An Introduction to Security in Internet of Things (IoT) and Big Data
Sushree Bibhuprada B. Priyadarshini
Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India
Search for more papers by this authorSuraj Kumar Dash
Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India
Search for more papers by this authorAmrit Sahani
Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India
Search for more papers by this authorBrojo Kishore Mishra
Department of Computer Science & Engineering, GIET University, Gunupur, India
Search for more papers by this authorMahendra Prasad Nath
Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India
Search for more papers by this authorSushree Bibhuprada B. Priyadarshini
Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India
Search for more papers by this authorSuraj Kumar Dash
Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India
Search for more papers by this authorAmrit Sahani
Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India
Search for more papers by this authorBrojo Kishore Mishra
Department of Computer Science & Engineering, GIET University, Gunupur, India
Search for more papers by this authorMahendra Prasad Nath
Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan (Deemed to be University), Bubaneswar, India
Search for more papers by this authorJyotir Moy Chatterjee
Search for more papers by this authorHarish Garg
Search for more papers by this authorR. N. Thakur
Search for more papers by this authorSummary
The basics of Internet of Things (IoT) is the attribute of Internet of Objects, expected as a flexible strategy for giving several facilities. Condensed clever units create a critical phase of IoT. They vary extensively in practice, volume, service facility, and calculation strength. However, the incorporation of these clever matters in the widespread internetworking proposed IoT of safety threat due to the act the most internetwork technologies along with verbal exchange manners that had not been now designed to guide IoT. Furthermore, the trade of IoT has produced public safety matter, such as nonpublic secrecy issues, risk of cyber threats, and trained crime. Have guidelines or suggestions on the analysis of IoT security and contribute to improvement. This control offers full information of the open penetration and retrieval as opposed to the IoT edge side layer, which are done in three phases: edge nodes, transmission, and edge computing. The method to reach this target, first, we quickly define those popular IoT recommendation models and outline protection in the IoT's framework. We also talk about the feasible purposes of IoT and the inspiration of the intruder and set new goals in this new model. With such rise in IoT and with the advent of ongoing digital applications, huge amount of data is produced each and every day, leading to the emergence of the term big data. In this chapter, we will be collaborating the detailed security study in case of IoT and big data.
References
- Bhunia , S. , Hsiao , M.S. , Banga , M. , Narasimhan , S. , Hardware trojan attacks: Threat analysis and countermeasures . Proc. IEEE , 102 , 8 , 1229 – 1247 , 2014 .
- Salmani , H. and Tehranipoor , M.M. , Vulnerability analysis of a circuit layout to hardware Trojan insertion . IEEE Trans. Inf. Forensics Secur. , 11 , 6 , 1214 – 1225 , 2016 .
- Wehbe , T. , Mooney , V.J. , Keezer , D.C. , Parham , N.B. , A novel approach to detect hardware Trojan attacks on primary data inputs , in: Proc. ACM Workshop Embedded Systems Security , p. 2 , 2015 .
- Bhasin , S. and Regazzoni , F. , A survey on hardware Trojan detection techniques , in: Proc. IEEE Int. Symp. Circuits and Systems , pp. 2021 – 2024 , 2015 .
- Shila , D.M. and Venugopal , V. , Design, implementation and security analysis of hardware Trojan threats in FPGA , in: Proc. IEEE Int. Conf. Communications , pp. 719 – 724 , 2014 .
-
Priyadarshini , S.B.B.
and
Panigrahi , S.
,
A distributed scalar controller selection scheme for redundant data elimination in sensor networks
.
International Journal of Knowledge Discovery in Bioinformatics (IJKDB)
,
7
,
1
,
91
–
104
,
2017
.
10.4018/IJKDB.2017010107 Google Scholar
- Priyadarshini , S.B.B. , Panigrahi , S. , Bagjadab , A.B. , A distributed triangular scalar cluster premier selection scheme for enhanced event coverage and redundant data minimization in wireless multimedia sensor networks . Indian J. Sci. Res. , 14 , 2 , 96 – 102 , 2017 .
-
Priyadarshini , S.B.B.
,
Panigrahi , S.
