Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 5 of 5
  • Item
    Security issues and challenges in Healthcare Automated Devices
    (Institute of Electrical and Electronics Engineers Inc., 2020) Jangid, A.; Dubey, P.K.; Chandavarkar, B.R.
    Automated devices can be seen everywhere be at home, office, medical devices, Mobiles, etc. This paper presents some of the healthcare-related automated devices with their shortcomings related to security. We are addicted to automated devices and in near future, we will be watching new emergence of devices with the increasing power of automation devices and their security is a big concern as the credibility of a machine is questionable and it's related to automated devices and we are left with many challenges to resolve those security threats. This paper reviews the automation devices primarily in the healthcare field and their security-related issues along with the challenges that we might face in the future while using them. Some already available solutions are presented to try to come up with possible new solutions. © 2020 IEEE.
  • Item
    Hardcoded Credentials and Insecure Data Transfer in IoT: National and International Status
    (Institute of Electrical and Electronics Engineers Inc., 2020) Chandavarkar, B.R.
    Internet of Things (IoT) or Internet of Objects (IoO) is one of the emerging areas of accessing any device or object over the internet anytime, anywhere. The limited power, memory, and processing capabilities of these tiny devices result in many of the challenging issues such as connectivity, performance and scaling, mobility, interoperability/standards, security, and privacy. The essential requirement in the successful deployment of IoT is either a new way of addressing the issue or the lightweight solution of the existing approaches. This paper majorly focuses on the security aspects of IoT. Specifically, hardcoded or weak guessable credentials and insecure data transfer related security issues in IoT. Further, the national and international status of these two security issues followed by the mitigation approaches. Finally, the importance of the paper in the context of the current status of the Indian IoT market. © 2020 IEEE.
  • Item
    Essential Requirements of IoT’s Cryptographic Algorithms: Case Study
    (Springer Science and Business Media Deutschland GmbH info@springer-sbm.com, 2021) Kumar, S.; Lone, Z.A.; Chandavarkar, B.R.
    Internet of Things (IoT) devices are increasing rapidly in today’s world, but the security of devices remains a major concern due to the unavailability of the memory and processing power in these devices, which is because of their smaller size. The trade-off lies between security and performance, i.e. if security is increased, which will come with high complexity and hence would deter the performance. On the other hand, if performance has to be increased, it would come with a cost in terms of security. Also, IoT devices can be used as bots as they are globally accessible without much of a security. The most secure cryptographic algorithms use a lot of resources, and in case of IoT, resources are not available on that scale, so there is a need to design a secure algorithm (lightweight cryptography) that would use less resources and hence won’t affect the performance either. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
  • Item
    Data Processing in IoT, Sensor to Cloud: Survey
    (Institute of Electrical and Electronics Engineers Inc., 2021) Sandeep, M.; Chandavarkar, B.R.
    IoT is connecting Things over the Internet and the realization of the environment through smart things to create a responsive space. Many surveys predicted the growth of IoT devices is going to be around 50 billion and an average of 7 devices per person. IoT has shown promising future with its applications like smart city, connected factories, buildings, roadways, smart health and many more. To make the promise a reality IoT has to overcome many hurdles like scalability, connectivity, architectural, big data, analysis, security, and privacy. In this literature survey, an attempt has been made to identify current challenges faced by IoT implementation and possible solutions, future opportunities, and research openings. Further, the processing of sensed data at IoT device, edge/fog layer, and the cloud is discussed in detail. © 2021 IEEE.
  • Item
    Survey on Game Theory-Based Security Framework for IoT
    (Springer, 2023) Joshi, P.; Kamediya, S.; Kumar, R.; Chandavarkar, B.R.
    The large network of smart devices and the complexity of networks have made it almost impossible to make the data and communication between devices more secure. The number of cyber-attacks on these IoT devices has been steadily increasing. So here a survey on game theory model is presented, and the attackers are rational human beings, so they try to harm the system to their best of ability and so their moves can be predicted which can be used by the defenders with some game theory concepts to take proper security decisions and make an efficient security framework. This chapter is a survey on game theory-based security frameworks and explores and evaluates different types of threats, security requirements and constraints related to IoT, how Game Theory can be used in field of IoT, along with the game theory models used is to develop security frameworks for IoT. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.