Secure Computing on the Internet of Everything
Subject Areas : GeneralSeyed Omid Azarkasb 1 , Seyed Hossein Khasteh 2
1 - Visiting professor and PhD student in Computer Engineering, Artificial Intelligence and Robotics, Khajeh Nasiruddin Toosi University of Technology, Tehran, Iran
2 - Doctorate in computer engineering with artificial intelligence, assistant professor and faculty member of Khajeh Nasiruddin Tousi University of Technology, Tehran, Iran
Abstract :
With the advancement of technology and the remarkable growth of the Internet of Things (IoT), the need for secure computing in this domain has increased. The Internet of Everything enables the connection and communication among objects, data, processes, and individuals, including systems, smart devices, industrial systems, and many others. With the immense number of connected objects, information security, and privacy have become significant challenges in IoT computing. This article explores the concept of secure computing in the Internet of Everything. It investigates the impact of the Internet of Things on the concept of security and its related needs. Furthermore, the methods and technologies used to establish secure computing in the Internet of Everything are discussed, including topics such as data encryption, identification and authentication, access management, privacy protection, and threat detection. Additionally, the challenges and drawbacks of secure computing in the Internet of Everything are examined, addressing issues such as the complexity of the connected environment, dynamic security threats, the need for standards and security-related concerns, and the influence of technological changes on secure computing. Finally, solutions and recommendations are provided to enhance secure computing in the Internet of Everything, including the use of strong encryption, centralized access management, user education and awareness, and advanced threat detection and monitoring systems. This article aims to provide a better understanding of secure computing in the Internet of Everything and to develop suitable security solutions for this domain.
[1] j. Macaulay, L. Buckalew, G. Chung, “Internet of Everything in Logistics”, a collaborative report by DHL and Cisco on implications and use cases for the logistics industry, 2015.
[2] M. Sergey, S. Nikolay, E.sergery, “Cyber Security Concept for Internet of Everything (IoE)”, IEEE Systems of Signal Synchronization, Generating and Processing in Telecommunications, Kazan, Russia, 2017.
[3] OpenLearn, “What is the IoE?”, Free learning from The Open University, https://www.open.edu/openlearn/mod/oucontent/view.php?id=48444&printable=1, 2023.
[4] A. Majeed, R. Bhana, A. Ui, M.L. Williams, “Devising a Secure Architecture of Internet of Everything (IoE) to Avoid the Data Exploitation in Cross Culture Communications”, International Journal of Advanced Computer Science and Applications, Vol. 7, No. 6, pp. 328- 332, 2016.
[5] CompTIA, “Sizing Up the Internet of Things”, Research Report,https://connect.comptia.org/content/research/sizing-up-the-internet-of-things, 2015.
[6] J. Bradley, J. Barbier, D. Handler, “Embracing the Internet of Everything To Capture Your Share of $14.4 Trillion”, Cisco White Paper, 2013.
[7] j. Bradley, L. Buckalew, J. Loucks, J. Macaulay, “Internet of Everything in the Public Sector: Generating Value in an Era of Change Top 10 Insights”, Cisco report, 2014.
[8] R. Buyya, A.V. Dastjerdi, “Internet of Things Principles and Paradigms”, Morgan Kaufmann is an imprint of Elsevier, ISBN: 9780128053959, 2016.
[9] D.J. Langleya, J.V. Doorn, I.C.L. Ng, S. Stieglitz, A. Lazovik, A. Boonstra, “The Internet of Everything: Smart Things and Their Impact on Business Models”, ElSEVIER, Journal of Business Research, Vol. 122, pp. 853-863, 2021.
[10] A.A. Hamza, I.T. Abdel-Halim, M.A.Sobh, A.M. Bahaa-Eldin, “A Survey and Taxonomy of Program Analysis for IoT Platforms”, ELSEVIER, Ain Shams Engineering Journal, Vol. 12, No. 4, 2021.
[11] Gartner, “Internet of Things (IoT) - Key Business Insights”, https://www.gartner.com/en/information-technology/insights/internet-of-things, 2022.
[12] S. Agarwal, S. Markkar, D-T. Tran, “Privacy Vulnerabilities and Data Security Challenges in the IoT”, 1st Edition by CRC Press, 234 pages, 47 B/W Illustrations, 2021.