,
Bagjadab , A.B.
,
A distributed approach based on maximal far-flung scalar premier selection for camera actuation
.
12th International Conference on Distributed Computing and Internet Technology (ICDCIT 2016)
,
KIIT University
,
Bhubaneswar, Odisha
, Published in the series of
Lecture Notes in Computer Science (LNCS)
, Springer, 15th–18th January
2016
.
10.1007/978-3-319-28034-9_10 Google Scholar
-
Tehranipoor , M.
and
Koushanfar , F.
,
A survey of hardware Trojan taxonomy and detection
.
IEEE Des. Test Comput.
,
27
,
1
,
10
–
25
,
2010
.
10.1109/MDT.2010.7 Google Scholar
- NSA TEMPEST Series , 2016 . [Online]. Available: http://cryptome.org/#NSA–TS .
-
Tanaka , H.
,
Information leakage via electromagnetic emanations and evaluation of TEMPEST countermeasures
, in:
Information Systems Security
, pp.
167
–
179
,
Springer
,
Berlin, Heidelberg
,
2007
.
10.1007/978-3-540-77086-2_13 Google Scholar
- Vuagnoux , M. and Pasini , S. , Compromising electromagnetic emanations of wired and wireless keyboards , in: Proc. USENIX Security Symposium , pp. 1 – 16 , 2009 .
- Nia , A.M. , Sur-Kolay , S. , Raghunathan , A. , Jha , N.K. , Physiological information leakage: A new frontier in health information security, accepted for publication in IEEE Trans . Emerg. Topics Comput ., 2010 .
- Brandt , A. and Buron , J. , Home automation routing requirements in low-power and lossy networks , 2010 . [Online]. Available: https://tools.ietf.org/html/rfc5826 .
- Ganz , F. , Puschmann , D. , Barnaghi , P. , Carrez , F. , A practical evaluation of information processing and abstraction techniques for the internet of things . IEEE Internet Things J. , 2 , 4 , 340 – 354 , 2015 .
- Anjomshoa , F. , Aloqaily , M. , Kantarci , B. , Erol-Kantarci , M. , Schuckers , S. , Social behaviometrics for personalized devices in the internet of things era . IEEE Access , 5 , 12199 – 12213 , 2017 .
- Priyadarshini , S.B.B. , Panigrahi , S. , Bagjadab , A.B. , Mishra , B.K. , An investigative prolegomenon on various clustering strategies, their resolution and future direction towards wireless sensor systems . International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS) , vol. 2 , Kolkata , February 23-25, 2018 .
-
Priyadarshini , S.B.B.
and
Panigrahi , S.
,
A distributed scheme based on minimum camera actuation employing concentric hexagonal scalar premier selection for data redundancy minimization
.
15th International Conference on Information Technology
,
IEEE
,
Bhubaneswar
, December 22-24,
2016
, e-ISBN: 978-1-5090-3584-7.
10.1109/ICIT.2016.029 Google Scholar
-
Priyadarshini , S.B.B.
,
Singh , D.
,
Panda , M.
,
A comparative study of redundant data minimization and event coverage in wireless multimedia sensor networks (WMSNs)
.
International Conference on Applied Machine Learning (ICAML)
,
IEEE
,
Bhubaneswar
, September 27-28,
2019
.
10.1109/ICAML48257.2019.00053 Google Scholar
-
Dey , N.
,
Ashour , A.S.
,
Bhatt , C.
,
Internet of things driven connected healthcare
, in:
Internet of Things and Big Data Technologies for Next Generation Healthcare
, pp.
3
–
12
,
Springer
,
Cham
,
2017
.
10.1007/978-3-319-49736-5_1 Google Scholar
- Frustaci , M. , Pace , P. , Aloi , G. , Fortino , G. , Evaluating critical security issues of the IoT world: Present and future challenges . IEEE Internet Things J. , 5 , 4 , 2483 – 2495 , Aug. 2018 .
-
Priyadarshini , S.B.B.
,
A hybrid approach based on scalar cluster leader selection for camera activation (HASL-CA) in wireless multimedia sensor networks (WMSNs)
.
