Handbook of Big Data and IoT Security (2024)

Related Papers

IEEE Communications Surveys & Tutorials

A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues

Spyros Panagiotakis

View PDF

Future Generation Computer Systems

Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges

ahsan kazmi

View PDF

Journal of Computer Security

A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement

Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data pr...

View PDF

Rasel Ahmed

Secured Communication Using Advanced Digital Forensic IoT

2021 •

Rasel Ahmed

The internet of things (IoT) brings the power of the internet, data processing, and analytics to the physical world. Consumers will be able to communicate with the global information network without the use of a keyboard or screen; many of their daily objects and equipment will be able to take instructions from the network with minimal human interference.Due to the widespread applicability of the Internet of Things (IoT), it is critical that IoT designers and architects provide ensuring protection of communication in IoT as a key requirement. Communication in IoT is a new field of study concerned with ensuring safe coordination between smart sensors, actuators, and computers, as well as the external world, which makes up the IoT's overarching arena.IoT architecture must provide several features such as scalability, reliability, usability, availability, and flexibility so that applications that support both public and private entities can be developed. A precise specification of security criteria, as well as various security measures that must be implemented, will be critical to the IoT's success.This paper uses an innovative digital forensic technique for security enhancement to provide an overview of security and privacy aspects of IoT communications. In the investigation of IoT security violations, the researchers face a variety of obstacles. The difficulties are amplified by the fact that cloud service providers use advanced strategies such as virtualization and a multi-tenant usage model to efficiently assign resources to users.The proposed technique, which uses an innovative digital forensic approach, outlines an improved, accessible, and accurate method for determining the source of the crime and collecting evidence related to a security breach during contact.

View PDF

(IoT) Forensics Challenges, Approaches and Open Issues

shweta tripathi

View PDF

International Journal of Engineering Research and Technology (IJERT)

IJERT-Internet of Things (IoT) Applications and Security Challenges: A Review

2019 •

IJERT Journal

An evolving topic in today's era is Data Mining and Knowledge Discovery. Data mining and knowledge discovery in databases is attracting a lot of researchers, industry persons, academicians. Why this area is so emerging? This article provides an overview of this emerging field, gives an overview that how data mining and knowledge discovery in databases are related to each other and also to other related fields, such as machine learning, statistics, and databases. The article also mentions particular real-world applications, specific data-mining techniques, challenges involved in real-world applications of knowledge discovery, and current and future research directions in the field

View PDF

International Journal of Digital Crime and Forensics

The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics

Farkhund Iqbal

The Internet of Things (IoT) represents the seamless merging of the real and digital world, with new devices created that store and pass around data. Processing large quantities of IoT data will proportionately increase workloads of data centres, leaving providers with new security, capacity, and analytics challenges. Handling this data conveniently is a critical challenge, as the overall application performance is highly dependent on the properties of the data management service. This article explores the challenges posed by cybercrime investigations and digital forensics concerning the shifting landscape of crime – the IoT and the evident investigative complexity – moving to the Internet of Anything (IoA)/Internet of Everything (IoE) era. IoT forensics requires a multi-faceted approach where evidence may be collected from a variety of sources such as sensor devices, communication devices, fridges, cars and drones, to smart swarms and intelligent buildings.

View PDF

Mobile Networks and Applications

Editorial: Securing Internet of Things Through Big Data Analytics

fazl ullah

View PDF

Dfim: A New Digital Forensics Investigation Model for Internet of Things

2020 •

Dr.mohammad Qatawneh

The Internet of Things (IoT) smart devices have been used widely in several applications such as healthcare, education, environment, transportation, smart city, etc. These objects are resource-constrained devices which involve lacks regarding security and may lead to cyber-crime. Therefore, the IoT devices may contain evidence that are considered as an important need to investigators and can be admitted in courts. To tackle this problem most current research focuses on security issues for different IoT architectures rather than approaches and techniques of forensic acquisition and analysis for IoT objects. In this paper, we propose a new Digital Forensics Investigation Model for IoT (DFIM). The DFIM has two main components: The Data Provider Zone (DPZ) which responsible for grouping all data gathered by sensor nodes into a set of groups, where each group contains data or documents related to each other, and the investigation authority which receives the requests from the claimers fo...

View PDF

Electronics

Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework

Habib Hamam

The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework inc...

View PDF
Handbook of Big Data and IoT Security (2024)

FAQs

What are the 3 major factors affecting IoT security? ›

What are the 3 major factors affecting IoT security? IoT security is affected by the cost, changes throughout its evolution and scope of the safety measures taken. All three are major considerations.

What are the top 5 security concerns about IoT? ›

The top five threats to your data security caused by IoT devices
  • Uncontrolled data collection. IoT devices collect a lot of data, sometimes without your permission. ...
  • Unsecured devices. ...
  • Inadequate security policies. ...
  • Lack of IoT security awareness. ...
  • Privacy issues.
Jun 17, 2024

What are the three types of IoT security? ›

The three types oF IoT security include:
  • Network Security: Users need to protect their devices against unauthorized access and potential exploitation. ...
  • Embedded: Nano agents provide on-device security for IoT devices. ...
  • Firmware Assessment: Firmware security starts with assessing the firmware of a protected IoT device.

