11,555 Hits in 4.4 sec

The Research on Security Technology for Low-Performance Iot Sensor Node

Youngkwan Ju, Hyung Jin Mun
2018 International Journal of Engineering & Technology  
vulnerable in IoT environment.  ...  We conduct a study on how we can improve security in the IoT environment.Findings: Generally, sensor nodes are applied with basic security provided by IoT communication protocol rather than their own encryption  ...  As shown in Fig. 1 , the sensor node sends values to IoT platform that manages sensor information through the network.It has a structure that transmits collected information to manage and request information  ... 
doi:10.14419/ijet.v7i3.34.19389 fatcat:vxypburk7zdztb4usaw7xssa5y

A Study on Development of IoT Software Vulnerability (Using Fake Information) Response System based on Artificial Intelligence

Jang Mook KANG, Choel Hee YOON, Jiho SHIN
2018 International Journal of Engineering & Technology  
In this paper, we investigate software vulnerabilities in IoT environment and propose a technique to cope with ioT vulnerabilities through artificial intelligence.  ...  Due to the operating structure of IoT, preparation of countermeasures to automatically analyze IoT software vulnerabilities based on artificial intelligence should be considered.  ...  The IoT platform is used as a framework for communication of objects and services in the field of cloud information and service mashup.  ... 
doi:10.14419/ijet.v7i3.33.18598 fatcat:ofbug7op2zc3hmmzwt3ijzvnaa

Ontology-based Security Context Reasoning for Power IoT-Cloud Security Service

Chang Choi, Junho Choi
2019 IEEE Access  
Accordingly, a security context ontology was modeled by analyzing the security vulnerabilities of a power system in a power IoT-Cloud environment, and security context inference rules were defined.  ...  Inference rules were then composed for each attack stage to check the paths of attacks those that exploit the vulnerability of a smart meter system.  ...  As Fig. 2 indicates, the IoT management and IoT layer collect security-related information of the power IoT devices, which consist of power IoT log records, a current status analysis module manager,  ... 
doi:10.1109/access.2019.2933859 fatcat:nkjzroorsjewrisrwfkctmdc2i

An Empirical Study of the Military IoT Security Priorities

Seung-hoon Jung, Jae-choon An, Jin-young Park, Yong-tae Shin, Jong-bae Kim
2016 International Journal of Security and Its Applications  
Therefore, to enhance the security of the environment in the future IoT based on full-length, it is necessary to study the security priority.  ...  To the study of future IoT-based battlefield, see the results of this study are reflected in the professional military security structure, we should effectively against threats expected in a given amount  ...  In this way, the military environment will become more complex, consisting of a simple sensor and equipment with IoT suitable for the structured synthesis conditions.  ... 
doi:10.14257/ijsia.2016.10.8.02 fatcat:ugmosgct25hzlfflmiodecrjfe

Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective

Mookyu Park, Haengrok Oh, Kyungho Lee
2019 Sensors  
To overcome this, we propose a framework to measure the risk of IoT devices based on security scenarios that can occur in a smart home.  ...  This paper describes the IoT security threats that can cause information leakage from a hierarchical viewpoint of cyberspace.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19092148 fatcat:6cmto4uhbzacji2pbsbn3iulqq

Multi-Source Knowledge Reasoning for Data-Driven IoT Security

Shuqin Zhang, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang, Shujun Li
2021 Sensors  
The method above provides support to security managers in their deployment of security solutions.  ...  In this paper, we integrate vulnerabilities, weaknesses, affected platforms, tactics, attack techniques, and attack patterns into a coherent set of links.  ...  Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21227579 pmid:34833653 pmcid:PMC8623156 fatcat:muvrsycdafarxeyzafmqax3ume

Hierarchical Multipath Blockchain Based IoT information Management Techniques for Efficient Distributed Processing of Intelligent IoT Information

Yoon-Su Jeong, Sung-Ho Sim
2021 Sensors  
As the number of IoT devices increases, the safety of IoT information, which is vulnerable to cyber attacks, is emerging as an important area of interest in distributed cloud environments.  ...  In this paper, we propose a blockchain-based integrity verification technique in which large amounts of IoT information processed in distributed cloud environments can be guaranteed integrity in security  ...  The data presented in this study are available on request from the corresponding author. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21062049 pmid:33799459 pmcid:PMC8001599 fatcat:bkuqonrdljde5h4phcln3b3wha

A Design of Automated Vulnerability Information Management System for Secure Use of Internet-Connected Devices Based on Internet-Wide Scanning Methods

Taeeun KIM, Hwankuk KIM
2021 IEICE transactions on information and systems  
Over the Internet, scanning studies remotely also exist realistic limitations such as low accuracy in analyzing security vulnerabilities due to a lack of device information or filtered by network security  ...  In this paper, we propose a system for remotely collecting information from Internet-connected devices and using scanning techniques to identify and manage vulnerability information from IoT devices.  ...  This paper proposes a system structure for managing the vulnerabilities of Internet-connected devices. The developed system was also tested comparatively in various environments.  ... 
doi:10.1587/transinf.2021ngp0004 fatcat:rt7thm5rfrhedllb5nnaozurbm