International Conference on Applied Machine Learning (ICAML)
,
IEEE
,
Bhubaneswar
, September 27-28,
2019
.
10.1109/ICAML48257.2019.00063 Google Scholar
- Priyadarshini , S.B.B. and Panigrahi , S. , A quadrigeminal scheme based on event reporting scalar premier selection for camera actuation in wireless multimedia sensor networks . J. King Saud Univ. Eng. Sci. , Elsevier, 31 , 1 , 52 – 60 , 2017 .
-
Priyadarshini , S.B.B.
and
Panigrahi , S.
,
Redundant data minimization using minimal mean distant scalar leader selection for event driven camera actuation
.
International Conference on Information Technology (ICIT)
,
IEEE
, pp.
142
–
147
,
2016
.
10.1109/ICIT.2016.040 Google Scholar
- Fernández-Caramés , T.M. and Fraga-Lamas , P. , A review on the use of blockchain for the internet of things . IEEE Access , 6 , 32979 – 33001 , 2018 .
- Nath , M.P. , Goyal , K. , Prasad , J. , Kallur , B. , Chat bot—An edge to customer insight . Int. J. Res. Sci. Innov. , V , V , 29 – 32 , 2018 .
-
Suthaharan , S.
,
Big data classification: Problems and challenges in network intrusion prediction with machine learning
.
ACM SIGMETRICS Performance Evaluation Review
, vol.
41
, pp.
70
–
73
,
2014
.
10.1145/2627534.2627557 Google Scholar
- Nath , M.P. , Sagnika , S. , Das , M. , Pandey , M. , Object recognition using cat swarm optimization . Int. J. Res. Sci. Innov. , IV , VIIS , 47 – 52 , July 2017 .
- Nath , M.P. and Sagnika , S. , Capabilities of chatbots and its performance enhancements in machine learning , in: Machine Learning and Information Processing, Advances in Intelligent Systems and Computing , 1101 , pp. 183 – 192 , 2020 .
-
Elhayatmy , G.
,
Dey , N.
,
Ashour , A.S.
,
Internet of things based wireless body area network in healthcare
, in:
Internet of Things and Big Data Analytics Toward Next-Generation Intelligence
, pp.
3
–
20
,
Springer
,
Cham
,
2018
.
10.1007/978-3-319-60435-0_1 Google Scholar
- C. Bhatt , N. Dey , A.S. Ashour (Eds.), Internet of Things and Big Data Technologies for Next Generation Healthcare , 2017 .
- Meidan , Y. et al ., ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis . SAC2017 32nd ACM Symp. Appl. Comput ., pp. 506 – 509 , 2017 .
- Nath , M. , Muralikrishnan , J. , Sundarrajan , K. , Varadarajanna , M. , Continuous integration, delivery, and deployment: A revolutionary approach in software development . Int. J. Res. Sci. Innov. , 5 , VII , 185 – 190 , 2018 .
-
Mhetre , N.A.
,
Deshpande , A.V.
,
Mahalle , P.N.
,
Trust management model based on fuzzy approach for ubiquitous computing
.
Int. J. Ambient Comput. Intell.
,
7
,
2
,
33
–
46
,
2016
.
10.4018/IJACI.2016070102 Google Scholar
- Nath , M.P. , Pandey , P. , Somu , K. , Amalraj , P. , Artificial intelligence & machine learning: The emerging milestones in software development . Int. J. Res. Sci. Innov. , 5 , IX , 36 – 44 , 2018 .
- Lin , J. , Yu , W. , Zhang , N. , Yang , X. , Zhang , H. , Zhao , W. , A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications . IEEE Internet Things J. , 4 , 5 , 1125 – 1142 , Oct. 2017 .
- Chen , L. , Thombre , S. , Järvinen , K. , Lohan , E.S. , Alén-Savikko , A. , Leppäkoski , H. , Bhuiyan , M.Z.H. , Bu-Pasha , S. , Ferrara , G.N. , Honkala , S. , Lindqvist , J. , Ruotsalainen , L. , Korpisaari , P. , Kuusniemi , H. , Robustness, security and privacy in location-based services for future IoT: A survey . IEEE Access , 5 , 8956 – 8977 , 2017 .
