This document summarizes security and privacy issues in the Internet of Things (IoT) environment. It discusses how IoT systems have layers - the perception layer containing sensors, the gateway layer for communication, and the cloud layer providing user services. Each layer faces different security threats like denial of service attacks, session hijacking, and data breaches. The document also provides an example of the Mirai malware infecting IoT devices and using them to launch large-scale cyberattacks. To improve IoT security, the document recommends implementing authentication, authorization, encryption for confidentiality and integrity checks using hashing to protect against various attacks on IoT systems.
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
Internet of Things forecast, economics, applications, technology, research challenges, sensor networks security, attack models, countermeasures, network security visualization
In the forthcoming Internet of Things everything (smart phones, dishwashers, refrigerators, game machines, TVs, cameras, home security systems, vehicles, lighting systems, traffic control systems, engines, bridges, SCADA systems, blood pressure and heart rate monitors, environment monitors etc.) will carry sensors and/or actuators that will be interconnected via sensor networks and the Internet. The sensors sense the environment, transmit the information to controllers who decide about actions to be taken and send their decisions to the actuators.
As the number and variety of connected devices and transmitted data increase, so the number and variety of potential threats increase. So, new security challenges appear.
This seminar presents an introduction to the Internet of Things, smart applications, and research challenges. It also presents an introduction to wireless sensor networks and their security risks.
Seminar given at the Internet Interdisciplinary Institute (IN3) of the Open University of Catalonia (UOC) on 16 December 2014.
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
https://www.cablelabs.com/informed/
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
Internet of Things forecast, economics, applications, technology, research challenges, sensor networks security, attack models, countermeasures, network security visualization
In the forthcoming Internet of Things everything (smart phones, dishwashers, refrigerators, game machines, TVs, cameras, home security systems, vehicles, lighting systems, traffic control systems, engines, bridges, SCADA systems, blood pressure and heart rate monitors, environment monitors etc.) will carry sensors and/or actuators that will be interconnected via sensor networks and the Internet. The sensors sense the environment, transmit the information to controllers who decide about actions to be taken and send their decisions to the actuators.
As the number and variety of connected devices and transmitted data increase, so the number and variety of potential threats increase. So, new security challenges appear.
This seminar presents an introduction to the Internet of Things, smart applications, and research challenges. It also presents an introduction to wireless sensor networks and their security risks.
Seminar given at the Internet Interdisciplinary Institute (IN3) of the Open University of Catalonia (UOC) on 16 December 2014.
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
https://www.cablelabs.com/informed/
Internet of Things (IoT) is an emerging platform for human interaction. As such it needs enough security and privacy guarantees to make it an attractive platform for people to come onboard.
In this presentation, Sujani introduces IoT and latest trends in that domain. Sujani is interested in security of IoT devices where she wants to tackle both access of IoT devices and the data generated by these devices.
In the past decade, internet of things (IoT) has been a
focus of research. Security and privacy are the key issues for IoT
applications, and still face some enormous challenges. In order to
facilitate this emerging domain, we in brief review the research
progress of IoT, and pay attention to the security. By means of
deeply analyzing the security architecture and features, the
security requirements are given. On the basis of these, we discuss
the research status of key technologies including encryption
mechanism, communication security, protecting sensor data and
cryptographic algorithms, and briefly outline the challenges.
The session with highlight Intel’s vision for IoT Security and the fundamental building blocks and capabilities Intel and the ecosystem are providing to organizations to build security in from design through deployment and maintenance.
Helpful survey for researchers and students who are intended to investigate in the Internet of things field in term of security and privacy side. This survey has general overview in security issues with the solutions addressed these issues.
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
We are in the age of Cybercrimes and just getting started with Internet of Things. There will be a huge demand for IoT as 50 billion connected devices will be deployed across the globe by 2020. These devices will communicate with each other where the web and the physical world will meet with different set of internet infrastructure and protocols. This in turn, will not only help us in saving money, but also provide us with more options.
Discussion Topics:
• The importance of IoT
• How will they impact in our everyday lives?
• Is Internet of Things Secure?
• Securing Internet of Things
But, the Tech buzz is all about: Security of Things (Security in the Internet of Things). How far these Internet of Things can be trusted? Can these IoT devices be hacked? How they have become the Next Cyber Security Target for hackers? How can we secure Internet of Things?
For more details, please visit www.clictest.com or drop us an email to info@clictest.com
Internet of Things ( IoT) is a happening phenomenon today. It is sweeping across all spheres of human life- business, agriculture, education and more. It provides a a fertile ground for research and innovation. This presentation covers major areas of research both current and future expected trends
Tips on designing for the Internet of ThingsDesign World
Bimba, TI, and Opto22 are heavily involved in developing products with and for the Internet of Things. In this webinar you will hear stories from the trenches on how they have approached the IoT and what they have learned in the process.
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
The lOT (Internet of Things) is a network of Internet-enabled objects, together with web services that interact with these objects. IoT enables the connected devices to communicate and interact with each other, transferring zillions of data each moment. This presentation speaks about the various protocols that keep IoT a trending topic. It gives a short glimpse about the heights that will be scaled by IoT in the near future and the ways in which it can transform the human lives. The presentation also enlists the various security threats faced by IoT and comes up with a reliable secure model for IoT.
