The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive growth and integration of IoT in different domains and areas of our daily lives has created an Internet of Vulnerabilities (IoV). In the rush to build and implement IoT devices, security and privacy have not been adequately addressed. IoT devices, many of which are highly constrained, are vulnerable to cyber attacks, which threaten the security and privacy of users and systems. This survey provides a comprehensive overview of IoT in regard to areas of application, security architecture frameworks, recent security and privacy issues in IoT, as well as a review of recent similar studies on IoT security and privacy. In addition, the paper presents a comprehensive taxonomy of attacks on IoT based on the three-layer architecture model; perception, network, and application layers, as well as a suggestion of the impact of these attacks on CIA objectives in representative devices, are presented. Moreover, the study proposes mitigations and countermeasures, taking a multi-faceted approach rather than a per layer approach. Open research areas are also covered to provide researchers with the most recent research urgent questions in regard to securing IoT ecosystem.
To enhance the Quality of service (QoS) communications over mobile ad hoc networks (MANETs), this paper proposes QoS-Aware Multipath Routing Protocol (QMRP). Delay is the most crucial factor for multimedia applications which can be minimized by providing more than one path between source-destination pair as well as choosing the path based on the quality in terms of reliability and stability of the link. To the best of our knowledge no one before included projected load; load introduced by the node requesting a path to a destination into the delay computation for a path between source-destination pair as well as maintaining loop freedom through the neighbor hop list of the source. The originality of the proposed protocol comes from the fact that it introduces this new parameter into route quality computation which makes QMRP unlike its precursors providing more accurate measure of the realistic delay as well as maintaining loop freedom of multiple node disjoint paths using neighbor hop list. Cross layer communications between physical (PHY), MAC and routing layers interact to achieve QoS against the network and channel dynamics by minimizing delay and choosing more reliable and stable paths without requiring any additional resources. Performance evaluation of the proposed protocol against a single path AODV routing protocol using OPNET has been conducted. Results show that QMRP outperforms AODV in terms of E2E delay, packet delivery fraction (PDF) and route discovery frequency. However, routing overhead for QMRP is more than that of AODV due to the discovery of more one path in each route discovery process.
This paper proposes a novel multipath routing protocol for MANETs. The proposed protocol is a variant of the single path AODV routing protocol. The proposed multipath routing protocol establishes nodedisjoint paths that have the lowest delays based on the interaction of many factors from different layers. Other delay aware MANETs routing protocols don't consider the projected contribution of the source node that is requesting a path into the total network load. The implication is that end to end delay obtained through the RREQ is not accurate any more. On the contrary of its predecessors, the proposed protocol takes into consideration the projected contribution of the source node into the computation of end to end delay. To obtain an accurate estimate of path delay, the proposed multipath routing protocol employs cross-layer communications across three layers; PHY, MAC and Routing layers to achieve link and channel-awareness and creates an update packet to keep the up to date status of the paths in terms of lowest delay. The performance of the proposed protocol investigated and compared against the single path AODV and multipath AOMDV protocols through simulation using OPNET. Results have shown that our multipath routing protocol outperforms both protocols in terms of average throughput, end to end delay and packet dropped.
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture, breaking the simplicity of the typical client–server model, or fundamental restructuring of the Internet ecosystem; (ii) significant inflation of responsibilities or duties for the user and/or server operator; and (iii) adding increased risks surrounding sensitive data during the authentication process. Many schemes seek to prevent brute-forcing attacks; they often ignore either partially or holistically the dangers of other cyber-attacks such as MiTM or replay attacks. Therefore, there is no incentive to implement such proposals, and it has become the norm instead to inflate current username/password authentication systems. These have remained standard within client–server authentication paradigms, despite insecurities stemming from poor user and server operator practices, and vulnerabilities to interception and masquerades. Besides these vulnerabilities, systems which revolve around secure authentication typically present exploits of two categories; either pitfalls which allow MiTM or replay attacks due to transmitting data for authentication constantly, or the storage of sensitive information leading to highly specific methods of data storage or facilitation, increasing chances of human error. This paper proposes a more secure method of authentication that retains the current structure of accepted paradigms, but minimizes vulnerabilities which result from the process, and does not inflate responsibilities for users or server operators. The proposed scheme uses a hybrid, layered encryption technique alongside a two-part verification process, and provides dynamic protection against interception-based cyber-attacks such as replay or MiTM attacks, without creating additional vulnerabilities for other attacks such as bruteforcing. Results show the proposed mechanism outperforms not only standardized methods, but also other schemes in terms of deployability, exploit resilience, and speed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.