scholarly journals Network Interaction Monitoring System with IoT Devices Connected

2021 ◽  
pp. 12-17
Author(s):  
Gleb Demyanov ◽  
◽  
Natalya Sadovnikova ◽  

The Internet of Things is a concept of a computer network of physical objects equipped with built-in technologies for interacting with each other or with the external environment, considering the organization of such networks as a phenomenon that can restructure economic and social processes, eliminating the need for human participation from part of actions and operations. IoT technology has had a significant impact on the development of information technology and other industries. According to Forbes, the Internet of Things market is expected to reach $520 billion in 2021, up from $235 billion in 2017, indicating a continued growth in demand for such devices in the future. Gartner Research also estimates that the number of devices connected to the Internet will reach 25 billion by 2021, up from 8.4 billion in 2017. Network with IoT devices connected is an indispensable prey for intruders. There are many ways to attack IoT devices. In this article, the authors have identified several methods of protection. Among them, network interaction monitoring through the analysis is highlighted. The paper also describes how to apply this method in practice.

2018 ◽  
pp. 19-22
Author(s):  
Aleksandra Vlasenko ◽  
Aleksey Musienko

The Internet of Things is a concept of a computer network of physical objects (“things”) equipped with built-in technologies for interaction with each other or with the external environment, considering the organization of such networks as a phenomenon capable of restructuring economic and social processes, excluding the need for human actions and operations. The Internet of things consists of loosely connected disparate networks, each of which is deployed to solve specific tasks. For example, in modern cars there are multiple networks for controling the operation of the engine and other systems, for supporting third communications, etc. The offices and residential buildings are also equipped with many networks for controlling heating, ventilation, air-conditioning, telephone, security, lighting. As the Internet of things evolves, these and many other networks will be connected to each other and gain a higher level of security. As a result, the Internet of things will gain even more opportunities to open up new, broader perspectives for humanity. This article is devoted to the popular concept the Internet of things. The author analyzes the opportunities, as well as vulnerabilities of this phenomenon. It has benn suggested that the use of Internet Protocol of version 6 will solve many problems of this concept including those related to security.


2019 ◽  
Vol 265 ◽  
pp. 07014
Author(s):  
Alexander Shiler ◽  
Elizaveta Stepanova

At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. In connection with the constant increase in the number of attacks on IoT-devices, the issue of standardization of this technology is quite acute. The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security.


2021 ◽  
Author(s):  
Wael Alnahari

Abstract The Internet of Things (IoT) is an emerging topic in the field of information technology (IT) that has attracted the interest of researchers from different parts of the world. Authentication of IoT includes the establishment of a model for controlling access to IoT devices through the internet and other unsecured network platforms. Strong authentication of IoT is necessary for ensuring that machines and devices could be trusted when it comes to data sharing. The whole idea of authentication further prevents cybercriminals from using loopholes in IoT devices to access data that they are not allowed to access. Various authentication techniques could be used to secure IoT servers and devices. Establishing mutual authentication between IoT servers and IoT devices has attracted a lot of research interests because it helps enhance the effectiveness and overall security of data sharing. Therefore, this research provides the basis for analyzing the whole idea of using security keys to encrypt both IoT servers and IoT devices.


Author(s):  
Zhiping Wang ◽  
Xinxin Zheng ◽  
Zhichen Yang

The Internet of Things (IoT) technology is an information technology developed in recent years with the development of electronic sensors, intelligence, network transmission and control technologies. This is the third revolution in the development of information technology. This article aims to study the algorithm of the Internet of Things technology, through the investigation of the hazards of athletes’ sports training, scientifically and rationally use the Internet of Things technology to collect data on safety accidents in athletes’ sports training, thereby reducing the risk of athletes’ sports training and making athletes better. In this article, the methods of literature research, analysis and condensing, questionnaire survey, theory and experiment combination, etc., investigate the safety accident data collection of the Internet of Things technology in athletes’ sports training, and provide certain theories and methods for future in-depth research practice basis. The experimental results in this article show that 82% of athletes who are surveyed under the Internet of Things technology will have partial injuries during training, reducing the risk of safety accidents in athletes’ sports training, and better enabling Chinese athletes to achieve a consistent level of competition and performance through a virtuous cycle of development.


2020 ◽  
Vol 24 (5) ◽  
pp. 82-90
Author(s):  
A. Mikryukov ◽  
V. M. Trembach ◽  
A. V. Danilov

Purpose of research. The aim of the research is to form modules of organizational and technical systems (OTS) using a cognitive approach to solve problems of adaptation of cyberphysical systems. Currently, there is a rapid development of elements of the Internet of things. New tasks related to self-organization and adaptation in a rapidly changing external environment are brought to the fore. These tasks occur when new elements appear in the telecommunications computer network, they fail, change the mode, new tasks occur, etc. To work out these tasks, the possibilities of approaches to support and decision-making such as situational, cognitive, and semiotic are considered. The authors consider the cognitive approach in more detail. Within the framework of the cognitive paradigm, the article describes the use of the cognitive approach for solving problems of adaptation of cyberphysical systems. To solve this problem on the basis of an agent-based approach, the structure of a cyberphysical system with the possibility of adaptation is presented and the functions of its agents are described. The main stages of solving problems of adaptation of cyberphysical systems are presented. An adaptation algorithm using the planning mechanism is presented. The demo example shows a knowledge base for solving the problem of adapting cyberphysical systems using a cognitive planning mechanism.Materials and methods of research. New approaches and methods are required to address adaptation issues in planning. The cognitive approach is one of the developing directions in solving many problems of the Internet of things. One of these tasks is the ability to adapt OTS modules in a rapidly changing external environment based on the planning mechanism. To solve the planning problem, we use the algorithm described by Aristotle more than 2,350 years ago and implemented in the GPS program. This algorithm can be considered the first description of the cognitive mechanism that a person uses. The knowledge base uses an integrated approach to knowledge representation. When developing OTS modules, an agent-based approach was used to solve the problem of adaptation.Results. The existing and developing approaches and methods for decision support and decision-making are considered for decisionmaking in newly emerging situations in OTS modules. The main provisions of such significant approaches as situational, cognitive and semiotic are presented. A cognitive approach to the adaptation of intelligent systems is proposed. The solution of the problem of adaptation of cyberphysical systems is considered within the framework of the cognitive paradigm. The structure of a cyberphysical system capable of solving adaptation problems is shown. The functions of OTS modules based on agent-oriented technology are described. A description of the adaptation algorithm using the cognitive planning mechanism is given. The main stages of solving problems of adaptation of cyberphysical systems are presented. A demo example of solving the problem of adaptation by a cyberphysical system-a cooking robot – is shown.Conclusion. Using the modular architecture of an intelligent system allows you to solve many problems. One of these tasks is to configure elements of the Internet of things when they deviate from their main function. The planning mechanisms proposed for parametric adaptation can be repeatedly applied in OTS modules as separate agents. This approach is relevant for elements of the Internet of things. In the case of expanding the functionality of the OTS modules of Internet of things, it is advisable to apply machine learning with fixing the results in the knowledge base of planning agents.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


Sign in / Sign up

Export Citation Format

Share Document