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
IoT (Internet of Things) expands the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level.IoT today has a wide scope and researches say that IoT will definitely be a huge reason in the change of human lifestyle. But irrespective of the scope of IoT, we cannot be sure enough to implement it due to the security concerns. There is a genuine need to secure IoT, which has therefore resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper discusses about the flaws in the security structure of IoT, it is a study about the various layers of IoT and how differentattacks are possible in those layers.
Internet of Things (IoT) is an emerging platform for human interaction. As such it needs enough security and privacy guarantees to make it an attractive platform for people to come onboard.
In this presentation, Sujani introduces IoT and latest trends in that domain. Sujani is interested in security of IoT devices where she wants to tackle both access of IoT devices and the data generated by these devices.
In the past decade, internet of things (IoT) has been a
focus of research. Security and privacy are the key issues for IoT
applications, and still face some enormous challenges. In order to
facilitate this emerging domain, we in brief review the research
progress of IoT, and pay attention to the security. By means of
deeply analyzing the security architecture and features, the
security requirements are given. On the basis of these, we discuss
the research status of key technologies including encryption
mechanism, communication security, protecting sensor data and
cryptographic algorithms, and briefly outline the challenges.
The session with highlight Intel’s vision for IoT Security and the fundamental building blocks and capabilities Intel and the ecosystem are providing to organizations to build security in from design through deployment and maintenance.
Helpful survey for researchers and students who are intended to investigate in the Internet of things field in term of security and privacy side. This survey has general overview in security issues with the solutions addressed these issues.
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
We are in the age of Cybercrimes and just getting started with Internet of Things. There will be a huge demand for IoT as 50 billion connected devices will be deployed across the globe by 2020. These devices will communicate with each other where the web and the physical world will meet with different set of internet infrastructure and protocols. This in turn, will not only help us in saving money, but also provide us with more options.
Discussion Topics:
• The importance of IoT
• How will they impact in our everyday lives?
• Is Internet of Things Secure?
• Securing Internet of Things
But, the Tech buzz is all about: Security of Things (Security in the Internet of Things). How far these Internet of Things can be trusted? Can these IoT devices be hacked? How they have become the Next Cyber Security Target for hackers? How can we secure Internet of Things?
For more details, please visit www.clictest.com or drop us an email to info@clictest.com
Internet of Things ( IoT) is a happening phenomenon today. It is sweeping across all spheres of human life- business, agriculture, education and more. It provides a a fertile ground for research and innovation. This presentation covers major areas of research both current and future expected trends
Tips on designing for the Internet of ThingsDesign World
Bimba, TI, and Opto22 are heavily involved in developing products with and for the Internet of Things. In this webinar you will hear stories from the trenches on how they have approached the IoT and what they have learned in the process.
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
The lOT (Internet of Things) is a network of Internet-enabled objects, together with web services that interact with these objects. IoT enables the connected devices to communicate and interact with each other, transferring zillions of data each moment. This presentation speaks about the various protocols that keep IoT a trending topic. It gives a short glimpse about the heights that will be scaled by IoT in the near future and the ways in which it can transform the human lives. The presentation also enlists the various security threats faced by IoT and comes up with a reliable secure model for IoT.
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
IoT (Internet of Things) expands the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level.IoT today has a wide scope and researches say that IoT will definitely be a huge reason in the change of human lifestyle. But irrespective of the scope of IoT, we cannot be sure enough to implement it due to the security concerns. There is a genuine need to secure IoT, which has therefore resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper discusses about the flaws in the security structure of IoT, it is a study about the various layers of IoT and how differentattacks are possible in those layers.
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
Comprehensive Survey on Security Problems and Key Technologies of the Interne...RSIS International
Internet of things (IoT) is a collection of many
interconnected objects, services, humans, and devices that can
communicate, share data, and information to achieve a common
goal in different areas and applications. The vision of IoT is to
enable devices to collaborate with each other on the Internet. IoT
security focuses on authentication and access control protocols.
IoT security is the area with protection connected devices and
networks. There are many key challenges in designing a secure
IoT: Privacy, Authentication, Access Control, Trust,
Confidentiality, Mobile Security, etc. Attacks on IoT security
devices are physical attacks, side channel attacks, cryptanalysis
attacks, software attacks, network attacks. This paper describes
Security Problems of IoT, Security issues and Key Technologies
of IoT.
Comprehensive survey on security problems and key technologies of the interne...RSIS International
Internet of things (IoT) is a collection of many
interconnected objects, services, humans, and devices that can
communicate, share data, and information to achieve a common
goal in different areas and applications. The vision of IoT is to
enable devices to collaborate with each other on the Internet. IoT
security focuses on authentication and access control protocols.
IoT security is the area with protection connected devices and
networks. There are many key challenges in designing a secure
IoT: Privacy, Authentication, Access Control, Trust,
Confidentiality, Mobile Security, etc. Attacks on IoT security
devices are physical attacks, side channel attacks, cryptanalysis
attacks, software attacks, network attacks. This paper describes
Security Problems of IoT, Security issues and Key Technologies
of IoT.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
INTERNET OF THINGS: A STUDY ON SECURITY AND PRIVACY THREATS
Md Husamuddin
Dept. of computer science
College of CS and IT, Al-Baha University
Al-Baha, Kingdom of Saudi Arabia
Dr. [email protected]
ABSTRACT
The current world is driven by new, developing technologies. This has resulted in a variety of smart devices in the society that has impacted positively on the lives of people in the community. However, the organization has been experiencing threats and cyberattacks that mostly targets the private information. Therefore, in this paper, my discussion is centered on the different applications of the internet of things as well as security threats that are involved.