Proposal of a Methodology for the Assessment of Security Levels of IoT Wireless Sensor Networks in Nuclear Environments

Marcia Maria Savoine, Mario Olimpio de Menezes, Delvonei Alves de Andrade
2018 World Journal of Nuclear Science and Technology  
The proposal is initially based on related work to establish a more concrete initial framework and is structured in consistent steps from previous scientific studies.  ...  The use of Wireless Sensor Networks (WSN) associated with the reality of an Internet of Things (IoT) scenario in nuclear environments is a growing security concern.  ...  The few studies that were found in the literature address only the management of vulnerabilities or threats of wireless networks or wireless sensors.  ... 
doi:10.4236/wjnst.2018.82008 fatcat:uusmo5jpyjh6rhhnccm46xsx3y

A Review of Security Standards and Frameworks for IoT-Based Smart Environments

Nickson M. Karie, Nor Masri Sahri, Wencheng Yang, Craig Valli, Victor R. Kebande
2021 IEEE Access  
As a new contribution, a taxonomy of challenges for IoT-based smart environment security concerns drawn from the extensive literature examined during this study is proposed in this paper which also maps  ...  With this insight into the state-of-the-art research on security standards and assessment frameworks, this study helps advance the IoT field by opening new research directions as well as opportunities  ...  Without a good security standard or security assessment mechanism in place, the data and information moving in and around these environments can become susceptible or vulnerable to a variety of security  ... 
doi:10.1109/access.2021.3109886 fatcat:3v5tomecwfcrbfzhl36vbqwxey

5G core network security issues and attack classification from network protocol perspective

Hwankuk Kim
2020 Journal of Internet Services and Information Security  
However, security researchers find it difficult to conduct studies on 5G security technology design and application methods owing to the relatively unknown nature of the mobile carrier network.  ...  The result of this study is expected to be used as basic data for modeling 5G security threats.  ...  Acknowledgments This research was funded by a 2020 Research Grant from Sangmyung University. References  ... 
doi:10.22667/jisis.2020.05.31.001 dblp:journals/jisis/Kim20 fatcat:etnuwxsgknfrtlyww4f7jba6za

Verification and Validation Techniques for Streaming Big Data Analytics in Internet ofThings Environment

Sudeep Tanwar, Aparna Kumari, Sudhanshu Tyagi, Neeraj Kumar
2018 IET Networks  
In this study, the authors analyse and provide an overview on how to handle secure streaming data generated from different devices.  ...  Moreover, they analyse the existing security approaches and highlight emerging challenges required to process the heterogeneous big data in a secure manner for IoT applications, such as denial of service  ...  A taxonomy for BD streaming-security based on IoT is presented in Section 3. Section 4 covers the case study on Healthcare 4.0.  ... 
doi:10.1049/iet-net.2018.518 fatcat:r4ss3v5m65gjljviwagzlvay3y

Management platform of threats information in IoT environment

Eunhye Ko, Taeeun Kim, Hwankuk Kim
2017 Journal of Ambient Intelligence and Humanized Computing  
, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (, which permits unrestricted use, distribution  ...  Security threats in IoT environment Compared to the wide-spread of services with IoT devices, the IoT environment is lacking management and technology for security.  ... 
doi:10.1007/s12652-017-0581-6 fatcat:zdpvjvu2h5by5ngrtv57zaezcm

Advanced algorithms and applications based on IoT for the smart devices

Jong Hyuk Park, Neil Yuwen Yen
2018 Journal of Ambient Intelligence and Humanized Computing  
Eunhye Ko et al. suggested a platform structure and application method for collecting, analyzing, and sharing vulnerability information about IoT devices to prevent cyber-attacks using the information  ...  The proposed technology in this paper provides public vulnerability information and patch information to respond quickly through checking vulnerability of devices.  ... 
doi:10.1007/s12652-018-0715-5 fatcat:soc4cadwo5abxlcxhz3s4t7cxi

A Conceptual Model for Internet of Things Risk Assessment in Healthcare Domain with Deep Learning Approach

Mohd Nizam Zakaria, Nur Azaliah Abu Bakar, Hafiza Abas, Noor Hafizah Hassan
2020 International Journal of Innovative Computing  
The Internet of Things (IoT) has become a prevalent technology in the IT industry. One of the industries that can benefit extensively in this technology is healthcare.  ...  Thus, it is essential to understand the full extent of the IoT risk and how to manage its risk in the healthcare area.  ...  ACKNOWLEDGMENT The research is financially supported by Universiti Teknologi Malaysia (UTM) Transdisciplinary Research (TDR) Grant Q.K130000.3556.06G26.  ... 
doi:10.11113/ijic.v10n2.263 fatcat:tbozrxg7ozetpos2cynxacwhum
« Previous Showing results 1 — 15 out of 11,555 results