Market-Inspired Framework for Securing Internet of Things Computing Environment †
Abstract
:1. Introduction
2. IoT Services
- There are gadgets that have been created utilizing the IoT that help the patient during treatment. From one viewpoint, being situated in the clinic to seek the treatment is excessively costly.; then again, utilizing such IoT-empowered gadgets makes it reasonable for patients to proceed with the treatment for a minimal price. The most involved gadget in this space is utilized to battle against diabetes.
- The IoT allows us to control gadgets that are found geologically far away. It is an element of gadgets associated through the IoT that they can take input from different gadgets that are associated through the web. Generally, cell phones are being utilized regularly to remotely send guidelines to the gadget. In such cases, typically, the web is preferred, while on the off chance that the gadgets are associated with a similar organization, they can utilize Wi-Fi.
- The IoT can be customized to carry a few functionalities to make the user’s experience and cooperation with light-producing gadgets the best. We can consider making the light gleam so it truly does illuminate just when somebody is scrolling, which could prompt saving parcels to drive utilization. It may very well be accomplished by making the lighting gadgets sufficiently bright to comprehend when to sparkle and follow an example.
- The machines utilized these days are too complicated to even think about understanding. By utilizing the IoT, a framework could be fostered that can recognize disappointment in the machines. Such machines are utilized to caution the client regarding the ill-advised working of any piece of the gadget. This will be useful to guarantee the nature of the item. It can likewise prompt protection of the clients of the machine from a lethal mishap.
- Involving IoT-empowered gadgets within the climate could be extremely shrewd and ideal. Brilliant gadgets lower the utilization of assets and upgrade productivity. This could prompt a superior working setting, as the spot should be well developed by utilizing less assets, and the IoT can be demonstrated to be the most ideal choice to serve such conditions.
- Computerized reasoning is the next enormous thing, as practically all brilliant gadgets use it to upgrade productivity. The ideas and elements of the IoT could be incorporated with Artificial Intelligence-based applications to make it work much better and increment registering power. There are, as of now, gadgets out in the market that influence both the simulated intelligence applications and the IoT, and those gadgets are now working productively [9].
- In the period of web-based business, there are a great many clients reliant upon the web-based site to purchase the items they need. The web-based business sites likewise comprehend that they must treat their clients with a customized experience so they can feel open to utilizing their foundation, and here is where the IoT could be utilized in the best way. It makes the client utilize the web-based site effortlessly with the goal that they can zero in on what they need to purchase rather than zeroing in on how the site functions.
3. IoT Service Methodology
- The diverse plan of IoT security requires a base-up, ordinary cycle to guarantee that the results address all current and coherent difficulties and issues [10]. The procedure ought to be liquid in nature, portrayed, and refined through conversation with assistants.
- From one side of the planet to the other, blended specific norms are crucial for refreshing IoT security. Ultimately, they are trying to get it right and take their time. It is sensible for approaches to overseeing IoT security to begin at a public level while working with other public, normal, and general bodies.
- In view of the snappiness of the dangers and the drawn-out time of the extended length movements, for example, climbs to structure frameworks and the improvement of overall standards, it is essential to begin work on preparing clients and for the relationship to start embracing the acknowledged methods that will diminish the dangers of client IoT contraption gathering. A key enabler of transformations is a digital infrastructure that is secure, reliable, and high-performance. To accelerate the deployment of their 5G networks and cloud infrastructure, nations such as India, China, and the United States are making significant investments.
- Step 1: No widespread or handily speculated pre-set passwords.
- Step 2: Information ought to be communicated and put away safely from areas of strength for utilizing.
- Step 3: Information assortment ought to be limited to just what is vital for a gadget to work.
- Step 4: Gadgets ought to be equipped for receiving security updates and fixes.
- Step 5: Gadget makers ought to tell buyers on the off chance that there is a security break.
- Step 6: Gadget makers ought to guarantee shoppers can reset a gadget to its processing plant settings in case of a deal or move of the gadget.