-
Sahani , A.
,
Priyadarshini , S.B.B.
,
Chinara , S.
,
The role of blockchain technology and its usage in various sectors in the modern age: Various roles of blockchain and usecases in different sectors
, in:
Blockchain and AI Technology in the Industrial Internet of Things
, pp.
221
–
245
,
IGI Global
,
2021
.
10.4018/978-1-7998-6694-7.ch014 Google Scholar
- Priyadarshini , S.B.B. , Bagjadab , A.B. , Mishra , B.K. , Digital signature and its pivotal role in affording security services , in: Handbook of E-Business Security , pp. 365 – 384 , 2018 .
- Priyadarshini , S.B.B. , Bagjadab , A.B. , Mishra , B.K. , Security in distributed operating system: A comprehensive study , in: Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies , pp. 221 – 230 , 2019 .
- Farris , I. , Taleb , T. , Khettab , Y. , Song , J. , A survey on emerging SDN and NFV security mechanisms for IoT systems . IEEE Commun. Surv. Tut. , 21 , 1 , 812 – 837 , 1st Quart., 2019 .
- Gharaibeh , A. , Salahuddin , M.A. , Hussini , S.J. , Khreishah , A. , Khalil , I. , Guizani , M. , Al-Fuqaha , A. , Smart cities: A survey on data management, security, and enabling technologies . IEEE Commun. Surv. Tut. , 19 , 4 , 2456 – 2501 , 4th Quart., 2017 .
- Din , I. U. , Guizani , M. , Kim , B.-S. , Hassan , S. , and Khan , M. K. , Trust management techniques for the internet of things: A survey . IEEE Acess , 7 , 29763 – 29787 , 2019 .
- Mosenia , A. and Jha , N.K. , A comprehensive study of security of internet-of-things . IEEE Trans. Emerg. Topics Comput. , 5 , 4 , 586 – 602 , Dec. 2017 .
- Nath , M.P. , Sridharan , R. , Bhargava , A. , Mohammed , T. , Cloud computing: An overview, benefits, issues & research challenges . Int. J. Res. Sci. Innov. , 6 , II , 25 – 35 , 2019 .
- Yang , Y. , Wu , L. , Yin , G. , Li , L. , Zhao , H. , A survey on security and privacy issues in internet-of-things . IEEE Internet Things J. , 4 , 5 , 1250 – 1258 , Oct. 2017 .
- Yu , W. , Liang , F. , He , X. , Hatcher , W.G. , Lu , C. , Lin , J. , Yang , X. , A survey on the edge computing for the internet of things . IEEE Access , 6 , 6900 – 6919 , 2018 .
- Xia , X. , Xiao , Y. , Liang , W. , ABSI: An adaptive binary splitting algorithm for malicious meter inspection in smart grid . IEEE Trans. Inf. Forensics Secur. , 14 , 2 , 445 – 458 , 2019 .
- Jose , A.C. and Malekian , R. , Improving smart home security: Integrating logical sensing into smart home . IEEE Sensors J. , 17 , 13 , 4269 – 4286 , Jul. 2017 .
- Zhang , Q. and Wang , X. , SQL injections through back-end of RFID system , in: Proc. Int. Symp. Comput. Netw. Multimedia Technol , pp. 1 – 4 , Jan. 2009 .
- Kolias , C. , Kambourakis , G. , Stavrou , A. , Voas , J. , DDoS in the IoT: Mirai and other botnets . Computer , 50 , 7 , 80 – 84 , 2017 .
- Li , C. and Chen , C. , A multi-stage control method application in the -ght against phishing attacks , in: Proc. 26th Comput. Secur. Acad. Commun. Across Country , 2011 .
- Eckhoff , D. and Wagner , I. , Privacy in the smart city-applications, technologies, challenges, and solutions . IEEE Commun. Surv. Tut. , 20 , 1 , 489 – 516 , 1st Quart., 2018 .
- Dlamini , N.N. and Johnston , K. , The use, benefits and challenges of using the Internet of Things (IoT) in retail businesses: A literature review , in: Proc. Int. Conf. Adv. Comput. Commun. Eng. (ICACCE) , pp. 430 – 436 , Nov. 2016 .
- Stanciu , A. , Balan , T.-C. , Gerigan , C. , Zam-r , S. , Securing the IoT gateway based on the hardware implementation of a multi pattern search algorithm , in: Proc. Int. Conf. Optim. Elect. Electron. Equip. (OPTIM) Int. Aegean Conf. Elect. Mach. Power Electron. (ACEMP) , pp. 1001 – 1006 , May 2017 .
- Swamy , S.N. , Jadhav , D. , Kulkarni , N. , Security threats in the application layer in IoT applications , in: Proc. Int. Conf. IoT Social, Mobile, Analytics Cloud (I-SMAC) , pp. 477 – 480 , Feb. 2017 .
- Cha , S.-C. , Chen , J.-F. , Su , C. , Yeh , K.-H. , A blockchain connected gateway for BLE-based devices in the internet of things . IEEE Access , 6 , 24639 – 24649 , 2018 .
- Abdul-Ghani , H.A. , Konstantas , D. , Mahyoub , M. , A comprehensive IoT attacks survey based on a building-blocked reference model . Int. J. Adv. Comput. Sci. Appl. , 9 , 3 , 355 – 373 , 2018 .
- Xiao , L. , Wan , X. , Lu , X. , Zhang , Y. , Wu , D. , IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? IEEE Signal Process. Mag. , 35 , 5 , 41 – 49 , Sep. 2018 .
- Wang , W. , Xu , P. , Yang , L.T. , Secure data collection, storage and access in cloud-assisted IoT . IEEE Cloud Comput. , 5 , 4 , 77 – 88 , Jul. 2018 .
- Bocek , T. , Rodrigues , B.B. , Strasser , T. , Stiller , B. , Blockchains everywhere-a use-case of blockchains in the pharma supply-chain , in: Proc. IFIP/IEEE Symp. Integr. Netw. Service Manage. (IM) , pp. 772 – 777 , May 2017 .
- Shae , Z. and Tsai , J.J.P. , On the design of a blockchain platform for clinical trial and precision medicine , in: Proc. IEEE 37th Int. Conf. Distrib. Comput. Syst. (ICDCS) , pp. 1972 – 1980 , Jun. 2017 .
- Blanco-Novoa , Ó. , Fernández-Caramés , T. , Fraga-Lamas , P. , Castedo , L. , An electricity price-aware open-source smart socket for the internet of energy . Sensors , 17 , 3 , 643 , 2017 .
- Huh , S. , Cho , S. , Kim , S. , Managing IoT devices using blockchain platform , in: Proc. 19th Int. Conf. Adv. Commun. Technol. (ICACT) , pp. 464 – 467 , Feb. 2017 .
- Samaniego , M. and Deters , R. , Internet of smart things-IoST: Using blockchain and clips to make things autonomous , in: Proc. IEEE Int. Conf. Cogn. Comput. (ICCC) , pp. 9 – 16 , Jun. 2017 .
- Muhammed , T. , Mehmood , R. , Albeshri , A. , Katib , I. , Ubehealth: A personalized ubiquitous cloud and edge-enabled networked healthcare system for smart cities . IEEE Access , 6 , 32258 – 32285 , 2018 .
- Barik , R.K. , Dubey , H. , Mankodiya , K. , SOA-FOG: Secure serviceoriented edge computing architecture for smart health big data analytics , in: Proc. IEEE Global Conf. Signal Inf. Process. (GlobalSIP) , pp. 477 – 481 , Nov. 2017 .
-
Wilson , D.
and
Ateniese , G.
,
From pretty good to great: Enhancing PGP using bitcoin and the blockchain
, in:
Proc. Int. Conf. Netw. Syst. Secur.
,
Springer
, pp.
368
–
375
,
2015
.
