The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed of smart ubiquitous objects that are seamlessly connected to the Internet. These objects are often deployed in open environments to provide innovative services in various application domains such as smart cities, smart health, and smart communities. These IoT devices produce a massive amount of confidentiality and security-sensitive data. Thus, security of these devices is very important in order to ensure the safety and effectiveness of the system. In this paper, a decentralized authentication and access control mechanism is proposed for lightweight IoT devices and is applicable to a large number of scenarios. The mechanism is based on the technology of the fog computing and the concept of the public blockchain. The results gained from the experiments demonstrate a superior performance of the proposed mechanism when compared to a state-of-the-art blockchainbased authentication technique.
Due to the advancement in technologies and excessive usability of smartphones in various domains (e.g., mobile banking), smartphones became more prone to malicious attacks.Typing on the soft keyboard of a smartphone produces different vibrations, which can be abused to recognize the keys being pressed, hence, facilitating side-channel attacks. In this work, we develop and evaluate AlphaLogger -an Android-based application that infers the alphabet keys being typed on a soft keyboard. AlphaLogger runs in the background and collects data at a frequency of 10Hz/sec from the smartphone hardware sensors (accelerometer, gyroscope and magnetometer ) to accurately infer the keystrokes being typed on the soft keyboard of all other applications running in the foreground. We show a performance analysis of the different combinations of sensors. A thorough evaluation demonstrates that keystrokes can be inferred with an accuracy of 90.2% using accelerometer, gyroscope, and magnetometer.
The Internet of Things (IoT) devices gather a plethora of data by sensing and monitoring the surrounding environment. Transmission of collected data from the IoT devices to the cloud through relay nodes is one of the many challenges that arise from IoT systems. Fault tolerance, security, energy consumption, and load balancing are all examples of issues revolving around data transmissions. This paper focuses on energy consumption, where a priority-based and energyefficient routing (PriNergy) method is proposed. The method is based on the Routing Protocol for Low-Power and Lossy Networks (RPL) model, which determines routing through contents. Each network slot uses timing patterns when sending data to the destination, while considering network traffic, audio and image data. This technique increases the robustness of the routing protocol and ultimately prevents congestion. Experimental results demonstrate that the proposed PriNergy method reduces overhead on the mesh, end-to-end delay, and energy consumption. Moreover, it outperforms one of the most successful routing methods in an IoT environment, namely, the Quality of Service RPL (QRPL).
The version presented here may differ from the published version or from the version of the record. Please see the repository URL above for details on accessing the published version and note that access may require a subscription.
The version presented here may differ from the published version or from the version of the record. Please see the repository URL above for details on accessing the published version and note that access may require a subscription.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.