4. Challenges, Open Issues, and Future Research Directions
5. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Madakam, S.; Lake, V.; Lake, V.; Lake, V. Internet of Things (IoT): A literature review. J. Comput. Commun. 2015, 3, 164. [Google Scholar] [CrossRef]
- Altay, N.; Green, W.G. OR/MS research in disaster operations management. Eur. J. Oper. Res. 2006, 175, 475–493. [Google Scholar] [CrossRef]
- Pain, P.; Sadhu, A.; Das, K.; Kanjilal, M.R. Design and Implementation of Multi-Operative Reversible Gate for Even/Odd Parity Generators in Quantum Based Technologies. J. Comput. Mech. Manag. 2023, 2, 20–28. [Google Scholar] [CrossRef]
- Verma, C.P. Enhancing Parameters of LEACH Protocol for Efficient Routing in Wireless Sensor Networks. J. Comput. Mech. Manag. 2023, 2, 30–34. [Google Scholar] [CrossRef]
- Kumar Sharma, A.; Tiwari, A.; Bohra, B.; Khan, S. A Vision towards Optimization of Ontological Datacenters Computing World. Int. J. Inf. Syst. Manag. Sci. 2018, 1, 1–6. [Google Scholar]
- Tiwari, A.; Sharma, R.M. Rendering Form Ontology Methodology for IoT Services in Cloud Computing. Int. J. Adv. Stud. Sci. Res. 2018, 3, 273–278. [Google Scholar]
- Tiwari, A.; Garg, R. Eagle Techniques in Cloud Computational Formulation. Int. J. Innov. Technol. Explor. Eng. 2019, 1, 422–429. [Google Scholar]
- Tiwari, A.; Garg, R. ACCOS: A Hybrid Anomaly-Aware Cloud Computing Formulation-Based Ontology Services in Clouds. In Proceedings of the ISIC’21: International Semantic Intelligence Conference, Online, 25–27 February 2021; pp. 341–346. [Google Scholar]
- Koppaiyan, R.S.; Pallivalappil, A.S.; Singh, P.; Tabassum, H.; Tewari, P.; Sweeti, M.; Kumar, S. High-Availability Encryption-Based Cloud Resource Provisioning System. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence, Jaipur, India, 23–24 December 2022; pp. 1–6. [Google Scholar]
- Tiwari, A.; Garg, R. Reservation System for Cloud Computing Resources (RSCC): Immediate Reservation of the Computing Mechanism. Int. J. Cloud Appl. Comput. (IJCAC) 2022, 12, 1–22. [Google Scholar]
- Gokhale, P.; Bhat, O.; Bhat, S. Introduction to IOT. Int. Adv. Res. J. Sci. Eng. Technol. 2018, 5, 41–44. [Google Scholar]
- Tiwari, A.; Kumar, S.; Baishwar, N.; Vishwakarma, S.K.; Singh, P. Efficient Cloud Orchestration Services in Computing. In Proceedings of the 3rd International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication, Ghaziabad, India, 10–11 December 2021; pp. 739–746. [Google Scholar]
- Rohinidevi, V.V.; Srivastava, P.K.; Dubey, N.; Tiwari, S.; Tiwari, A. A Taxonomy towards fog computing Resource Allocation. In Proceedings of the 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT), Dehradun, India, 23–24 December 2022; pp. 1–5. [Google Scholar]
- Singh, N.K.; Jain, A.; Arya, S.; Gonzales, W.E.G.; Flores, J.E.A.; Tiwari, A. Attack Detection Taxonomy System in cloud services. In Proceedings of the 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT), Dehradun, India, 23–24 December 2022; pp. 1–5. [Google Scholar]
- Rangaiah, Y.V.; Sharma, A.K.; Bhargavi, T.; Chopra, M.; Mahapatra, C.; Tiwari, A. A Taxonomy towards Blockchain based Multimedia Content Security. In Proceedings of the 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT), Dehradun, India, 23–24 December 2022; pp. 1–4. [Google Scholar]
- Kamble, S.; Saini, D.K.J.; Kumar, V.; Gautam, A.K.; Verma, S.; Tiwari, A.; Goyal, D. Detection and tracking of moving cloud services from video using saliency map model. J. Discret. Math. Sci. Cryptogr. 2022, 25, 1083–1092. [Google Scholar] [CrossRef]