10.1007/978-3-319-25645-0_25 Google Scholar
- Lei , A. , Cruickshank , H. , Cao , Y. , Asuquo , P. , Ogah , C.P.A. , Sun , Z. , Blockchain-based dynamic key management for heterogeneous intelligent transportation systems . IEEE Internet Things J. , 4 , 6 , 1832 – 1843 , Dec. 2017 .
- Li , Y. and Wang , S. , An energy-aware edge server placement algorithm in mobile edge computing , in: Proc. IEEE Int. Conf. Edge Comput. (EDGE) , pp. 66 – 73 , Jul. 2018 .
- Singh , D. , Tripathi , G. , Alberti , A.M. , Jara , A. , Semantic edge computing and IoT architecture for military health services in battle-eld , in: Proc. 14th IEEE Annu. Consum. Commun. Netw. Conf. (CCNC) , pp. 185 – 190 , Jan. 2017 .
- Pan , C. , Xie , M. , Hu , J. , ENZYME: An energy-efficient transient computing paradigm for ultralow self-powered IoT edge devices . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. , 37 , 11 , 2440 – 2450 , Nov. 2018 .
- Oyekanlu , E. , Nelatury , C. , Fatade , A.O. , Alaba , O. , Abass , O. , Edge computing for industrial IoT and the smart grid: Channel capacity for M2M communication over the power line , in: Proc. IEEE 3rd Int. Conf. Electro - Technol. Nat. Develop. (NIGERCON) , pp. 1 – 11 , Nov. 2017 .
- Huang , Y. , Lu , Y. , Wang , F. , Fan , X. , Liu , J. , Leung , V.C. , An edge computing framework for real-time monitoring in smart grid , in: Proc. IEEE Int. Conf. Ind. Internet (ICII) , pp. 99 – 108 , Oct. 2018 .
- Markakis , E.K. , Karras , K. , Zotos , N. , Sideris , A. , Moysiadis , T. , Corsaro , A. , Alexiou , G. , Skianis , C. , Mastorakis , G. , Mavromoustakis , C.X. , Pallis , E. , EXEGESIS: Extreme edge resource harvesting for a virtualized fog environment . IEEE Commun. Mag. , 55 , 7 , 173 – 179 , Jul. 2017 .
- Basudan , S. , Lin , X. , Sankaranarayanan , K. , A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing . IEEE Internet Things J. , 4 , 3 , 772 – 782 , Jun. 2017 .
-
Dubey , H.
,
Monteiro , A.
,
Constant , N.
,
Abtahi , M.
,
Borthakur , D.
,
Mahler , L.
,
Sun , Y.
,
Yang , Q.
,
Akbar , U.
,
Mankodiya , K.
,
Fog computing in medical internet-of-things: Architecture, implementation, and applications
, in:
Handbook of Large-Scale Distributed Computing in Smart Healthcare
, pp.
281
–
321
,
Springer
,
2017
.
10.1007/978-3-319-58280-1_11 Google Scholar
- Gu , L. , Cost efficient resource management in fog computing supported medical cyber-physical system . IEEE Trans. Emerg. Topics Comput. , 5 , 1 , 108 – 119 , Dec. 2017 .
- He , S. , Cheng , B. , Wang , H. , Huang , Y. , Chen , J. , Proactive personalized services through fog-cloud computing in large-scale IoT-based healthcare application . China Commun. , 14 , 11 , 1 – 16 , 2017 .
- Ni , J. , Zhang , A. , Lin , X. , Shen , X.S. , Security, privacy, and fairness in fog-based vehicular crowdsensing . IEEE Commun. Mag. , 55 , 6 , 146 – 152 , Jun. 2017 .
- Kraemer , F.A. , Braten , A.E. , Tamkittikhun , N. , Palma , D. , Fog computing in healthcare-a review and discussion . IEEE Access , 5 , 9206 – 9222 , 2017 .
- Sood , S.K. and Mahajan , I. , A fog-based healthcare framework for chikun-gunya . IEEE Internet Things J. , 5 , 2 , 794 – 801 , Oct. 2018 .
- Gao , S. , Peng , Z. , Xiao , B. , Xiao , Q. , Song , Y. , SCoP: Smartphone energy saving by merging push services in fog computing , in: Proc. IEEE/ACM 25th Int. Symp. Qual. Service (IWQoS) , pp. 1 – 10 , Jun. 2017 .
