scholarly journals Smart Digital Forensic Readiness Model for Shadow IoT Devices

2022 ◽  
Vol 12 (2) ◽  
pp. 730
Author(s):  
Funmilola Ikeolu Fagbola ◽  
Hein Venter

Internet of Things (IoT) is the network of physical objects for communication and data sharing. However, these devices can become shadow IoT devices when they connect to an existing network without the knowledge of the organization’s Information Technology team. More often than not, when shadow devices connect to a network, their inherent vulnerabilities are easily exploited by an adversary and all traces are removed after the attack or criminal activity. Hence, shadow connections pose a challenge for both security and forensic investigations. In this respect, a forensic readiness model for shadow device-inclusive networks is sorely needed for the purposes of forensic evidence gathering and preparedness, should a security or privacy breach occur. However, the hidden nature of shadow IoT devices does not facilitate the effective adoption of the most conventional digital and IoT forensic methods for capturing and preserving potential forensic evidence that might emanate from shadow devices in a network. Therefore, this paper aims to develop a conceptual model for smart digital forensic readiness of organizations with shadow IoT devices. This model will serve as a prototype for IoT device identification, IoT device monitoring, as well as digital potential evidence capturing and preservation for forensic readiness.

2019 ◽  
Vol 8 (2S11) ◽  
pp. 2901-2903

Indian agriculture need to be revamped due to its low productivity. Indian farmers mostly involved in age-old manual agricultural practices and irrigation systems. farming is highly unorganized and fragmented and the productivity is low, Government subsidies and other support are not sufficient to fulfill the gap. Corporates with their strong financial background can formulate a model with the government support to use smart agricultural devices and its integration with information technology. This paper presents the conceptual model to support the farmers in their agricultural practices to provide better livelihood


2019 ◽  
Vol 265 ◽  
pp. 07014
Author(s):  
Alexander Shiler ◽  
Elizaveta Stepanova

At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. In connection with the constant increase in the number of attacks on IoT-devices, the issue of standardization of this technology is quite acute. The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security.


Author(s):  
Anang Hudaya Muhamad Amin ◽  
Fred N. Kiwanuka ◽  
Nabih T. J. Abdelmajid ◽  
Saif Hamad AlKaabi ◽  
Sultan Khalid Abdulqader Rashed Ahli

Internet of things (IoT) is in the forefront of many existing smart applications, including autonomous systems and green technology. IoT devices have been commonly used in the monitoring of energy efficiency and process automation. As the application spreads across different kinds of applications and technology, a large number of IoT devices need to be managed and configured, as they are capable of generating massive amount of sensory data. Looking from this perspective, there is a need for a proper mechanism to identify each IoT devices within the system and their respective applications. Participation of these IoT devices in complex systems requires a tamper-proof identity to be generated and stored for the purpose of device identification and verification. This chapter presents a comprehensive approach on identity management of IoT devices using a composite identity of things (CIDoT) with permissioned blockchain implementation. The proposed approach described in this chapter takes into account both physical and logical domains in generating the composite identity.


2020 ◽  
Vol 35 ◽  
pp. 301071
Author(s):  
Yee Ching Tok ◽  
Chundong Wang ◽  
Sudipta Chattopadhyay

2021 ◽  
Author(s):  
Siddhartha Bhattacharyya ◽  
Parth Ganeriwala ◽  
Shreya Nandanwar ◽  
Raja Muthalagu ◽  
anubhav gupta

Internet of Things (IoT) are the most commonly used devices today, that provide services that have become widely prevalent. With their success and growing need, the number of threats and attacks against IoT devices and services have been increasing exponentially. With the increase in knowledge of IoT related threats and adequate monitoring technologies, the potential to detect these threats is becoming a reality. There have been various studies consisting of fingerprinting based approaches on device identification but none have taken into account the full protocol spectrum. IPAssess is a novel fingerprinting based model which takes a feature set based on the correlation between the device characteristics and the protocols and then applies various machine learning models to perform device identification and classification. We have also used aggregation and augmentation to enhance the algorithm. In our experimental study, IPAssess performs IoT device identification with a 99.6\% classification accuracy.


2021 ◽  
Author(s):  
Siddhartha Bhattacharyya ◽  
Parth Ganeriwala ◽  
Shreya Nandanwar ◽  
Raja Muthalagu ◽  
anubhav gupta

Internet of Things (IoT) are the most commonly used devices today, that provide services that have become widely prevalent. With their success and growing need, the number of threats and attacks against IoT devices and services have been increasing exponentially. With the increase in knowledge of IoT related threats and adequate monitoring technologies, the potential to detect these threats is becoming a reality. There have been various studies consisting of fingerprinting based approaches on device identification but none have taken into account the full protocol spectrum. IPAssess is a novel fingerprinting based model which takes a feature set based on the correlation between the device characteristics and the protocols and then applies various machine learning models to perform device identification and classification. We have also used aggregation and augmentation to enhance the algorithm. In our experimental study, IPAssess performs IoT device identification with a 99.6\% classification accuracy.


Author(s):  
C. Y. Huang ◽  
C. H. Wu

The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people’s daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the “Tasking Capability Description”, allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control IoT devices that use different communication protocols, which could consequently achieve the interoperable Internet of Things infrastructure.


2021 ◽  
pp. 12-17
Author(s):  
Gleb Demyanov ◽  
◽  
Natalya Sadovnikova ◽  

The Internet of Things is a concept of a computer network of physical objects equipped with built-in technologies for interacting with each other or with the external environment, considering the organization of such networks as a phenomenon that can restructure economic and social processes, eliminating the need for human participation from part of actions and operations. IoT technology has had a significant impact on the development of information technology and other industries. According to Forbes, the Internet of Things market is expected to reach $520 billion in 2021, up from $235 billion in 2017, indicating a continued growth in demand for such devices in the future. Gartner Research also estimates that the number of devices connected to the Internet will reach 25 billion by 2021, up from 8.4 billion in 2017. Network with IoT devices connected is an indispensable prey for intruders. There are many ways to attack IoT devices. In this article, the authors have identified several methods of protection. Among them, network interaction monitoring through the analysis is highlighted. The paper also describes how to apply this method in practice.


Author(s):  
C. Y. Huang ◽  
C. H. Wu

The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people’s daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the “Tasking Capability Description”, allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control IoT devices that use different communication protocols, which could consequently achieve the interoperable Internet of Things infrastructure.


2021 ◽  
Author(s):  
Wael Alnahari

Abstract The Internet of Things (IoT) is an emerging topic in the field of information technology (IT) that has attracted the interest of researchers from different parts of the world. Authentication of IoT includes the establishment of a model for controlling access to IoT devices through the internet and other unsecured network platforms. Strong authentication of IoT is necessary for ensuring that machines and devices could be trusted when it comes to data sharing. The whole idea of authentication further prevents cybercriminals from using loopholes in IoT devices to access data that they are not allowed to access. Various authentication techniques could be used to secure IoT servers and devices. Establishing mutual authentication between IoT servers and IoT devices has attracted a lot of research interests because it helps enhance the effectiveness and overall security of data sharing. Therefore, this research provides the basis for analyzing the whole idea of using security keys to encrypt both IoT servers and IoT devices.


Sign in / Sign up

Export Citation Format

Share Document