A Comprehensive Approach to Protocols and Security in Internet of Things Technology DOI Creative Commons

Jean Pierre Ntayagabiri,

Youssef Bentaleb, Jérémie Ndikumagenge

et al.

Journal of Computing Theories and Applications, Journal Year: 2024, Volume and Issue: 2(3), P. 324 - 341

Published: Dec. 24, 2024

The exponential growth of the Internet Things (IoT) introduces a multitude security challenges, as vast number connected devices often operate with inadequate protection measures. This vulnerability heightens risk cyberattacks, data breaches, and hacking, exposing systems sensitive information to increased threats. Ensuring in IoT ecosystem while considering this rapidly expanding technology's physical limitations specific requirements is complex task. article comprehensively analyzes primary vulnerabilities risks associated IoT, exploring innovative strategies effective solutions strengthen its framework. highlights critical role secure device authentication, encryption, regular updates, continuous monitoring by addressing intricacies communication protocols emphasizing need for standardization. Ultimately, work advocates holistic approach security, where robust, adaptable are developed safeguard against evolving landscape cyber

Language: Английский

Securing the Future: A Survey on Smart Home Security in IoT-Integrated Smart Cities DOI Open Access
Muhammad Furqan Zia,

Maria Siddiqua,

Messaoud Ahmed Ouameur

et al.

Advances in Networks, Journal Year: 2025, Volume and Issue: 12(1), P. 1 - 18

Published: March 21, 2025

The rapid growth of urbanization and technological advancements have led to the rise smart cities homes, where Internet Things (IoT) plays a pivotal role. Smart homes enhance energy efficiency, security, convenience through automated systems interconnected devices. This survey provides comprehensive review home architectures, communication technologies, applications, emphasizing their integration within city infrastructures. It explores key components such as sensors, controllers, cloud-based platforms that enable seamless automation. Additionally, this paper discusses major challenges in including privacy risks, cyber threats, interoperability issues among IoT Security concerns unauthorized access, data breaches, denial-of-service attacks are analyzed, alongside strategies mitigate these risks. study also highlights importance secure protocols, authentication mechanisms, encryption techniques ensure resilience systems. Furthermore, examines emerging research directions technology, AI-driven automation, energy-efficient systems, blockchain-based security solutions. As continue evolve, addressing will be crucial for widespread adoption. aims serve valuable resource researchers, developers, policymakers seeking functionality broader framework cities.

Language: Английский

Citations

0

A novel Primary Key infrastructure IoT enabled secure Access Control Framework Based smart home applications DOI Open Access
Abdullah Lakhan, Muhammad Ali Memon,

Ruchil Shah

et al.

VFAST Transactions on Software Engineering, Journal Year: 2025, Volume and Issue: 13(1), P. 37 - 48

Published: Jan. 30, 2025

This paper presents a comprehensive security framework for smart home environments, integrating advanced authentication, access control mechanisms, and machine learning robust IoT protection. A typical ecosystem is illustrated with interconnected devices—air conditioning systems, robotic assistants, surveillance cameras, thermostats—linked through centralised wireless network that facilitates seamless communication remote via the internet. The emphasises secure authentication authorisation processes, using public key infrastructure (PKI) to validate devices users while issuing, renewing, revoking certificates encrypted communication. mathematical model outlines device user validation functions, mechanisms ensure operations. Fine-grained implemented grant permissions based on specific conditions, ensuring flexible yet resource allocation. Communication maintained encryption decryption, safeguarding data transmitted across networks. To mitigate risks, convolutional neural employed anomaly detection, identifying threats by recognising deviations in regular patterns. Additionally, addresses interoperability adhering standard-compliance protocols, facilitating integration diverse devices. Resource optimisation techniques are introduced maximise efficiency number capabilities of network. User interaction streamlined an intuitive interface supports user-friendly system access. proposed SAC-PKI algorithm serves as foundation framework, detailing sequential steps certificate management, control, detection. By leveraging adaptive features threat this provides solution enhancing cybersecurity deployments, addressing vulnerabilities, efficient utilisation environments.

Language: Английский

Citations

0

Comprehensive Investigation of Security and Quality Metrics for Lightweight Double Arbiter PUF on FPGAs: Design and Analysis DOI Open Access
Sinan Yavuz, Edwin Naroska, Kai Daniel

et al.

Electronics, Journal Year: 2025, Volume and Issue: 14(8), P. 1510 - 1510

Published: April 9, 2025

Protecting IoT (Internet of Things) devices against attacks is essential due to the rapid increase in connected devices. This particularly challenging for lightweight with limited hardware capacity, making computationally intensive encryption inefficient. To address this issue, PUF-based security applications can enhance while reducing resource requirements. The PUF must meet key criteria such as unclonability, unpredictability, and uniqueness throughout its operational lifetime. achieve this, it important minimize unwanted offsets signal propagation delays caused by unbalanced design strategies ensure that responds robustly physical influences. paper presents development an extensive investigation a novel 56-bit 2-4 Double Arbiter PUF. Its performance evaluated on 110 FPGAs dataset 3 million challenge–response pairs (CRPs) under temperature variations range from 0 50 °C. study also examines identification bit positions high order detect eliminate potential weaknesses. Furthermore, we extend DAPUF XOR layer create XOR-DAPUF improve performance. Our results demonstrate robust efficient architecture. optimized delivers outstanding 95.85% reliability, 48.09% randomness, 48.79% uniqueness.

