Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, B. K. Pattanayak, Saumendra Pattnaik, Rami Ahmad Habboush
{"title":"防止物联网(IoT)环境遭受网络攻击的端到端安全方案","authors":"Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, B. K. Pattanayak, Saumendra Pattnaik, Rami Ahmad Habboush","doi":"10.25130/tjes.30.4.16","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.","PeriodicalId":30589,"journal":{"name":"Tikrit Journal of Engineering Sciences","volume":"26 12","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment\",\"authors\":\"Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, B. K. Pattanayak, Saumendra Pattnaik, Rami Ahmad Habboush\",\"doi\":\"10.25130/tjes.30.4.16\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.\",\"PeriodicalId\":30589,\"journal\":{\"name\":\"Tikrit Journal of Engineering Sciences\",\"volume\":\"26 12\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-12-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Tikrit Journal of Engineering Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.25130/tjes.30.4.16\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Environmental Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Tikrit Journal of Engineering Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25130/tjes.30.4.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Environmental Science","Score":null,"Total":0}
An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment
The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.