- Kotenko , I. , Saenko , I. , Branitskiy , A. , Framework for mobile internet of things security monitoring based on big data processing and machine learning . IEEE Access , 6 , 72714 – 72723 , 2018 .
- Merchant , K. , Revay , S. , Stantchev , G. , Nousain , B. , Deep learning for RF device fingerprinting in cognitive communication networks . IEEE J. Sel. Top. Signal Process. , 12 , 1 , 160 – 167 , Feb. 2018 .
- Aman , M.N. , Taneja , S. , Sikdar , B. , Chua , K.C. , Alioto , M. , Token-based security for the internet of things with dynamic energyquality tradeoff . IEEE Internet Things J. , 6 , 2 , 2843 – 2859 , Apr. 2018 .
- Aman , M.N. and, K. C. Chua , and, “ Secure Data provenance Internet Things ,” Proc. ACM Int. Workshop IoT Privacy, Trust, Secur ., pp, 11 – 14 , 2017 .
- Aman , M.N. , Chua , K.C. , Sikdar , B. , Mutual authentication in IoT systems using physical unclonable functions . IEEE Internet Things J. , 4 , 5 , 1327 – 1340 , Oct. 2017 .
- Novo , O. , Blockchain meets IoT: An architecture for scalable access management in IoT . IEEE Internet Things J. , 5 , 2 , 1184 – 1195 , Apr. 2018 .
- Valtanen , K. , Backman , J. , Yrjol , S. , Blockchain-powered value creation in the 5G and smart grid use cases . IEEE Access , 7 , 25690 – 25707 , Feb. 2019 .
- Aman , M.N. and Sikdar , B. , ATT-Auth: A hybrid protocol for industrial IoT attestation with authentication . IEEE Internet Things J. , 5 , 6 , 5119 – 5131 , Dec. 2018 .
- Ozyilmaz , K.R. and Yurdakul , A. , Designing a blockchain-based IoT with ethereum, swarm, and lora: The software solution to create high availability with minimal security risks . IEEE Consum. Electron. Mag. , 8 , 2 , 28 – 34 , Mar. 2019 .
- Javaid , U. , Aman , M.N. , Sikdar , B. , BlockPro: Blockchain based data provenance and integrity for secure IoT environments , in: Proc. 1st Workshop Blockchain-Enabled Netw. Sensor Syst ., pp. 13 – 18 , 2018 .
- Yu , Y. , Li , Y. , Tian , J. , Liu , J. , Blockchain-based solutions to security and privacy issues in the internet of things . IEEE Wirel. Commun. , 25 , 6 , 12 – 18 , Dec. 2018 .
- Miller , D. , Blockchain and the Internet of Things in the industrial sector . IT Prof. , 20 , 3 , 15 – 18 , 2018 .
- He , D. , Chan , S. , Guizani , M. , Security in the Internet of Things supported by mobile edge computing . IEEE Commun. Mag. , 56 , 8 , 56 – 61 , Aug. 2018 .
- Alphand , O. , Amoretti , M. , Claeys , T. , Dall'Asta , S. , Duda , A. , Ferrari , G. , Rousseau , F. , Tourancheau , B. , Veltri , L. , Zanichelli , F. , IoTchain: A blockchain security architecture for the internet of things , in: Proc. IEEE Wireless Commun. Netw. Conf. (WCNC) , pp. 1 – 6 , Apr. 2018 .
- Muñoz , M.C. , Moh , M. , Moh , T.-S. , Improving smart grid security using Merkle trees , in: Proc. IEEE Conf. Commun. Netw. Secur ., pp. 522 – 523 , Oct. 2014 .
-
Sehgal , V.K.
,
Patrick , A.
,
Soni , A.
,
Rajput , L.
,
Smart human security framework using internet of things, cloud and fog computing
, in:
Intelligent Distributed Computing
, pp.
251
–
263
,
Springer
,
2015
.
10.1007/978-3-319-11227-5_22 Google Scholar