<p>World Health Organization declared
COVID-19 as a pandemic after the breakout in the city of Wuhan, China. The
disease has negatively affected the global economy and daily life. Most of the
countries around the world have imposed travel restrictions, locked down, and
social distancing measures. In the current situation, Information and
Communications Technology is playing a significant role in connecting people.
Majority of the education organizations have adopted online platforms, students
and staff are working from home. Besides, these businesses, e-healthcare
systems, food deliveries, and online grocery shopping have witnessed a very
high demand. Malicious attackers have considered COVID-19 as an opportunity to
launch attacks for financial gains and to promote their evil intents.
Healthcare systems are being attacked with ransomware and resources such as
patient's records confidentiality, and integrity is being compromised. People
are falling prey to phishing attacks through COVID-19 related content. In this
research, we have identified the top ten cybersecurity threats that had and
could take place during the pandemic. We have also discussed the privacy
concerns raised amid COVID-19. <i></i></p>
<p>World Health Organization declared
COVID-19 as a pandemic after the breakout in the city of Wuhan, China. The
disease has negatively affected the global economy and daily life. Most of the
countries around the world have imposed travel restrictions, locked down, and
social distancing measures. In the current situation, Information and
Communications Technology is playing a significant role in connecting people.
Majority of the education organizations have adopted online platforms, students
and staff are working from home. Besides, these businesses, e-healthcare
systems, food deliveries, and online grocery shopping have witnessed a very
high demand. Malicious attackers have considered COVID-19 as an opportunity to
launch attacks for financial gains and to promote their evil intents.
Healthcare systems are being attacked with ransomware and resources such as
patient's records confidentiality, and integrity is being compromised. People
are falling prey to phishing attacks through COVID-19 related content. In this
research, we have identified the top ten cybersecurity threats that had and
could take place during the pandemic. We have also discussed the privacy
concerns raised amid COVID-19. <i></i></p>
The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a significant challenge for securing IoT applications. This necessitates a robust and lightweight security architecture and schemes as the existing traditional Internet security architecture and protocols require huge resources and lack of end-to-end security mechanism. In this research, a resource efficient end-to-end security scheme has been proposed by offloading computations and storage of security parameters to fog nodes in the vicinity. In addition, a symmetric-key payload encryption has been used to minimize the overhead of message communication in the resource-contested IoT environment. The analysis shows that the proposed scheme outperforms Transport Layer Security (TLS) in resource usage while it maintains equivalent authenticated end-to-end communication between communicating IoT nodes. The proposed end-to-end security scheme saves more communication bandwidth and incurs less overhead as compared to existing TLS-based security schemes. In particular, the proposed system uses less number of handshakes and achieves a decrease in the number of transmitted messages (approximately 184 bytes as compared to compared TSL message size of 332 bytes) for every handshake. Further, it has been demonstrated through experiments that the proposed security method incurs less overheads as compared to the TLS bandwidth consumption considering a single connection session during message subscription.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.