keyboard_arrow_up
Top 10 read research articles in the field of Security & Its Applications @ 2024

SECURITY & PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS

    Faheem Masoodi1 Shadab Alam, and Shams Tabrez Siddiqui2, 1Department of Computer Science, University of Kashmir, J&k, India 2Department of Computer Science, Jazan University, KSA

    ABSTRACT

    The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures

    KEYWORDS

    Internet of Things, privacy, attacks, security, threats, protocols


    For More Details :
    http://aircconline.com/ijnsa/V11N2/11219ijnsa05.pdf


    Volume Link :
    http://airccse.org/journal/jnsa19_current.html




EVALUATION OF A BLOCKCHAIN-ENABLED RESOURCE MANAGEMENT MECHANISM FOR NGNS

    Michael Xevgenis,Ioannis Christidis and Helen C. Leligou1 1 Dimitrios G. Kogias,Charalampos Patrikakis2, 1Dept. of Industrial Design and Production Engineering, University of West Attica, 122 43 Attica, Greece 2Dept. of Electrical and Electronics Engineering, University of West Attica, 122 43 Attica, Greece

    ABSTRACT

    A new era in ICT has begun with the evolution of Next Generation Networks (NGNs) and the development of human-centric applications. Ultra-low latency, high throughput, and high availability are a few of the main characteristics of modern networks. Network Providers (NPs) are responsible for the development and maintenance of network infrastructures ready to support the most demanding applications that should be available not only in urban areas but in every corner of the earth. The NP’s must collaborate to offer high- quality services and keep their overall cost low. The collaboration among competitive entities can in principle be regulated by a trusted 3rd party or by a distributed approach/technology which can guarantee integrity, security, and trust. This paper examines the use of blockchain technology for resource management and negotiation among NPs and presents the results of experiments conducted in a dedicated real testbed. The implementation of the resource management mechanism is described in a Smart Contract (SC) and the testbeds use the Raft and the IBFT consensus mechanisms respectively. The goal of this paper is two-fold: to assess its performance in terms of transaction throughput and latency so that we can assess the granularity at which this solution can operate (e.g. support resource re-allocation among NPs on micro-service level or not) and define implementation specific parameters like the consensus mechanism that is the most suitable for this use case based on performance metrics.

    KEYWORDS

    Blockchain, NGNs, Resource management, Consensus, Performance


    For More Details :
    https://aircconline.com/ijnsa/V13N5/13521ijnsa01.pdf


    Volume Link :
    https://airccse.org/journal/jnsa21_current.html








menu
Reach Us

emailsecretary@cseij.org


emailcseijsecretary@yahoo.com

close