Fig 1 - uploaded by Bhabendu Kumar Mohanta
Content may be subject to copyright.
Application area of Internet of Things.

Application area of Internet of Things.

Source publication
Conference Paper
Full-text available
Internet of Things (IoT) has lots of attention in the last decade. The connected IoT devices are more than the total world population. Due to its low cost, easy to deploy, and simple to implement, application areas are large like smart city, smart home, smart transportation, environment monitoring, agriculture and many more. There exists some secur...

Contexts in source publication

Context 1
... IoT has lots of application areas as shown in Fig. 1, each of these application consists of basic three-layer architecture. The architecture consists of sensors devices, connecting devices, and some user devices to monitor the ...
Context 2
... IoT has lots of application areas as shown in Fig. 1, each of these application consists of basic three-layer architecture. The architecture consists of sensors devices, connecting devices, and some user devices to monitor the ...

Similar publications

Article
Full-text available
Internet of Things (IoT) is a novel paradigm, which not only facilitates a large number of devices to be ubiquitously connected over the Internet but also provides a mechanism to remotely control these devices. The IoT is pervasive and is almost an integral part of our daily life. These connected devices often obtain user's personal data and store...

Citations

... As we know, resource-restricted devices experience problems with key generation and matching, when the legitimate devices authentication model is complex, because of the computationally intensive algorithms followed by a huge number of devices. To address this issue, the industry owners prefer to use their own key management system rather than vendorcreated keys management systems for better security management at the organization level [144], [145], [152], [198]- [200]. In [147], the authors highlighted that one authentication authority is not sufficient for a heterogeneous HC-IoT network in a critical infrastructure because the authentication authority has to entertain too many validation requests during operation. ...
... This is the author's version which has not been fully edited and content may change prior to final publication. [145], Miao et al. [140] With an overall (18% (relative interest high)) Multi Factor Authentication schemes used for HC-IoT networks Dhillon et al. [146], Roy et al. [147], Shamshad et al. [148], Ahmed et al. [149], Dhillon et al. [146], Wu et al. [150], Fotouhi et al. [151], Kumar et al. [1] With an overall (12% (relative interest moderate)) Decentralized authentication and key management schemes used for HC-IoT networks Weippl et al. [136], Mohanta et al. [152], Roy et al. [147], Shamshad et al. [148], Ahmed et al. [149], Dhillon et al. [146], Wu et al. [150] With an overall (10% (relative interest low)) Mutual authentication schemes used for HC-IoT networks Deebak et al. [34], Fotouhi et al. [151], Garg et al. [153], Singh et al. [154], Khemissa et al. [155], Al-Turjman et al. [156], Loske et al. [157], Tian et al. [158], Hu et al. [159], Hussain et al. [160], Li et al. [161], Puri et al. [162], Dantu et al. [163], Zhao et al. [164] With an overall (21% (relative interest high)) Data Preservation authentication schemes for HC-IoT networks Guan With an overall (14% (relative interest medium)) Attestation based authentication schemes used for HC-IoT networks Lin et al. [187], Abdi et al. [188], Pallavi et al. [189], Yao et al. [190], Kim et al. [191], Loukil et al. [192] With an overall (8% (relative interest low)) and biometric was proposed to resolve the authentication problem in HC-IoT networks. The recent analysis of reference [160], disclosed that this model was flawed and unprotected against a variety of threats, due to its simple authentication process. ...
Article
Internet of Things (IoT) applications are switching from general to precise in different industries, e.g., healthcare, automation, military, maritime, smart cities, transportation, logistics, and many more. In the healthcare domain, these applications had demonstrated an incredible improvement in patient assessment, monitoring, and prescription, etc., with ease of access through the Internet. Despite its benefits, this technology also offers several security challenges for the research community and healthcare stakeholders, because of its wireless communication and open-area deployment. To explore, patient wearable devices and other networking entities follows unstructured communication format to share their accumulated data in the network, which makes them susceptible to manifold security threats. Considering the significance of these applications, data acquisition, processing, storage, and assessment on client and remote sides need a high standard of secure communication infrastructure. Therefore, security of these applications is one of the major obstacles that prevent their widespread use in different healthcare domains. To discuss different security constraints, in this paper, we present a comprehensive survey of the theoretical literature from 2015-to-2023 to highlight the unresolved security problems of this emerging technology. Based on the evaluated literature pros and cons, we determine the security requirements and challenges of Healthcare-IoT (HC-IoT) applications. Following this, we demonstrate future research directions that could be useful for the researchers and industry stakeholders working in this domain. To demonstrate the uniqueness of this work and claim its contribution, we compare our work section-wise with previously published papers to answer the question of reviewers, editors, students, and readers, why this review article is required in the presence of already published review articles.
... Architecture: This is distributed when a direct authentication method distributed between the communicating parties is used [49][50][51][52][53], or centralized [54][55][56][57][58] when a trusted authority that allows us to distribute and manage identification data used during authentication is used. ...
Article
Full-text available
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still the biggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures, data, and devices. Authentication, as the first line of defense against security threats, becomes the priority of everyone. It can either grant or deny users access to resources according to their legitimacy. As a result, studying and researching authentication issues within IoT is extremely important. As a result, studying and researching authentication issues within IoT is extremely important. This article presents a comparative study of recent research in IoT security; it provides an analysis of recent authentication protocols from 2019 to 2023 that cover several areas within IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security research summary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. It illustrates that the resistance of protocols against attacks, and their computational and communication cost are linked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemes and provides some future research directions.
... Architecture: This is distributed when a direct authentication method distributed between the communicating parties is used [49][50][51][52][53], or centralized [54][55][56][57][58] when a trusted authority that allows us to distribute and manage identification data used during authentication is used. ...
Article
Full-text available
In today's world, devices are interconnected across various fields, ranging from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. IoT security is still the biggest obstacle to deployment despite the exponential growth of IoT usage in our world. The principal objective of IoT security is to warrant the accessibility of services offered by an IoT environment, protect privacy, and confidentiality, and ensure the safety of IoT users, infrastructures, data, and devices. Authentication has become a top priority for everyone because it is the first line of defense against security threats and can allow or prevent users from accessing resources according to their legitimacy. Consequently, studying and researching authentication issues within IoT is extremely important. Our paper provides a comparative study of current IoT security research; it analyzes recent authentication protocols from 2018 to 2024. This survey’s goal is to provide an IoT security research summary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators.
... Ethereum network has dominated as the parent of smart contracts, tokens, and Dapps. Many researchers and developers attempted to show the advantages of Ethereum Dapps to secure and manage medical records [12,13], the management of used car markets [14], data storage security [15][16][17], authentication [18], supply chaining [19][20], agriculture [21], finance applications [22], E-voting systems [23], academicals certificate authorization [24,25] and enhancing fairness in P2P applications [26]. These developed designs and architectures have shown the advantages of utilizing Web3 and P2P networks in the area of general-purpose applications and how a new paradigm of data transfer can be created without utilizing servers to handle backend data and databases [27]. ...
Article
Full-text available
This work carried out a measurement study of the Ethereum Peer-to-Peer (P2P) network to gain a better understanding of the underlying nodes. Ethereum was applied because it pioneered distributed applications, smart contracts, and Web3. Moreover, its application layer language “Solidity” is widely used in smart contracts across different public and private blockchains. To this end, we wrote a new Ethereum client based on Geth to collect Ethereum node information. Moreover, various web scrapers have been written to collect nodes’ historical data from the Internet Archive and the Wayback Machine project. The collected data has been compared with two other services that harvest the number of Ethereum nodes. Our method has collected more than 30% more than the other services. The data trained a neural network model regarding time series to predict the number of online nodes in the future. Our findings show that there are less than 20% of the same nodes daily, indicating that most nodes in the network change frequently. It poses a question of the stability of the network. Furthermore, historical data shows that the top ten countries with Ethereum clients have not changed since 2016. The popular operating system of the underlying nodes has shifted from Windows to Linux over time, increasing node security. The results have also shown that the number of Middle East and North Africa (MENA) Ethereum nodes is neglected compared with nodes recorded from other regions. It opens the door for developing new mechanisms to encourage users from these regions to contribute to this technology. Finally, the model has been trained and demonstrated an accuracy of 92% in predicting the future number of nodes in the Ethereum network.
... Using the Ethereum blockchain, Mohanta et al. [13] completed the decentralized authentication for Internet of Things devices. Panda et al. [14] investigated decentralized consensus methods based on blockchain technology. ...
Article
Full-text available
Fire outbreak is a common issue which is occurring worldwide, causing significant damage to both nature and human life. Recently, vision-based fire detection systems have gained popularity over traditional sensor-based systems. However, the detection process using image processing techniques can be tedious. In the current study, we propose a technique for fire detection that utilizes optimal convolution neural networks (OPCNN) to achieve highly accurate detection of fire images in forest. The result of proposed model is compared with two other models: CNN and J48. The proposed model performs better than these models. The proposed algorithm was trained using a dataset consisting of 755 images of fire and 244 images of non-fire, for a total of 999 images. These images were obtained from Kaggle data set. We resized and reshaped 1380 of these images for use in training and 460 images for testing. The model was trained using convolution, activation functions, and max pooling operations with different batch sizes and epoch values. The resulting model achieved an accuracy of 95.11%, with 432 out of 460 images predicted correctly. The proposed approach thus provides a highly accurate and efficient method to detect forest fire accurately for a sustainable safety world. The proposed work provides a new direction towards accurate and early detection of fire not only in forest but also in case of agriculture field, rural, urban, and many more areas.
... Automatic detection of API access control vulnerabilities is researched in [45]. Given the proliferation of IoT devices [46], the authors propose a distributed authentication system using the Ethereum blockchain to solve device identification problems. ...
Article
Full-text available