Language: Английский

Citations

0

Cybersecurity in Remote Work DOI
S. Ida Evangeline

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 227 - 240

Published: April 18, 2025

Through remote work, business operations have become widespread, providing companies with the capability of accessing a global talent base and flexibility within operations. However, this shift has made corporate networks vulnerable as employees access from their personal devices, unsecured home networks, cloud based collaboration tools. Due to increase attack surface, work environments are becoming more susceptible various types cyber attacks, such phishing ransomware, insider risks, zero-day exploits. The evolving risks no longer allow traditional security models designed for office centralized be effective, requiring move proactive adaptive cybersecurity strategy. This chapter explores key threatening presented by specific technological, human, regulatory challenges between distributing organizations secures workforces.

Language: Английский

Citations

0

AIoT-Enabled Smart Homes Solution to Security, Comfort, and Energy Efficiency DOI
Anubha Anubha,

Daviender Narang,

Ankit Raj

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 239 - 268

Published: May 8, 2025

Thanks to developments in Artificial Intelligence (AI) and the Internet of Things (IoT), once-futuristic idea smart houses is now a reality. These cutting-edge technologies are transforming regular into intelligent, networked spaces that improve security, comfort, energy efficiency. including AI IoT, automate such homes control various systems devices. At core home lie their capabilities routine tasks like adjusting lighting temperature locking doors managing security cameras. This creates an ecosystem adaptable suit requirements preferences its occupants. In era characterized by artificial intelligence almost everything automated smart. The market valued at $ 79.16 billion 2022 expected grow CAGR (Compound Annual Growth Rate) 27.07% from 2023 2030 (Grandview Research Report, 2024). Accordingly, present chapter aims explore potential AIoT automation.

Language: Английский

Citations

0

Seamless Security Optimizing Cybersecurity and Design in Smart Home Interiors DOI

Mohammad Hasan Ansari

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 47 - 72

Published: April 11, 2025

This section investigates the security protection methods which interior design offers against IoT device threats that exist in smart homes. The research improvement approaches by studying literature data concentrates on position alongside material selection and integration processes. chapter suggests designers must work with IT engineers cybersecurity experts collaborations for resolving both system human factor risks. rose utilizes home technology combination principles to create guidelines securing user-friendly living spaces while maintaining aesthetic value adds relevant concepts discussions.

Language: Английский

Citations

0

Event Prediction Using Spatial–Temporal Data for a Predictive Traffic Accident Approach Through Categorical Logic DOI Creative Commons

Eleftheria Koutsaki,

G. E. Vardakis,

Nikos Papadakis

et al.

Data, Journal Year: 2025, Volume and Issue: 10(6), P. 85 - 85

Published: June 3, 2025

An event is an occurrence that takes place at a specific time and location can be either weather-related (snowfall), social (crime), natural (earthquake), political (political unrest), or medical (pandemic) in nature. These events do not belong to the “normal” “usual” spectrum result change given situation; thus, their prediction would very beneficial, both terms of timely response them for prevention, example, prevention traffic accidents. However, this currently challenging researchers, who are called upon manage analyze huge volume data order design applications predicting using artificial intelligence high computing power. Although significant progress has been made area, heterogeneity input forecasting application needs process—in nature (spatial, temporal, semantic)—and corresponding complex dependencies between constitute greatest challenge researchers. For reason, initial process situations, number characteristics, while, same time, having possibility respond different e.g., predicts pandemic also predict central phenomenon, simply by types. In work, we present have designed date. We model accidents categorical logic, creating Knowledge Base Resolution algorithm as proof concept. study all possible scenarios arise under conditions. Finally, implement accident Prolog language with Queries JPL.

Language: Английский

Citations

0

Embedded IoT Design for Bioreactor Sensor Integration DOI Creative Commons

Laurențiu Baicu,

Mihaela Andrei, George Ifrim

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(20), P. 6587 - 6587

Published: Oct. 12, 2024

This paper proposes an embedded Internet of Things (IoT) system for bioreactor sensor integration, aimed at optimizing temperature and turbidity control during cell cultivation. Utilizing ESP32 development board, the makes advances on previous iterations by incorporating superior analog-to-digital conversion capabilities, dual-core processing, integrated Wi-Fi Bluetooth connectivity. The key components include a DS18B20 digital sensor, TS-300B Peltier module regulation. Through real-time monitoring data transmission to cloud platforms, facilitates advanced process optimization. experimental results yeast cultures demonstrate system's effectiveness maintaining optimal growth, highlighting its potential enhance bioprocessing techniques. proposed solution underscores practical applications IoT in environments, offering insights into improved efficiency reliability culture cultivation processes.

Language: Английский

Citations

0

A Comprehensive Approach to Protocols and Security in Internet of Things Technology DOI Creative Commons

Jean Pierre Ntayagabiri,

Youssef Bentaleb, Jérémie Ndikumagenge

et al.

Journal of Computing Theories and Applications, Journal Year: 2024, Volume and Issue: 2(3), P. 324 - 341

Published: Dec. 24, 2024

The exponential growth of the Internet Things (IoT) introduces a multitude security challenges, as vast number connected devices often operate with inadequate protection measures. This vulnerability heightens risk cyberattacks, data breaches, and hacking, exposing systems sensitive information to increased threats. Ensuring in IoT ecosystem while considering this rapidly expanding technology's physical limitations specific requirements is complex task. article comprehensively analyzes primary vulnerabilities risks associated IoT, exploring innovative strategies effective solutions strengthen its framework. highlights critical role secure device authentication, encryption, regular updates, continuous monitoring by addressing intricacies communication protocols emphasizing need for standardization. Ultimately, work advocates holistic approach security, where robust, adaptable are developed safeguard against evolving landscape cyber

Language: Английский

Citations

0