Abstract
In recent years, numerous innovations have been observed in IOT-based process management systems. There are smart management technologies and architecture available that enable the user to fetch real-time data from remote areas and display/log them accordingly. The controller, cloud, and database usually used in this architecture is of original equipment manufacturer (OEM) IOT system or a third-party service provider. Thus, it will expose your data to unauthorized entities. In this project, we will explain security measures that can be taken to create a secure IOT architecture that will ensure the safety of user data and give assurity to the user that the data is not accessed without their consent. As a proof of concept, we will develop an Internet-based water flow monitoring system that will avoid water theft and will enable users to access data and create statistical inferences.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fotiou N, Kotsonis T, Marias GF, Polyzos GC (2016) Access control for internet of things. In: 2016 international workshop on secure internet of things (SIoT)
Rehman A, Khan IU, Rehman SU, Moiz M (2016) Security and privacy issues in IoT. Int J Commun Netw Inform Secur (IJCNIS)
Pooja Yadav E, Ankur Mittal E, Yadav H (2018) IoT: challenges and issues in Indian perspective. In: 2018 3rd international conference on internet of things: smart innovation and usages (IoT-SIU), 23–24 Feb 2018
Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6(5)
Atamli AW, Martin A (2014) Threat-based security analysis for the internet of things. In: 2014 international workshop on secure internet of things, 10–10 Sept 2014
Dikii D (2020) Authentication algorithm for internet of things networks based on MQTT protocol. Serb J Electr Eng 1(3):389–409
Niraja KS, Srinivasa Rao S (2021) A hybrid algorithm design for near real time detection cyber-attacks from compromised devices to enhance IoT security. Mater Today Proc
Garg H, Dave M (2019) Securing IoT devices and securely connecting the dots using REST API and middleware. In: 2019 4th international conference on internet of things: smart innovation and usages (IoT-SIU), 18–19 Apr 2019
Fang Z, Fu H, Gu T, Qian Z, Jaeger T, Hu P, Mohapatra P (2021) A model checking-based security analysis framework for IoT systems. High-Conf Comput 1:100004
Iqbal W, Abbas H, Daneshmand M, Rauf B, Abbas Y (2020) An in-depth analysis of IoT security requirements, challenges and their countermeasures via software defined security. IEEE Internet Things J 7(10)
Shin S, Seto Y (2020) Development of IoT security exercise contents for cyber security exercise system. In: 2020 13th international conference on human system interaction (HSI), 6–8 June 2020
Mohamed AMA, Hamad YAM (2020) IoT security review and future directions for protection models. In: 2020 international conference on computing and information technology (ICCIT-1441)
Shipley AJ (2013) Security in the internet of things, lessons from the past for the connected future. In: Security solutions, wind river, white paper
Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of internet of things: perspectives and challenges. Wirel Network 20(8):2481–2501
Jayapal C, Sultana P, Saroja MN, Senthil J (2019) Ubiquitous computing and computing security of IoT, pp1–28
Lam K-Y, Mitra S, Gondesen F, Yi X (2022) ANT-centric IoT security reference architecture—security-by-design for satellite-enabled smart cities. IEEE Internet Things J 9(8)
Jung J, Kim B, Cho J, Lee B (2022) A secure model based on ARM platform security architecture for IoT devices. IEEE Internet Things J 9(7)
Chen JIZ, Lai K-L (2020) Internet of Things (IoT) authentication and access control by hybrid deep learning method—a study. J Soft Comput Paradig (JSCP) 2(4):236–245
Kamel DK (2021) Wireless IoT with blockchain-enabled technology amidst attacks. IRO J Sustain Wirel Syst 2(3):133–137
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Berde, J.S., Kulkarni, S.S. (2023). Security Enhancement in IoT with an Application of Water Monitoring. In: Smys, S., Kamel, K.A., Palanisamy, R. (eds) Inventive Computation and Information Technologies. Lecture Notes in Networks and Systems, vol 563. Springer, Singapore. https://doi.org/10.1007/978-981-19-7402-1_16
Download citation
DOI: https://doi.org/10.1007/978-981-19-7402-1_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7401-4
Online ISBN: 978-981-19-7402-1
eBook Packages: EngineeringEngineering (R0)