Traffic Control Patching and Security Solution in Iot

Authors

  • Afridi Shahid
  • Md Alam Hossain
  • Nazmul Hossain

DOI:

https://doi.org/10.54536/ajaset.v1i1.50

Keywords:

Security, Privacy, Cryptographic Hardware, IoT, System on Chip, Embedded Systems, RFID

Abstract

After connecting multiple devices to a network and possessing data analysis and excerpting, the IoT is awaited to contribute to the formation of new customer value. Critical infrastructure that gets into people’s lives and economic deeds will also become an area, in which way the IoT is used, so security measures for IoT systems are very important. On the other hand, a dramatic increase in the number of connected devices will create technical problems such as attacks with a broader scope of influence and attacks that last longer. So, a shortage of security operations administrators will also be a problem. The internet of things refers to a way of connecting objects to the Internet for the purpose of intelligent control and management. The objects are sensed through RFID (Radio-frequency identification) or sensors achieving the integration of human society and the information system.  RFID is the core technology to implement the internet of things. So the security issue of RFID is becoming more and more important, in the past decade, a large number of research papers dealing with security issues of RFID technology have appeared. This paper deals with the security of data of RFID as IoT devices and defence against malware attacks, and DDoS attacks in IoT systems.

Downloads

Download data is not yet available.

Author Biographies

Afridi Shahid

Department of Computer Science and Engineering,
Jashore University of Science and Technology (JUST),
Bangladesh

Md Alam Hossain

Department of Computer Science and Engineering,
Jashore University of Science and Technology (JUST),
Bangladesh

Nazmul Hossain

Department of Computer Science and Engineering,
Jashore University of Science and Technology (JUST),
Bangladesh

References

An ontology-based context model for wireless sensor network (WSN) management in the Internet of Things. Journal of Sensor and Actuator Networks, 2(4), pp.653-674. 40. Al-Turjman, F. and Malekloo, A., 2019.

An overview of Internet of Things (IoT) and data analytics in agriculture: Benefits and challenges. IEEE Internet of Things Journal, 5(5), pp.3758-3773.

Benaissa, S., Plets, D., Tanghe, E., Trogh, J., Martens, L., Vandaele, L., Verloock, L., Tuyttens, F.A.M., Sonck, B. and Joseph, W., 2017.

Brown, Eric (13 September 2016). "Who Needs the Internet of Things?". Linux.com. Retrieved 23 October 2016.

Dr. S. S. Manikandasaran, 2016,"Security Attacks and Cryptography Solutions for Data Stored in Public Cloud Storage" (IJCSITS),

E. Ronen and A. Shamir, "Extended Functionality Attacks on IoT Devices: The Case Of Smart Lights", Proc. IEEE S&P Europe 2016, Mar. 2016.

Floerkemeier, C., Roduner, C. and Lampe, M., 2007. RFID application development with the Accada middleware platform. IEEE Systems Journal, 1(2), pp.82-94. Liu, Y., Seet, B.C. and Al-Anbuky, A., 2013.

"Internet of Things: Science Fiction or Business Fact?" (PDF). Harvard Business Review. November 2014. Retrieved 23 October 2016.

Internet of animals: characterisation of LoRa sub-GHz off-body wireless channel in dairy barns. Electronics Letters, 53(18), pp.1281-1283. 43. García-Lesta, D., Cabello, D., Ferro, E., López, P. and Brea, V.M., 2017.

IOT for smart farm: A case study of the Lingzhi mushroom farm at Maejo University. In 2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE) (pp. 1-6). IEEE. 45. Viani, F., Bertolli, M., Salucci, M. and Polo, A., 2017.

J. Granjal, E. Monteiro and J. Silva, "Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues", IEEE Commun. Surveys & Tutorials, vol. 17, pp. 1294-1312, July 2015.

Low-cost wireless monitoring and decision support for water saving in agriculture. IEEE Sensors Journal, 17(13), pp.4299-4309.

M. Miettinen et al., IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT, CoRR, 2016.

P.-Y. Chen et al., "Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack", IEEE Commun. Mag., vol. 54, no. 6, pp. 75-81, June 2016.

P.-Y. Chen, S.-M. Cheng and K.-C. Chen, "Optimal Control of Epidemic Information Dissemination over Networks", IEEE Trans. Cybernetics, vol. 44, no. 12, pp. 2316-28, Dec. 2014.

P. Wang et al., "Understanding the Spreading Patterns of Mobile Phone Viruses", Science, vol. 324, no. 5930, pp. 1071-75, May 2009.

P.-Y. Chen et al., "Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack", IEEE Commun. Mag., vol. 54, no. 6, pp. 75-81, June 2016.

P.-Y. Chen et al., "Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack", IEEE Commun. Mag., vol. 54, no. 6, pp. 75-81, June 2016.

R Khan,2012,Future Internet: The Internet of Things Architecture,Possible Applications and Key Challenges,

S. Babar,2011,Proposed Embedded Security Framework for Internet of Things (IoT), 978-1- 4577-0787-2/11/$26.00 2011 IEEE

S. Tanachaiwiwat and A. Helmy, "Encounter-Based Worms: Analysis and Defense", Ad Hoc Net., vol. 7, no. 7, pp. 1414-30, Sept. 2009.

Smart parking in IoT-enabled cities: A survey. Sustainable Cities and Society, p.101608. 41. Elijah, O., Rahman, T.A., Orikumhi, I., Leow, C.Y. and Hindia, M.N., 2018.

Springer International Publishing AG 2017G. Wang et al. (Eds.): SpaCCS 2017 Workshops, LNCS 10658, pp. 607–616, 2017.

Wireless sensor network with perpetual motes for terrestrial snail activity monitoring. IEEE Sensors Journal, 17(15), pp.5008-5015. 44. Chieochan, O., Saokaew, A. and Boonchieng, E., 2017, July.

Downloads

Published

2017-05-28

How to Cite

Shahid, A., Hossain, M. A., & Hossain, N. (2017). Traffic Control Patching and Security Solution in Iot. American Journal of Agricultural Science, Engineering, and Technology, 1(1), 30–38. https://doi.org/10.54536/ajaset.v1i1.50