Computer
Mohanad A. Mohammed; Hala B. Abdul Wahab
Abstract
decentralization within IoT eliminates the need to use distributed networks within IoT to communicate only with servers that may face difficulties related to the internet, vulnerabilities, DDOS, or hijacks, merging blockchain with IoT converted the IoT system into a decentralized with many benefits and ...
Read More ...
decentralization within IoT eliminates the need to use distributed networks within IoT to communicate only with servers that may face difficulties related to the internet, vulnerabilities, DDOS, or hijacks, merging blockchain with IoT converted the IoT system into a decentralized with many benefits and outcomes from this conversion. An encryption scheme homomorphic technique (HE) is a method that encrypts the cipher data without the need to decrypt it,paillier encryption method is used. This paper aims to propose a system that integrates Paillier cryptosystem homomorphic technology with IoT and lightweight blockchain technology to provide decentralization to the IoT environment and improve security. The proposed system results in improving the IoT device’s work environment by solving the main challenges of security using blockchain, privacy using homomorphism, and data volume using blockchain. The data set used to implement and evaluate the proposed system is industrial internet of things data The dataset used in this paper is generated via machine industry 4.0 Storage System status which represents the system failure and work status. this system is evaluated using standard metrics used to evaluate the blockchain effectiveness and time, resources consumed and shows better results in time and power consumption.
Shaymaa M. Naser; Yossra Hussain Ali
Abstract
In recent two years, information systems have been adopted in most fields oflife due to the health state around the world. At the same time, the risk factor ofsecurity attacks is increased sharply as well. These attacks consider different actionstoward damaging the data of systems or even making down ...
Read More ...
In recent two years, information systems have been adopted in most fields oflife due to the health state around the world. At the same time, the risk factor ofsecurity attacks is increased sharply as well. These attacks consider different actionstoward damaging the data of systems or even making down their work. In this paper, astudy of cyber-threats (attacks) on Wireless Sensor Network (WSN) is presented. Thisstudy illustrates the effects of the cyber-threats on the WSN according to the networklayers, as well as their privacy concerns. The outcome of this study is the classificationof these attacks that can lead to produce cyber-security systems which can preventthem from damaging the involved information systems.
Sarah Ammar Rafea; Abdulkareem Abdulrahman Kadhim
Volume 19, Issue 1 , January 2019, , Page 71-81
Abstract
Internet of Things (IoT) enables things to have connectivity throughthe internet. The number of things is growing fast and has to be uniquelyidentified through the Internet to communicate with other things. In WirelessSensor Networks (WSNs) each node can be considered as a thing. WSN noderesources are ...
Read More ...
Internet of Things (IoT) enables things to have connectivity throughthe internet. The number of things is growing fast and has to be uniquelyidentified through the Internet to communicate with other things. In WirelessSensor Networks (WSNs) each node can be considered as a thing. WSN noderesources are very limited due to the need to communicate using low power andusually through unreliable links. Such limitations need an energy efficientrouting protocol. WSN is considered as a type of Low power and LossyNetwork (LLN). The routing protocol for low power and lossy network (RPL)is being adopted for LLN and has been standardized to enable connectivity ofWSN over IoT. RPL constricted a topology similar to tree topology. Nodes inRPL optimized its path using an objective function (OF). OF depends ondifferent node/link metrics in the optimization process. In this paper, an EnergyThreshold RPL (ETRPL) protocol is proposed. ETRPL depends on a newobjective function to enhance energy consumption of RPL protocol by takinginto account the remaining energy of the preferred parent node. ETRPL isimplemented using Cooja simulator. The results show that ETRPL provides anincrease in the remaining energy of at least 87.4% for a small area with highnumber of nodes. ETRPL also performed better with regards to Time Delay,Packet Reception Ratio, and the number of dead nodes in a small area. For alarge area, the performance is not encouraging. Thus the proposed ETRPLprotocol is useful for IoT networks with relatively small areas.