IoT edge computing is a network design model that captures and processes data at the network edge. The results are forwarded to a cloud service or, if additional processing is needed, a middle tier. By processing data at the edge and middle tier, edge networks achieve better load-balancing and improve performance; however, traditional edge network deployments represent a rigid participation model. Edge networks require physical access to an IoT device and often lock the device to a single edge network. These constraints make it difficult to construct the ideal network, as they reject IoT devices deployed at the network edge but not owned by the network administrator. Our goal is to remove these limitations by creating a network protocol that supports broader participation of IoT devices, cryptographically secures network data, and improves network performance by increasing captured data at the network edge. The protocol is named Snap to symbolize the ease of self assembly. Our experimental research focuses on temperature stability and the cycle efficiency of an HVAC system by utilizing a Snap network to combine two existing edge networks and increase the number of temperature measurement points. The additional measurement points improved the efficiency of the HVAC cycle strategy by increasing the square footage of measured building space. The additional temperature capture points supported an adjustment to the HVAC cycle strategy which resulted in reducing the disparity between the requested temperature and the resulting temperatures. Snap networks support a broader range of IoT sensors leading to increased measurement density, sample rate frequency, and coverage of the network edge.
... Gemiverse [54] Certificate Management in Travel Industry Tourism [55] Decauth [56] Decentralized Authentication Scheme for IoT Devices Bubbles of Trust [57], A2 Chain [58] Internet of Forensic (IoF) [59] Digital Forensics [60,61], B-coc [62], ForensiBlock [63] CoC [64], CustodyBlock [65] Chain of Custody of Goods Along Various Supply Chains [66], B-Dec [67], TrueCert [68] VANGUARD [69] Managing Media Rights and Copyrights [70,71], Music [72], MF-ledger [73] GM-Ledger (Our Study) ...
Article
Full-text available
Maritime transportation plays a critical role for many Arab countries and their food security and has evolved into a complex system that involves a plethora of supply chain stakeholders spread around the globe. This inherent complexity brings huge security challenges, including cargo loss and high burdens in cargo document inspection. The emerging blockchain technology provides a promising tool to build a unified maritime cargo tracking system critical for cargo security. This is because blockchains are a tamper-proof distributed ledger technology that can store and track data in a secure and transparent manner. Using the State of Qatar as a case study, this research introduces the Global Maritime Ledger (GM-Ledger), which will aid authorities in verifying, signing and transacting food certificates in an efficient manner. The methodology of this research includes reviewing past publications, identifying the requirements of various players in the Qatari food import–export industry and then creating a smart contract framework that will efficiently manage the work with necessary human intervention as and when required. The result of this work is the formation of a solid framework that can be employed in future works. This work realized that employing web3 solutions for the food import sector is highly viable and that with the right social, economic and policy reforms, it is possible to transform the entire food system to bear healthy transparency and power balance in global supply chains. In conclusion, this study argues that BCT has the ability to assist the government and other players to minimize fraud and maximize food supply chain stakeholder participation.
... Apart from the above-mentioned work, some research in IoT area aims at decentralized authentication for IoT devices, which has a similar purpose to our research. For instance, Mohanta focuses on designing a decentralized authentication scheme for IoT devices by Ethereum [20]. However, it requires extra work for the device holder: The scheme imposes a user to register keys in advance and perform every submission of authentication request for new IoT devices. ...
Article
With the rise of social network service (SNS) in recent years, the security of SNS users' private information has been a concern for the public. However, due to the anonymity of SNS, identity impersonation is hard to be detected and prevented since users are free to create an account with any username they want. This could lead to cybercrimes like fraud because impersonation allows malicious users to steal private information. Until now, there are few studies about this problem, and none of them can perfectly handle this problem. In this paper, based on an idea from previous work, we combine blockchain technology and security protocol to prevent impersonation in SNS. In our scheme, the defects of complex and duplicated operations in the previous work are improved. And the authentication work of SNS server is also adjusted to resist single-point, attacks. Moreover, the smart contract is introduced to help the whole system runs automatically. Afterward, our proposed scheme is implemented and tested on an Ethereum test network and the result suggests that it is acceptable and suitable for nowadays SNS network.
... Each block in the blockchain has a distinctive hash. This allows other nodes to use it to verify the integrity of the block [30]. The verified transaction is then appended to the miner's own pending block of transactions that are waiting to be mined. ...
... The data block or its hash value is transmitted to other nodes for comparison, so that the block head and the block body can be found and connected. Blocks are composed of a series of chronological connections [11], and block information processing such as blockchain version number, hash summary of the previous block and random value Nonce is completed by timestamp. The number of transactions, menu sequence and other information are obtained through Merkle tree to complete the storage of block transaction data [12].Blockchain is built on the P2P network and exists in every node in the P2P network. ...
Article
Full-text available
This study presents blockchain technology to integrate the time attribute of Internet of Things data and the time stamp of blockchain, and proposes a data retrieval solution based on dynamic information retrieval. Analyze and reorganize the blockchain data at the bottom of the logistics information platform to synchronize the logistics information to the third-party relational database. The experimental results show that the proposed method can improve the data entry time of the system by 5.2%, and the system occupancy rate is less than 4.1%. It is proved that the proposed model can simplify the data attributes of the Internet of Things, improve the universality of data, effectively integrate the structural characteristics of the Internet of Things and blockchain, and realize safe and efficient data management and application.