Keywords: security, privacy.
INTRODUCTION
The Internet of things is the most significant of the future of the internet. IoT has a global network through which ant object can connect with the other devices that are also linked on the internet. These devices include computers, tabs, cell phones, among many others. Generally, the internet of things is a system made up of connected things. This machine contains a microchip that connects all the methods related to it. Microchips serve the function of tracking the surrounding of the network and to give the report in case of any findings pertaining to the internet. The meaning of PC wrongdoing and cloud wrongdoing will be come to out to the IoT wrongdoing, which talks to any malignant development that incorporates the IoT worldview as within the IoT contraptions, organizations, or correspondence channels can be a subject, thing, or gadget recognized with the infringement. To investigate these sorts of cases, it is required to execute computerized crime scene examination technique within the IoT to choose the substances around an event. The meaning of a capable and adjust IoT progressed lawful sciences method is still at its unimaginable intrigued (Husamuddin, 2015). The most significant part of IoT is that it makes it possible for different entities to be communicated and to be accessed via the internet. This is very economical as a result, attracts many devices to be connected to the internet (Balte &Patil,2015). Research shows that more than 40 billion devices in 2019 got connected, and a higher risk of this is expected in the current year.
SECURITY REQUIREMENTS
The rate at which technologies are emerging is so high, and this has lead to threats as well as a privacy issue. The smart devices arising from this technology will interact with other devices and transmit information in the network (Balte, &Patil,2015). If a computer gets infected, the effects ripples to other devices in the system; thus, the whole internet infrastructure would be at risk. As soon as an attack spot has been identified, it is feasible to enumerate the safety vulnerabilities and risk prone regions requiring defense-in-intensity protection. Such safety refers to a typically used approach to protect important data on company networks wherein security controls ...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Dr. Amarjeet Singh
In the present paper, we have employed modified Khare-BEB method [Atoms, (2019)] to evaluate total ionization cross sections by the electron impact for ammonia in energy range from the ionization threshold to 10 MeV. The theoretical ionization cross sections have been compared to the available previous theoretical and experimental results. The collision parameters dipole matrix squared M_j^2 and CRP also have been calculated. The present calculations were found in remarkable agreement with the available experimental results.
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladDr. Amarjeet Singh
Adequately trained Manpower is a problem that affects the IT industry as a whole, but it is particularly acute for Enjay IT Solution. Enjay's location in a semi-urban or rural area makes it even more difficult to find a talented employee with the right skills. As the competition for skilled workers grows, it becomes more difficult to attract and keep those workers who have the requisite training and experience.
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Dr. Amarjeet Singh
Pink bollworm and Lepidoptera development quickly in numbers which is a typical animal group that produces around 100 youthful ones inside certain days or weeks. This assault influences the harvests broadly in the tropical and sub-tropical temperature areas. Thus, to keep up with the yield of harvests the vermin ought to be kept away by utilizing pesticides. The unnecessary measure of the purpose of pesticides influences the dirt, land, and as well as human well-being, and contaminates the climate. Thus, an ozone-accommodating biopesticide is extracted from the stems of the Gossypium arboreum. Thus, the extraction of biopesticide from the stems of Gossypium arboreum demonstrated that the quantity of pink bollworm and Lepidoptera is diminished step by step in the wake of showering the arrangement on the impacted region of the plant because of the presence of the gossypol.
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Dr. Amarjeet Singh
E-Commerce has transformed business as we know over the past few decades. The rapid increasing use of the Internet and the strong purchasing power in Saudi Arabia have had a strong impact on the evolution of E-Commerce in the country. Saudi Arabia is yet another country that will release artificial intelligence power to fuel its growth in the economic world. Recently, artificial intelligence (AI) applications that can facilitate e-commerce processes have been widely used. The impact of using artificial intelligence (AI) concepts and techniques on the efficiency of e-commerce, particularly has been overlooked by many prior studies. In this paper, a literature review was conducted to explore and investigate possible applications of AI in E-Commerce that can help Saudi Arabian businesses.
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Dr. Amarjeet Singh
This study on factors influencing Ownership pattern and its impact on corporate performance has used five industries data viz Automobile industry, IT industry, Banking industry, Oil & Gas industry and pharmaceutical industry for five years from 2017 to 2021. First the factors influencing ownership pattern was identified and later its impact on corporate performance was analysed. Multiple Regression, ANOVA and Correlation was used in SPSS 28. Percentage of independent directors on the board and size of the company has significant impact on Indian Promotor holding and non-institutional ownership has significant impact on corporate performance.
