In the last decade, the Internet of Things (IoT) has become a new technology that aims to facilitate life and help people in all aspects of their lives. This technology is used for smart homes, smart grid stations, smart agriculture, health systems, transport services, smart cities, etc. The number of sensors and IoT devices along with applications is used for monitoring the health condition of patients. These devices will monitor the movement of targeted patients at home or out of their homes. Based on their behavior and movement, the treatment will be provided to Alzheimer’s patients. The data will be collected from multiple sensors installed at patient’s homes and smartwatches for checking their blood pressure level and temperature, which is too important in the current Corona Virus Disease (COVID-19) pandemic for these types of patients. On the other hand, due to the diminishing mobility of people around the world, increasing environmental pollution and stress which is caused by modern machine life and various brain and neurological diseases including Alzheimer’s, Parkinson, etc. are widespread among people all over the world. The different types of communication protocols such as Message Queue Telemetry Transport (MQTT) and WebSocket (with authentication and autoclosing of connection) for sensors and the smartwatch have been used. The secure backend admin panel is used for tracing the location of doctors, patients, and ambulance. These protocols are implemented with security to protect the privacy of patients also.
As the SQL injection attack is still at the top of the list at Open Web Application Security Project (OWASP) for more than one decade, this type of attack created too many types of issues for a web application, sensors, or any similar type of applications, such as leakage of user private data and organization intellectual property, or may cause Distributed Denial of Service (DDoS) attacks. This paper focused on the poor coding or invalidated input field which is a big cause of services unavailability for web applications. Secondly, it focused on the selection of program created issues for the WebSocket connections between sensors and the webserver. The number of users is growing to use web applications and mobile apps. These web applications or mobile apps are used for different purposes such as tracking vehicles, banking services, online stores for shopping, taxi booking, logistics, education, monitoring user activities, collecting data, or sending any instructions to sensors, and social websites. Web applications are easy to develop with less time and at a low cost. Due to that, business community or individual service provider’s first choice is to have a website and mobile app. So everyone is trying to provide 24/7 services to its users without any downtime. But there are some critical issues of web application design and development. These problems are leading to too many security loopholes for web servers, web applications, and its user’s privacy. Because of poor coding and validation of input fields, these web applications are vulnerable to SQL Injection and other security problems. Instead of using the latest third-party frameworks, language for website development, and version database server, another factor to disturb the services of a web server may be the socket programming for sensors at the production level. These sensors are installed in vehicles to track or use them for booking mobile apps.
The usage of the internet of things (IoT) devices is growing for the ease of life. From smart homes to smart cars, from smart transportation to smart cities, from smart hospitals to smart highways, these IoT devices send and receive highly sensitive data regarding the privacy of users or other information regarding the movement of users from one location to another location. The timing traces users when present at home and out of the home. But how does one secure this information from the attacker? There is a need for IoT devices security. As there are three layers of IoT devices—the application layer, network layer, and perception layer—three layers to be secure. IoT devices are heterogeneous and constrain energy consumption. The proposed solution in this chapter is three-way authentication of IoT devices by generating tokens from the device serial number and from the few configuration devices at the network layer. For high availability of IoT device services, the protection against distributed denial of service attack is implemented at the network layer.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.