Cyber Security for Internet of Things (IoT) Devices and Sensors

Cyber Security for Internet of Things (IoT) Devices and Sensors

Roheen Qamar, Baqar Ali Zardari, Alex Khang
DOI: 10.4018/979-8-3693-2069-3.ch025
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Traditionally, only mobile phones and laptops were connected to the internet, but with the development of new technologies, additional items such as security cameras, microwaves, automobiles, and industrial equipment are now connected to the internet. The internet of things refers to this network of things. This chapter highlights the need to reduce IoT security issues. Cloning of devices and exposure of sensitive data. The internet of things (IoT) is emerging as a strong arena in which embedded devices and sensors may connect and exchange data through the Internet. The IoT refers to the integration of sensors and actuators as a method of regulating cyber-physical systems in resource networks. However, the internet connectivity of much standalone IoT equipment creates several cybersecurity issues since sensitive information is vulnerable to malevolent users.
Chapter Preview
Top

1. Introduction

Academic and popular literature on the phrase “cybersecurity” has primarily examined the problem from a certain standpoint. Following a survey of the literature, we chose nine definitions of cybersecurity that, in our opinion, offered the relevant perspectives: Protecting computer networks and the data they hold against intrusion and deliberate harm or disruption is what cybersecurity includes. Cybersecurity is the organization and collection of tools, procedures, and frameworks used to safeguard systems that operate online and in cyberspace against incidents that conflict with legal and practical property rights (Corallo et al., 2022).

The Internet of Things (IoT) is a widespread and omnipresent network that makes it possible to monitor and manage the physical environment by gathering, processing, and analyzing data produced by sensors or smart devices (Szymanski et al., 2022). The IoT is a network of buildings, streets, cars, and other objects that are connected to the internet and equipped with sensors, electronics, software, and network connection (Sirma et al., 2019) as Figure 1. These gadgets that transmit data to the cloud, where it is evaluated and useful services are provided, are vulnerable to compromise or breach by malicious people looking to profit financially or harm the reputation of a targeted company or user (Rani & Chauhan et al., 2021).

Figure 1.

Internet of everything in admin area

979-8-3693-2069-3.ch025.f01

The Internet of Things (IoT), the Internet of Everything (IoE), and the Internet of Nano-Things (IoNT) are three cutting-edge approaches for integrating the Internet into a wider context of personal, professional, and social life as well as the impersonal world of almost sentient machines. This essay examines the pertinent literature to determine the current state of these technologies and their potential applications (Vishwakarma et al., 2021). The article also evaluates several prospective uses for these technologies in the future as Figure 2.

Figure 2.

Users and internets of things

979-8-3693-2069-3.ch025.f02

At the moment, there is no widely accepted architecture for the Internet of Things. Many academics have proposed a lot of architecture. A three-layer design is the most fundamental structure (Vishwakarma et al., 2021). It was first applied when this research first started. Its three layers are perception, network, and application as Figure 3.

Figure 3.

Layers of Internet of Things

979-8-3693-2069-3.ch025.f03
(Khang, 2021)
  • The Perception Layer: The physical layer, which has sensors for transmitting and receiving environmental data, is the perception layer. It can identify particular physical characteristics or find adjacent intelligent gadgets.

  • The Network Layer: Connecting servers, network devices, and smart objects is the responsibility of the network layer. Additionally, the transmission and processing of sensor data makes advantage of its capabilities.

  • The Application Layer: The application layer must provide the user with access to application-specific services. Smart homes, smart cities, and smart health are just a few of the Internet of Things applications discussed (Vrushank & Khang et al., 2023).

Complete Chapter List

Search this Book:
Reset