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...Dr. Amarjeet Singh
Every country with a well-developed transportation network has a well-developed economy. The automobile industry is a critical engine of the nation's economic development. The automobile industry has significant backward and forward links with every area of the economy, as well as a strong and progressive multiplier impact. The automotive industry and the auto component industry are both included in the vehicle industry. It includes passenger waggons, light, medium, and heavy commercial vehicles, as well as multi-utility vehicles such as jeeps, three-wheelers, military vehicles, motorcycles, tractors, and auto-components such as engine parts, batteries, drive transmission parts, electrical, suspension and chassis parts, and body and other parts. In the last several years, India's automobile sector has seen incredible growth in sales, production, innovation, and exports. India's car industry has emerged as one of the best in the world, and the auto-ancillary sector is poised to assist the vehicle sector's expansion. Vehicle manufacturers and auto-parts manufacturers account for a significant component of global motorised manufacturing. Vehicle manufacturers from across the world are keeping a close eye on the Indian auto sector in order to assess future demand and establish India as a global manufacturing base. The current research focuses on three automotive behemoths: TATA Motors, MRF, and Mahindra & Mahindra.
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...Dr. Amarjeet Singh
The growth of a country's banking sector has a significant impact on its economic development. The banking sector plays a critical role in determining a country's economic future. A well-planned, structured, efficient, and viable banking system is an essential component of an economy's economic and social infrastructure. In modern society, a strong banking system is required because it meets the financial needs of the modern society. In a country's economy, the banking system plays a crucial role. Because it connects surplus and deficit economic agents, the bank is the most important financial intermediary in the economy. The banking system is regarded as the economy's lifeline. It meets the financial needs of commerce, industry, and agriculture. As a result, the country's development and the banking system are intertwined. They are critical in the mobilisation of savings and the distribution of credit to various sectors of the economy. India's private sector banks play a critical role in the country's economic development. So The financial performance of private sector banks must be evaluated carefully.
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...Dr. Amarjeet Singh
After the United States, China, and Japan, India was the world's fourth biggest consumer of oil and petroleum products. The nation is significantly reliant on crude oil imports, the majority of which come from the Middle East. The Indian oil and gas business is one of the country's six main sectors, with important forward links to the rest of the economy. More than two-thirds of the country's overall primary energy demands are met by the oil and gas industry. The industry has played a key role in placing India on the global map. India is now the world's sixth biggest crude oil user and ninth largest crude oil importer. In addition, the country's portion of the worldwide refining market is growing. India's refining industry is now the world's sixth biggest. With plans for Reliance Petroleum Limited to commission another refinery with a capacity of 29 MTPA next 16 to its 33 MTPA refinery in Jamnagar, Gujarat, this position is projected to be enhanced. As a consequence, the Reliance refinery would be the biggest single-site refinery in the world. Based on secondary data gathered from CMIE, the current research examines the ratios influencing the profitability of selected oil exploration and production businesses in India during a 10-year period.
Since 1991, thanks to economic policy liberalization, the Indian economy has entered an era in which Indian businesses can no longer disregard global markets. Prior to the 1990s, the prices of a variety of commodities, metals, and other assets were carefully regulated. Others, which were not rolled, were primarily dependant on regulated input costs. As a result, there was no uncertainty and, as a result, no price fluctuations. However, in 1991, when the process of deregulation began, the prices of most items were deregulated. It has also resulted in the exchange being partially deregulated, easing trade restrictions, lowering interest rates, and making significant advancements in foreign institutional investors' access to the capital markets, as well as establishing market-based government securities pricing, among other things. Furthermore, portfolio and securities price volatility and instability were influenced by market-determined exchange rates and interest rates. As a result, hedging strategies employing a variety of derivatives were exposed to a variety of risks. The Indian capital market will be examined in this study, with a focus on derivatives.
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Dr. Amarjeet Singh
SEI S.p.a. presented a project to build a 1320 MW coal-fired power plant in Saline Joniche, on the Southern tip of Calabria Region, Italy, in 2008. A gross early evaluation about the possibility to add CCS (CO2 Capture & Storage) was performed too. The project generated widespread opposition among environmental associations, citizens and local institutions in that period, against the coal use to produce energy, as a consequence of its GHG clima-alterating impact. Moreover the CCS (also named Carbon Capture & Storage or more recently CCUS: Carbon Capture-Usage-Storage) technology was at that time still an unknown and “mysterious” solution for the GHG avoiding to the atmosphere. The present study concerns the sizing of the compression and transportation system of the CCS section, included in the project presented at the time by SEI Spa; the sizing of the compression station and the pipeline connecting the plant to the possible Fosca01 offshore injection site previously studied as a possible storage solution, as part of a coarse screening of CO2 storage sites in the Calabria Region. This study takes into account the costs of construction, operation and maintenance (O&M) of both the compression plant and the sound pipeline, considering the gross static storage capacity of the Fosca01 reservoir as a whole as previously evaluated.
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidDr. Amarjeet Singh
In this paper, the behavior of MR particles has been systematically investigated within the scope of analytical mechanics. . A magnetorheological fluid belongs to a class of smart materials. In magnetorheological fluids, the motion of magnetic particles is controlled by the action of internal and external forces. This paper presents analytical mechanics for the interaction of system of particles in MR fluid. In this paper, basic principles of Analytical Mechanics are utilized for the construction of equations.
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureDr. Amarjeet Singh
Solid waste is health hazard and cause damage to the environment due to improper handling. Solid waste comprises of Industrial Waste (IW), Hazardous Waste (HW), Municipal Solid Waste (MSW), Electronic waste (E-waste), Bio-Medical Waste (BMW) which depend on their supply & characteristics. Food waste or Bio-waste composting and its role in sustainable development is explained in food waste is a growing area of concern with many costs to our community in terms of waste collection, disposal and greenhouse gases. When rotting food ends up in landfill it turns into methane, a greenhouse gas that is particularly damaging to the environment. Composting is biochemical process in which organic materials are biologically degraded, resulting in the production of organic by products and energy in the form of heat. Heat is trapped within the composting mass, leading to the phenomenon of self-heating. This overall process provide us Bio-Manure.