What are the security threats of big data in IoT? ›

One of the most significant IoT security issues is malware risks. Malware can infiltrate an IoT network and infect multiple devices, making it easier for hackers to steal sensitive data or even take control of the connected devices themselves.

What is the weakest point in IoT security? ›

One of the greatest threats to IoT security is the lack of encryption on regular transmissions. Many IoT devices don't encrypt the data they send, which means if someone penetrates the network, they can intercept credentials and other important information transmitted to and from the device.

Why is IoT security difficult? ›

Some common security challenges for IoT devices include: Weak Authentication: IoT devices are notorious for their use of weak and default passwords. Several large botnets, such as Mirai, infected many devices simply by logging in using default and hardcoded passwords.

What are the biggest IoT security attacks? ›

5 Cyber Attacks Caused by IoT Security Vulnerabilities
  • Mirai Botnet and DDoS Attacks. ...
  • Smart Home Invasion. ...
  • Medical IoT Devices and Patient Safety. ...
  • Automotive Cybersecurity Concerns. ...
  • Industrial IoT (IIoT) Sabotage. ...
  • GCA's Role in Mitigating IoT Risks.
Jan 2, 2024

What are the most risky IoT devices? ›

What are the connected devices with the highest risk profile in 2023?
ITIoT
1ComputerNetwork attached storage (NAS)
2ServerPrinter
3RouterIP camera
4VPN gatewayOut-of-band management (OOBM)
1 more row
Sep 1, 2023

What is the most prolific threat from IoT devices? ›

Top 5 IoT Cyber Threats Organizations Must be Aware of
  1. Industrial Espionage and Eavesdropping. Espionage and eavesdropping are two significant IoT cyber threats that can compromise the confidentiality of sensitive information. ...
  2. Ransomware Attacks. ...
  3. Shadow IoT. ...
  4. Botnet Attacks. ...
  5. Lack of IoT Security Awareness.
May 16, 2023

What is IoT security in simple words? ›

Internet of Things (IoT) devices are computerized Internet-connected objects, such as networked security cameras, smart refrigerators, and WiFi-capable automobiles. IoT security is the process of securing these devices and ensuring they do not introduce threats into a network.

What are three best practices when deploying IoT security? ›

Best practices for IoT security include:
  • IoT endpoint protection. A critical step to securing IoT devices is hardening them through IoT endpoint protection. ...
  • IoT gateway security. ...
  • Securing cloud API. ...
  • Developing a secure network. ...
  • Up-to-date data encryption. ...
  • Protected data storage.

What are the three pillars of IoT? ›

4 Pillars of Internet of Things (IoT)
  • Device. The Internet of Things (IoT), is a technology that links gadgets to the internet so they may share and exchange data. ...
  • Data. The prior aim of IoT is to collect & store data. ...
  • Analytics. ...
  • Connectivity.
May 16, 2023

What are the best practices to secure big data? ›

Here are ten security best practices businesses can implement to secure big data.
  • Encryption. ...
  • Effective user access control. ...
  • Monitoring cloud security. ...
  • Network traffic analysis. ...
  • Vulnerability management. ...
  • Employee training and awareness. ...
  • Insider threat detection. ...
  • Prompt incident response plan.

How is big data used in IoT? ›

Predictive Analytics: Big data methodologies may be used to foresee security risks and weaknesses in IoT systems. Potential security vulnerabilities may be recognized proactively by analyzing previous data and utilizing machine learning algorithms, enabling the implementation of preventive measures.

How is big data used in security? ›

Big data in cyber security such as Sangfor Endpoint Secure can help identify zero-day attacks , insider attacks, and various malware within the system before any damage can be done. Examples of this include network monitoring, cloud security, endpoint security, threat detection, and more.

What are the 3 main issues with IoT enabled devices? ›

3 Key Challenges in Internet of Things (IoT)
  • Data Security. Using devices or sensors to track the physical world of the Internet of Things (IoT) opens many opportunities for businesses, but it also brings new challenges. ...
  • Network Connectivity. ...
  • Integration. ...
  • Protecting an IoT Ecosystem.

What are the three 3 main components of IoT? ›

(a) Basic three elements of IoT: power-constrained hardware sensors or devices to sense and acquire the data, a middleware to process, analyze, and transmit the desired data, and application which visualizes the processed data and results.

What are the 3 aspects of security in network security? ›

The CIA Triad—Confidentiality, Integrity, and Availability—is a guiding model in information security. A comprehensive information security strategy includes policies and security controls that minimize threats to these three crucial components.

What are the three 3 aspects of information security? ›

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Geoffrey Lueilwitz

Last Updated:

Views: 5973

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Geoffrey Lueilwitz

Birthday: 1997-03-23

Address: 74183 Thomas Course, Port Micheal, OK 55446-1529

Phone: +13408645881558

Job: Global Representative

Hobby: Sailing, Vehicle restoration, Rowing, Ghost hunting, Scrapbooking, Rugby, Board sports

Introduction: My name is Geoffrey Lueilwitz, I am a zealous, encouraging, sparkling, enchanting, graceful, faithful, nice person who loves writing and wants to share my knowledge and understanding with you.