life cycle perspective," IEEE Communications Surveys & Tutorials, vol.

Salam, "Security and Privacy in the Internet of Things-Status, Challenges", in 2021 4th Iraq International Conference on Engineering Technology and Their Applications (IICETA), 2021, p. Ullah, “Security Issues in the Internet of Things (IoT): A Comprehensive Survey,” International Journal of Advanced Computer Science and Applications, vol.

Referensi

Dokumen terkait

16 ﺶﻫوﮋﭘ لﺎﺳ ،ﯽﺨﯾرﺎﺗ مﻮﻠﻋ يﺎﻫ 14 هرﺎﻤﺷ ، 2 ، 1401 ﻣآ ﻪﺘﺨﯿ ﺮﻌﺷ ﻪﺑ هاﺮﻤﻫ هدﻮﺑ .ﺖﺳا ﻪﮔر دﻮﺟو ﻪﺑ نﺎﻋذا ﻦﻤﺿ ﺮﺿﺎﺣ ﮥﻟﺎﻘﻣ نﺎﺑز تاﺮﯿﺛﺎﺗ زا ﯽﯾﺎﻫ ﯽﻣ نﺎﺸﻧ ،ﯽﻧﺎﺳﺎﺳﺎﺸﯿﭘ ﮓﻨﻫﺮﻓ و ﺳ مود دﺮﮔدﺰﯾ