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Dr. Amarjeet Singh
The purpose of this study is to examine investors’ perceptions about investing in crypto-currencies. We think that investors trust in crypto-currencies is largely driven by crypto-currency comprehension, trust in government, and transaction speed. This is the first study to examine crypto-currencies from the investor’s perspective. Following that, we discover important antecedents of crypto-currency confidence. Second, we look at the government's role in crypto-currencies. The importance of this study is: first, crypto-currencies have the potential to disrupt the current economic system as the debate is all about impact of decentralization of transactions; thus, further research into how it affects investors trust is essential; and second, access to crypto-currencies. Finally, if Fin-Tech companies or banks want to enter the bitcoin industry may not attract huge advertising costs as well as marketing to soothe clients' concerns about investing in various digital currencies The research sheds light on indecisiveness in the context of marketing aspects adopted by demonstrating investors are aware about the crypto.
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Dr. Amarjeet Singh
The Island Province of Catanduanes is prone to all types of natural hazards that includes torrential and heavy rains, strong winds and surge, flooding and landslide or slope failures as a result of its geographical location and topography. RA 10121 mandates local DRRM bodies to “encourage community, specifically the youth, participation in disaster risk reduction and management activities, such as organizing quick response groups, particularly in identified disaster-prone areas, as well as the inclusion of disaster risk reduction and management programs as part of youth programs and projects. The study aims to determine the awareness to disaster of the student of the Catanduanes State University. The disaster-based questionnaire was prepared and distributed among 636 students selected randomly from different Colleges and Laboratory Schools in the University
The Catanduanes State University students understood some disaster-related concepts and ideas, but uncertain on issues on preparedness, adaptation, and awareness on the risks inflicted by these natural hazards. Low perception on disaster risks are evidently observed among students. The responses of the students could be based on the efficiency and impact of the integration of DRR education in the senior high school curriculum. Specifically, integration of the concepts about the hazards, hazard maps, disaster preparedness, awareness, mitigation, prevention, adaptation, and resiliency in the science curriculum possibly affect the knowledge and understanding of students on DRR. Preparedness drills and other forms of capacity building must be done to improve awareness of the student towards DRRM.
The study further recommends that teachers and instructor must also be capacitated in handling disaster as they are the prime movers in the implementation of the DRRM in education. Preparedness drills and other forms of capacity building must be done to improve awareness of the student towards DRRM. Core subjects in Earth Sciences must be reinforced with geologic hazards. Learning competencies must also be focused on hazard identification and mapping, and coping with different geologic disaster.
The 1857 war was a watershed moment in the history of the Indian subcontinent. The battle has sparked academic debate among historians and sociologists all around the world. Despite the fact that it has been more than 150 years, this battle continues to pique the interest of historians. The war's causes and events that occurred throughout the conflict, persons who backed the British and anti-British fighters, and the results and ramifications, are all aspects of this conflict. In terms of outcomes, many academics believe that the war was a failure for those who started it. It is often assumed that the Indians who battled the British in this conflict were unable to achieve their goals. Many gains accrued to Indians as a result of the conflict, but these achievements are overshadowed by the dispute over the war's failure. This research effort focuses on the war's achievements for India, and the significance of those achievements.
Haryana's Honour Killings: A Social and Legal Point of ViewDr. Amarjeet Singh
Life is unpredictably unpredictable. Nobody knows what will happen in the next minute of their lives. In this circumstance, every human being has the right and desire to conduct their lives according to their own desires. No one should be forced to live a life solely for the benefit and reputation of others. Honour killing is defined as the assassination of a person, whether male or female, who refuses to accept the family's arranged marriage or decides to move her or his marital life according to her or his wishes solely because it jeopardizes the family's honour. The family's supreme authority looks after the family's name but neglects to consider the love and affection shared among family members. I have discussed honour killing in India in my research work. This sort of murder occurs as a result of particular triggers, which are also examined in relation to the role of the law in honour killing. No one can be released free if they break the law, and in this case, it is a felony that violates various regulations designed to safeguard citizens. This crime is similar to many others, but it is distinct enough to be differentiated in the report. When the husband is of low social standing, it lowers the position and caste of the female family, prompting the male family members to murder the girl. But they forget that the girl is their kid and that while rank may be attained, a girl's life can never be replaced, and that caste is less valuable than the girl's life and love spent with them.
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Dr. Amarjeet Singh
The impact caused by the Covid-19 Pandemic on Micro and Small and Medium Enterprises (MSMEs) was so severe and fatal
that not a few went out of business. The heavy burden is borne by MSME actors due to social restrictions imposed by the
government, the declining purchasing power of the people, a product that continues to decline until capital runs out. Plus
inadequate knowledge in carrying out marketing strategies and product innovations are the main trigger for the lack of
enthusiasm for MSME actors as well as bankruptcy. MSME digitalization-based e-commerce is an opportunity and the right
solution in dealing with the obstacles caused by the impact of Covid-19, as well as a challenge for MSME actors to design old
ways in new ways through digital business.