- Tiwari, A.; Garg, R. Adaptive Ontology-Based IoT Resource Provisioning in Computing Systems. Int. J. Semant. Internet Inf. Syst. (IJSWIS) 2022, 18, 1–18. [Google Scholar] [CrossRef]
- Tiwari, A.; Garg, R. Orrs Orchestration of a Resource Reservation System Using Fuzzy Theory in High-Performance Computing: Lifeline of the Computing World. Int. J. Softw. Innov. (IJSI) 2022, 10, 1–28. [Google Scholar] [CrossRef]
- Kumar, S.; Kumar, S.; Ranjan, N.; Tiwari, S.; Kumar, T.R.; Goyal, D.; Rafsanjani, M.K. Digital watermarking-based cryptosystem for cloud resource provisioning. Int. J. Cloud Appl. Comput. (IJCAC) 2022, 12, 1–20. [Google Scholar] [CrossRef]
- Lakshmanna, K.; Kaluri, R.; Gundluru, N.; Alzamil, Z.S.; Rajput, D.S.; Khan, A.A.; Alhussen, A. A review on deep learning techniques for IoT data. Electronics 2022, 11, 1604. [Google Scholar] [CrossRef]
- Sarker, I.H.; Khan, A.I.; Abushark, Y.B.; Alsolami, F. Internet of things (iot) security intelligence: A comprehensive overview, machine learning solutions and research directions. Mob. Netw. Appl. 2022, 28, 296–312. [Google Scholar] [CrossRef]
- Goudarzi, A.; Ghayoor, F.; Waseem, M.; Fahad, S.; Traore, I. A Survey on IoT-Enabled Smart Grids: Emerging, Applications, Challenges, and Outlook. Energies 2022, 15, 6984. [Google Scholar] [CrossRef]
- Benhamaid, S.; Bouabdallah, A.; Lakhlef, H. Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey. J. Netw. Comput. Appl. 2022, 198, 103257. [Google Scholar] [CrossRef]
- Christou, I.T.; Kefalakis, N.; Soldatos, J.K.; Despotopoulou, A.M. End-to-end industrial IoT platform for Quality 4.0 applications. Comput. Ind. 2022, 137, 103591. [Google Scholar] [CrossRef]
- Ravula, A.K.; Ahmad, S.S.; Singh, A.K.; Sweeti, S.; Kaur, A.; Kumar, S. Multi-level collaborative framework decryption-based computing systems. AIP Conf. Proc. 2023, 2782, 020131. [Google Scholar]
- Dora Pravina, C.T.; Buradkar, M.U.; Jamal, M.K.; Tiwari, A.; Mamodiya, U.; Goyal, D. A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence, Jaipur, India, 23–24 December 2022; pp. 1–5. [Google Scholar]
- Manikandan, R.; Maurya, R.K.; Rasheed, T.; Bose, S.C.; Arias-Gonzáles, J.L.; Mamodiya, U.; Tiwari, A. Adaptive cloud orchestration resource selection using rough set theory. J. Interdiscip. Math. 2023, 26, 311–320. [Google Scholar] [CrossRef]
- Srivastava, P.K.; Kumar, S.; Tiwari, A.; Goyal, D.; Mamodiya, U. Internet of thing uses in materialistic ameliorate farming through AI. AIP Conf. Proc. 2023, 2782, 020133. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pachar, S.; Singh, N.K.; Shaik, N.; Arya, S.; Bhimavarapu, J.P.; Vishwakarma, S.K. Market-Inspired Framework for Securing Internet of Things Computing Environment. Eng. Proc. 2023, 59, 33. https://doi.org/10.3390/engproc2023059033
Pachar S, Singh NK, Shaik N, Arya S, Bhimavarapu JP, Vishwakarma SK. Market-Inspired Framework for Securing Internet of Things Computing Environment. Engineering Proceedings. 2023; 59(1):33. https://doi.org/10.3390/engproc2023059033
Chicago/Turabian StylePachar, Sunita, Neeraj Kumar Singh, Nazeer Shaik, Shruti Arya, John Philip Bhimavarapu, and Sunil Kumar Vishwakarma. 2023. "Market-Inspired Framework for Securing Internet of Things Computing Environment" Engineering Proceedings 59, no. 1: 33. https://doi.org/10.3390/engproc2023059033
APA StylePachar, S., Singh, N. K., Shaik, N., Arya, S., Bhimavarapu, J. P., & Vishwakarma, S. K. (2023). Market-Inspired Framework for Securing Internet of Things Computing Environment. Engineering Proceedings, 59(1), 33. https://doi.org/10.3390/engproc2023059033