[13] S.O. Azarkasb, S.H. Khasteh, “Advancing Intrusion Detection in Fog Computing: Unveiling the Power of Support Vector Machines for Robust Protection of Fog Nodes against XSS and SQL Injection Attacks”, Journal of Engineering Research and Reports, Vol. 25, No. 3, pp. 59-84, 2023.
[14] H. Rajashree R, Sundarakantham K, Sivasankar E, M. Shalinie S, “A Hybrid Deep Learning Framework for Privacy Preservation in Edge Computing”, ELSEVIER, Computer & Security, Vol. 129, 2023.
[15] S.O. Azarkasb, M. Amiri, S.H. Khasteh, “Unsupervised Fuzzy-Multi-Core Aspect Sentiment Analysis for Big Data of Online News Users' Persian Opinions”, Asian Journal of Research in Computer Science, Vol. 16, No. 3, pp. 50-64, 2023.
[16] C.L. Stergiou, E. Bompoli, K.E. Psannis, “Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario”, Applied Sciences, MDPI, Vol. 13, No.2, 2023.
[17] L. Lantz, D. Cawrey, “Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications”, O'Reilly Media, Book, ISBN: 9781492054702, 281 Pages, 2022.
[18] E. Osmanoglu, “Identity and Access Management: Business Performance through Connected Intelligence”, Syngress, Book, ISBN: 9780124104334, 648 Pages, 2013.
[19] M. Bazzell, “Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information”, CCI Publishing, Book, ISBN: 9781494275358, 402 Pages, 2014.
[20] A.Gohar, G. Nencioni, “The Role of 5G Technologies in a Smart City: The Case for Intelligent Transportation System”, Sustainability, MDPI, 24 Pages, 2021.
[21] M. Kranz, “Building the Internet of Things: Implement New Business Models, Disrupt Competitors, Transform Your Industry”, WILEY, Book, ISBN: 9781119285663, 272 Pages, 2016.
[22] Pandey, A., “IoT Platforms”, Published in BlogsCord, 2020.
[23] M.H. Miraz, M. Ali, P.S. Excell, R. Picking, “Internet of Nano-Things, Things and Everything: Future Growth Trends”, Future Internet, Vol.10, No.8, 2018.
[24] Farooq, M.U, M. Wassem, A. Khairi, P.S. Mazhar, “A Critical Analysis on the Security Concerns of Internet of Things (IoT)”, International Journal of Computer Applications, Vol. 111, No.7, pp.1-6, 2015.
[25] R. Roman, P. Najera, J. Lopez, “Securing the Internet of Things”, IEEE Computer, Vol. 44, No. 9. pp. 51-58, 2011.
[26] S.O. Azarkasb, S. Sedighian kasha, S.O. Khasteh, “A Network Intrusion Detection Approach at the Edge of Fog”, IEEE 26th International Computer Conference, Computer Society of Iran, 2021.
[27] R. Mahmoud, T. Yousuf, F. Aloul, I. Zualkernan, “Internet of things (IoT) security: Current Status, Challenges and Prospective Measures”, IEEE 10th International Conference for Internet Technology and Secured Transactions, London, UK, 2015.
[28] A. Khan, K. Salah, “IoT Security: Review, Blockchain Solutions, and Open Challenges”, ELSEVIER, Future Generation Computer Systems, Vol. 82, pp. 395411, 2017.
[29] I. Yaqoob, E. Ahmed, M.H.U. Rehman, A.I.A. Ahmed, “The Rise of Ransomware and Emerging Security Challenges in the Internet of Things”, ELSEVIER, Computer Networks, Vol. 129, pp. 444-458, 2017.
[30] Moganedi, S, J. Mtsweni, “Beyond the Convenience of the Internet of Things: Security and Privacy Concerns”, IEEE IST-Africa Week Conference, Windhoek, Namibia, 2017.
[31] A. Oulasvirta, T. Rattenbury, L. Ma, E. Raita, “Habits Make Smartphone Use More Pervasive”, Personal and Ubiquitous Computing, Vol. 16, pp. 105-114, 2012.
[32] World Economic Forum, “The Global Risks Report 2023”, 18th Edition, INSIGHTREPOR, 98 Pages, https://www.weforum.org/reports/global-risks-report-2023/, 2023.
[33] S. Zuboff, “The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power”, New York, Public Affairs, ISBN: 9781610395694, 704 Pages, 2019.