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Dr. Amarjeet Singh
This paper presents the Modal space decoupled control for a hydraulically driven parallel mechanism has been presented. The approach is based on singular values decomposition to the properties of joint-space inverse mass matrix, and mapping of the control and feedback variables from the joint space to the decoupling modal space. The method transformed highly coupled six-input six-output dynamics into six independent single-input single-output (SISO) 1 DOF hydraulically driven mechanical systems. The novelty in this method is that the signals including control errors, control outputs and pressure feedbacks are transformed into decoupled modal space and also the proportional gains and dynamic pressure feedback are tuned in modal space. The results indicate that the conventional controller can only attenuate the resonance peaks of the lower eigenfrequencies of six rigid modes properly, and the peaking points of other relative higher eigenfrequencies are over damped, The further results show that it is very effective to design and tune the system in modal space and that the bandwidth increased substantially except surge (x) and sway (y) motions, each degree of freedom can be almost tuned independently and their bandwidths can be increased near to the undamped eigenfrequencies.
It is a known fact that a large number of Steel Industry Expansion projects in India have been delayed due to regulatory clearances, environmental issues and problems pertaining to land acquisition. Also, there are challenges in the tendering phase that affect viability of projects thus delaying implementation, construction phase is beset with over-runs and disputes and last but not the least; provider skills are weak all across the value chain. Given the critical role of Steel Sector in ensuring a sustained growth trajectory for India, it is imperative that we identify the core issues affecting completion of infrastructure projects in India and chalk out initiatives that need to be acted upon in short term as well as long term.
A blockchain is a decentralised database that is shared across computer network nodes. A blockchain acts as a database, storing information in a digital format. The study primarily aims to explore how in the future, block chain technology will alter several areas of the Indian economy. The current study aims to obtain a deeper understanding of blockchain technology's idea and implementation in India, as well as the technology's potential as a disruptive financial technological innovation.
Secondary sources such as reports, journals, papers, and websites were used to compile all the data. Current and relevant information were utilised to help understand the research goals. All the information is rationally organised to fulfil the objectives. The current research focuses on recommendations for enhancing India's Blockchain ecosystem so that it may become one of the best in the world at utilising this new technology.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
1. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-1 (February 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5
26 This work is licensed under Creative Commons Attribution 4.0 International License.
Security and Privacy Issues in IoT Environment
Navod Neranjan Thilakarathne
Lecturer, Department of ICT, Faculty of Technology, University Of Colombo, SRILANKA
Corresponding Author: navod.neranjan@ict.cmb.ac.lk
ABSTRACT
Internet of Things (IoT) is becoming an emerging
trend superseding other technologies and researchers
considered it as the future of internet. As now the
connectivity to the World Wide Web is becoming highly
available cost is drastically decreasing so everyone can
afford the technology. As Internet of Things provides a
great opportunity to develop an important industrial
systems and applications with the help of various kind of
sensors that can sense out the environment using number of
devices that is connected to the internet, usage of IoT is
drastically increasing and becoming a common thing. With
this sky-rocketed usage and the demand, Communication
and storing of the information faces serious security issues
as the security of IoT devices become just an afterthought
when manufacturing most of the devices. This study tries to
summarize this IoT security issues in terms of primary
information security concepts confidentiality, integrity and
availability with regards to its architecture.
Keywords-- Internet of Things, IoT, Security, Privacy,
IoT Security, IoT Environment
I. INTRODUCION
Internet, basically started as small
interconnected network of less number of computers and
now it is become a large network which contains billions
of interconnected computers that shares and stores
information. The term IoT stands for Internet of Things
and we can describe an IoT system as one that comprise
of interconnected smart devices that embedded with
electronics ,software ,sensors and actuators and network
connectivity which enable these objects to collect and
exchange data.[1]
Following are the basic components of typical
IoT environment. [1]
Sensors: Those are electrical components that are able to
detect events or changes in the environment, such as
temperature, humidity.
Actuators: Any component of a machine responsible for
moving or controlling a mechanism or system.
Software: This can be described as compiled computer
instructions that control the sensors and actuators, thus
determining the final goals or outcomes of the system.
Some software could reside on the sensor or actuator
devices in a really less space.
Network: The channel through which the interconnected
devices are communicated.
IoT systems can also be described using a basic
three layer architecture.
Perception layer – The Perception layer is the typical
external physical layer, which includes sensors for
sensing and gathering information about the surrounding
environment such as temperature, humidity, pressure and
so on.
Gateway layer – The Gateway layer is responsible for
connecting to network devices, interconnected smart
devices and servers. Its features are also used for
transmitting and processing sensor data.
Cloud layer - The IoT Cloud Layer represents the back-
end services required to set up, manage, operate, and
extract business value from an IoT system. It will deliver
the application specific services to the user so they can
operate and monitor the devices.
Figure 1: Typical IoT Architecture
This IoT promises to advance our day to day life
and it provides contributions towards major important
industries such as agriculture, supply chain management,
location tracking, remote monitoring, and real time
analysis and so on. [2] As this is becoming a hot topic
this has received much attraction from researchers and
industrialists all around the word. Even though this
promises many benefits this also has many potential
issues and challenges. This paper deals with one of the
prominent issues that is security in IoT. Security remains
one of the supreme issue that stump the development and
applications of IoT.
The main objective of this study is to highlight
security and privacy issues surrounding IoT ecosystem. In
IoT, the things will communicate with each other as
everything is interconnected, so privacy can be hindered
So, we can say that lots of security and privacy issues will
2. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-1 (February 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5
27 This work is licensed under Creative Commons Attribution 4.0 International License.
arise and more attention is required from researchers in
IoT especially with regard to issues like authenticity,
confidentiality and integrity and availability of data and
services in IoT
This paper is divided in to serveral sections,
which section two describes about IoT attack vectors in
terms of its layers, section three and section four
describes privacy issues in IoT with example use case of
IoT attack. In the final two sections we are discussing
about countermeasures and the conclusion.
II. IOT ATTACK VECTORS IN
TERMS OF ITS LAYERS [6-14]
A. Perception Layer
This layer is the lowest layer in the IoT
architecture and also called as the Devices layer. Main
objective of this layer is to collection of all sorts of
information from sensing devices and sending them to the
gateway layer. Physical devices like RFID, actuators,
sensors exists in this layer.
Following table will depict the different security
threats that is arising against Perception Layer.
Table 1 Perception Layer Attack Vectors
Name of the
Threat
Description
Denial of
Service Attack
IoT sensing nodes have limited
capacity and capabilities thus
attackers can use Denial of
Service attack to stop the
service. Eventually servers and
the devices will be unable
provide its service for users.
Hardware
Jamming
Attacker can damage the node
by replacing the parts of the
node hardware.
Insertion of
Forged nodes
Attacker can insert a falsified
or malicious node between the
actual nodes of the network to
get access and get control over
the IoT network.
Brute Force
Attack
As the sensing nodes contains
weaker computational power
brute force attack can easily
compromise the access control
of the devices.
B. Gateway Layer
The second or the middle layer of the
architecture is known as Gateway Layer and main
purpose of this layer is to providing reliable
communication between Perception Layer and the Cloud
Layer. This acts as an intermediate bridge between
Gateway Layer and the Cloud Layer.
Following table will depict the different security
threats that is arising against Gateway Layer.
Table 2 Gateway Layer Attack Vectors
Name of
the Threat
Description
Denial of
Service
Attack
As this layer provide network
connectivity by following a DOS
attack, servers or devices are unable to
provide the services to the user.
Session
Hijacking
attacks
Attackers can hijack the session and
obtain the access to the network
through this kind of attack.
Man in the
middle
attacks
Attacker can intersect the
communication channel between two
sensing nodes and easily obtain
classified information if there is no
proper encryption mechanism in
place.
C. Cloud Layer
This is the topmost layer in the IoT architecture
which is responsible for providing the end user service.
Basically this provides an interface which users can
operate and monitor their devices.
Following table will depict the different security
threats that is arising against Cloud Layer.
Table 3 Cloud Layer Attack Vectors
Name of the
Threat
Description
Data security in
cloud computing
All the Data that is collected
will be processed and stored on
the cloud, Cloud service
provider will be hold the
responsibility of protecting this
data.[5]
Application layer
attacks
Most applications are hosted on
the cloud as a Software as a
Service and delivered through
web services, so the attacker
can easily manipulate the
application layer protocols and
get access to the IoT network.
An attack on
Virtual Machines
Security of cloud virtual
machines is very important
and any security breach can
cause the failure of entire IoT
environment.
3. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-1 (February 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5
28 This work is licensed under Creative Commons Attribution 4.0 International License.
III. PRIVACY ISSUES IN IOT
As internet is becoming a part of our daily lives
everything is being shared over the internet like photos,
videos, various kind of records and many more, hence
privacy becomes a big concern when it comes to
information security. It is the right of an entity (person),
to determine the amount of information it is willing to
share with others. [4]
As in the IoT everything is connected with the
internet, privacy will become a serious issue. A lot of
earmarked information of a person can be composed
without the awareness of the person. Control on the
diffusion of all such information is impossible in current
scenario. So, the users of the IoT system need to deal
their own data. The owners should know who are using
their data and when it is used. [2]
IV. EXAMPLE USE CASE MIRAI
On October 21, 2016 many of the major
platforms and services in North America and Europe
were inaccessible due to a Distributed Denial of Service
attack (DDOS). Those affected services and platforms
were spanned across multinational industries, social
media platforms and many government services. This
outage affected by the DDOS attack which targeted
domain name service (DNS) provider that resolves
domain names for a considerable portion of the
internet.[1]
Investigated followed by the incident discovered
that this malicious DDOS traffic originated from IoT
devices around the world which had been compromised
by the malware known as Mirai. Those malware infected
devices include cameras, printers, residential gateways
and baby monitors. It was investigated that owners of
these malware infected IoT devices didn’t know a least
thing that their devices were already compromised. This
provides us a great example why you need to be cautious
about the security of the internet facing IoT devices.
V. COUNTER MEASURES
The Open Web Application Security Project, or
OWASP, has released latest vulnerabilities that will target
IoT devices. Following are the current ranked list of the
top issues and things to avoid. [3]
1. Weak, guessable, or hardcoded passwords
2. Insecure network services
3. Insecure ecosystem interfaces
4. Lack of secure update mechanism
5. Use of insecure or outdated components
6. Insufficient privacy protection
7. Insecure data transfer and storage
8. Lack of device management
9. Insecure default settings
10. Lack of physical hardening
Basic IoT system requires following to be fulfilled in
order to become a secure system.
1. Authentication
2. Authorization
3. Confidentiality
4. Integrity
5. Non Repudiation
Authentication verifies the identity of the users or a
devices in an IoT system. Authorization checks for what
are the privileges possess by the authorized entity to
execute on the system. In terms of confidentiality and the
data integrity it will make sure that the data is encrypted
so no one can tamper even in the storage or during the
transmission. Non repudiation assures that authenticity of
the origin source of data and integrity of data. Exploiting
an IoT system deals with compromising any of the
aforementioned security attributes which we need to take
actions before compromising.
Following table will depict what we can do to
improve the security in terms of aforementioned security
attributes.
Table 4 Countermeasures to Improve the Security
Security
attribute
Action Description
Authentication Use security
credentials
Use identity and
access
management
methods
Identification of
users and
devices need to
be done and
need to
configure strong
security
credentials for
the devices by
removing the
default
credentials.
Authorization
Confidentiality Use appropriate
encryption
mechanism as
devices may
contain less
computational
power
Data must be
encrypted so
only authorized
users can access
the data.
Data integrity Use Hashing
techniques
Non tampering
of data can be
assured by
various hashing
techniques
Non repudiation Using Digital
signatures
Origin source of
the data can be
assured by using
digital
signatures.
4. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-1 (February 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5
29 This work is licensed under Creative Commons Attribution 4.0 International License.
As IoT systems are consists of heterogonous
devices with heterogonous technologies determining
security requirement and taking pre caution is a huge
challenges as of the complexity.
VI. CONCLUSION
Internet of Things is vast field and evolving day
by day making the life better of mankind. As this is a
highly evolving technology number of researchers are
working towards betterment and the safeguard of the
technology. As everything is connected with the World
Wide Web security plays a major important role in the
IoT arena. Even though there are number of researchers
working towards the security issues of IoT there are still
lot of fields that is under development as still there are
lots of key issues which has no solution yet.
This paper outlines the issues and challenges
related to security in IoT in terms of its architecture. A
brief insight is being provided about security of IoT
environment along with various security threats prevalent
at various layers of architecture and some security
initiatives which are currently required is also highlighted
in this paper.
REFERENCES
[1] Fagbemi, D., Wheeler, D. M., & Wheeler, J. (2020).
The IoT architect's guide to attainable security and
privacy. New York: Auerbach Publications.
DOI: https://doi.org/10.1201/9780367440930
[2] Joshitta, R. Shantha. (2016). Security in IoT
environment: A survey. International Journal of
Information Technology & Mechanical Engineering, 2, 1-
8.
[3] TechWell. (2019). OWASP Releases Latest Top 10
IoT Vulnerabilities. Available at:
https://www.techwell.com/techwell-
insights/2019/01/owasp-releases-latest-top-10-iot-
vulnerabilities [Accessed 16 Dec. 2019].
[4] Vikas, B. O. (2015). Internet of Things (IoT): A
survey on privacy issues and security. International
Journal of Scientific Research in Science, Engineering
and Technology, 1(3), 168-173.
[5] Thilakarathne, N. N. & Wickramaaarachchi, D.
(2018). Improved hierarchical role based access control
model for cloud computing. International Research
Conference on Smart Computing and Systems
Engineering-SCSE 2018. Available at:
http://repository.kln.ac.lk/handle/123456789/18990
[6] Patel, Ashish. (2017). Comprehensive Survey on
Security Problems and Key Technologies of the Internet
of Things (IoT). International Conference on
Engineering and Technology. Available at:
https://www.researchgate.net/publication/321161091_Co
mprehensive_Survey_on_Security_Problems_and_Key_T
echnologies_of_the_Internet_of_Things_IoT.
[7] Pasha,M., Myhammad,S., & Pasha,U. (2016).
Security framework for IoT Systems. International
Journal of Computer Science and Information Security,
14(11), 99-104.
[8] Flauzac, Olivier, Carlos Javier Gonzalez, & Nolot,
Florent. (2015). New security architecture for IoT
network. Procedia Computer Science. 52, 1028-1033.
[9] Efe, Ahmet, Aksöz, Esra, Hanecioğlu, Neslihan, &
Yalman, Şeyma. (2018). Smart security of IOT against
ddos attacks. International Journal of Innovative
Engineering Applications, 2(2), 35-43.
[10] Zhang, Guoping & Gong, Wentao. (2011). The
research of access control based on UCON in the internet
of things. Journal of Software, 6(4), 724-731.
[11] Iqbal, A., Suryani, M. A., Saleem, R., & Suryani, M.
A. (2016). Internet of things (IoT): On-going security
challenges and risks. International Journal of Computer
Science and Information Security, 14(11), 671.
[12] Ouaddah, A., Bouij-Pasquier, I., Elkalam, A. A., &
Ouahman, A. A. (2015, Mar). Security analysis and
proposal of new access control model in the Internet of
Thing. In: 2015 International Conference on Electrical
and Information Technologies (ICEIT), pp. 30-35.
[13] Rao, T. A. & Ehsan-ul-Haq. (2018). Security
challenges facing IoT layers and its protective measures.
International Journal of Computer Applications, 179(27),
31-35.
[14] Ali, I., Sabir, S., & Ullah, Z. (2019). Internet of
things security, device authentication and access control:
A review. Available at: https://arxiv.org/abs/1901.07309.