1. An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment
- Author
-
Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, Binod Kumar Pattanayak, Saumendra Pattnaik, and Rami Ahmad Habboush
- Subjects
IoT ,Security ,Cyber Attacks ,Encryption Scheme ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.
- Published
- 2023
- Full Text
- View/download PDF