Abstract
The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.
Reference21 articles.
1. Rath M, Pattanayak BK. Technological Improvement in Modern Health Care Applications Using Internet of Things (IoT) and Proposal of Novel Health Care Approach. International Journal of Human Rights in Healthcare 2019; 12(2): 148-162.
2. Ramlowat DD, Pattanayak BK. (2019). Exploring the Internet of Things (IoT) in Education: A Review. In: Satapathy S, Bhateja V, Somanah R, Yang XS, Senkerik R. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 863. Springer, Singapore.
3. Internet Source: What Is IoT Cybersecurity?. Downers Grove, Illinois, US. Available from: https://www.comptia.org/content/articles/what-is-iot-cybersecurity
4. Teoh TT, Nguwi YY, Elovici Y, Cheung NM, Ng WL. Analyst Intuition Based Hidden Markov Model On High Speed. Temporal Cyber Security Big Data, Proceedings of the 13th International Conference on Neural Computation, Fuzzy Systems and Knowledge Discovery; Guilin, China, 2017; pp.2080-2082.
5. Onwubiko C, Quazzane K. Cyber Onboarding is ‘Broken’. Proceedings of the 2019 IEEE International Conference on Cyber Security and Protection of Digital Services; Oxford, UK ,2019; pp.1-13.