Skip to main content

Security Enhancement in IoT with an Application of Water Monitoring

  • Conference paper
  • First Online:
Inventive Computation and Information Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 563))

  • 428 Accesses

Abstract

In recent years, numerous innovations have been observed in IOT-based process management systems. There are smart management technologies and architecture available that enable the user to fetch real-time data from remote areas and display/log them accordingly. The controller, cloud, and database usually used in this architecture is of original equipment manufacturer (OEM) IOT system or a third-party service provider. Thus, it will expose your data to unauthorized entities. In this project, we will explain security measures that can be taken to create a secure IOT architecture that will ensure the safety of user data and give assurity to the user that the data is not accessed without their consent. As a proof of concept, we will develop an Internet-based water flow monitoring system that will avoid water theft and will enable users to access data and create statistical inferences.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fotiou N, Kotsonis T, Marias GF, Polyzos GC (2016) Access control for internet of things. In: 2016 international workshop on secure internet of things (SIoT)

    Google Scholar 

  2. Rehman A, Khan IU, Rehman SU, Moiz M (2016) Security and privacy issues in IoT. Int J Commun Netw Inform Secur (IJCNIS)

    Google Scholar 

  3. Pooja Yadav E, Ankur Mittal E, Yadav H (2018) IoT: challenges and issues in Indian perspective. In: 2018 3rd international conference on internet of things: smart innovation and usages (IoT-SIU), 23–24 Feb 2018

    Google Scholar 

  4. Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6(5)

    Google Scholar 

  5. Atamli AW, Martin A (2014) Threat-based security analysis for the internet of things. In: 2014 international workshop on secure internet of things, 10–10 Sept 2014

    Google Scholar 

  6. Dikii D (2020) Authentication algorithm for internet of things networks based on MQTT protocol. Serb J Electr Eng 1(3):389–409

    Article  MathSciNet  Google Scholar 

  7. Niraja KS, Srinivasa Rao S (2021) A hybrid algorithm design for near real time detection cyber-attacks from compromised devices to enhance IoT security. Mater Today Proc

    Google Scholar 

  8. Garg H, Dave M (2019) Securing IoT devices and securely connecting the dots using REST API and middleware. In: 2019 4th international conference on internet of things: smart innovation and usages (IoT-SIU), 18–19 Apr 2019

    Google Scholar 

  9. Fang Z, Fu H, Gu T, Qian Z, Jaeger T, Hu P, Mohapatra P (2021) A model checking-based security analysis framework for IoT systems. High-Conf Comput 1:100004

    Article  Google Scholar 

  10. Iqbal W, Abbas H, Daneshmand M, Rauf B, Abbas Y (2020) An in-depth analysis of IoT security requirements, challenges and their countermeasures via software defined security. IEEE Internet Things J 7(10)

    Google Scholar 

  11. Shin S, Seto Y (2020) Development of IoT security exercise contents for cyber security exercise system. In: 2020 13th international conference on human system interaction (HSI), 6–8 June 2020

    Google Scholar 

  12. Mohamed AMA, Hamad YAM (2020) IoT security review and future directions for protection models. In: 2020 international conference on computing and information technology (ICCIT-1441)

    Google Scholar 

  13. Shipley AJ (2013) Security in the internet of things, lessons from the past for the connected future. In: Security solutions, wind river, white paper

    Google Scholar 

  14. Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of internet of things: perspectives and challenges. Wirel Network 20(8):2481–2501

    Article  Google Scholar 

  15. Jayapal C, Sultana P, Saroja MN, Senthil J (2019) Ubiquitous computing and computing security of IoT, pp1–28

    Google Scholar 

  16. Lam K-Y, Mitra S, Gondesen F, Yi X (2022) ANT-centric IoT security reference architecture—security-by-design for satellite-enabled smart cities. IEEE Internet Things J 9(8)

    Google Scholar 

  17. Jung J, Kim B, Cho J, Lee B (2022) A secure model based on ARM platform security architecture for IoT devices. IEEE Internet Things J 9(7)

    Google Scholar 

  18. Chen JIZ, Lai K-L (2020) Internet of Things (IoT) authentication and access control by hybrid deep learning method—a study. J Soft Comput Paradig (JSCP) 2(4):236–245

    Google Scholar 

  19. Kamel DK (2021) Wireless IoT with blockchain-enabled technology amidst attacks. IRO J Sustain Wirel Syst 2(3):133–137

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jui Sanjay Berde .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Berde, J.S., Kulkarni, S.S. (2023). Security Enhancement in IoT with an Application of Water Monitoring. In: Smys, S., Kamel, K.A., Palanisamy, R. (eds) Inventive Computation and Information Technologies. Lecture Notes in Networks and Systems, vol 563. Springer, Singapore. https://doi.org/10.1007/978-981-19-7402-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-7402-1_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-7401-4

  • Online ISBN: 978-981-19-7402-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics