Araştırma Makalesi
BibTex RIS Kaynak Göster

IoT, IoT Çekirdek Bileşenleri, IoT Katmanları ve Saldırı Türlerinin Derinlemesine İncelenmesi

Yıl 2021, Sayı: 28, 665 - 669, 30.11.2021
https://doi.org/10.31590/ejosat.1010023

Öz

Nesnelerin İnterneti (IoT), farklı iletişim protokolleri aracılığıyla birbirleriyle iletişim kurabilen ve verileri algılama ve işleme yeteneğine sahip küresel bir cihaz ağıdır. Nesnelerin İnterneti, günlük aktivitelerin verimli bir şekilde incelenmesi ve yürütülmesi için elektronik cihazları internete bağladığından, insan hayatı üzerinde ciddi anlamda olumlu bir etkiye sahiptir. Bu cihazlar birbirleriyle iletişim kurmak için bazı iletişim protokollerini kullanır. Bu iletişim protokollerinin seçimi büyük önem taşımaktadır. Bu akıllı cihazlardan elde edilen veriler bulut teknolojisi yardımıyla saklanmaktadır. Depolanan bu veriler, büyük veri kavramını ortaya çıkarmaktadır. Bu verilerin işlenmesi ve analizi büyük önem taşımaktadır. Bu büyük miktardaki verinin işlenmesinde makine öğrenmesi yöntemleri büyük önem taşımaktadır. Bu çalışmada IoT, IoT'un temel bileşenleri, katman yapısı, güvenlik saldırıları incelenmiştir.

Kaynakça

  • Abdel‐Basset, M., Manogaran, G., Mohamed, M., & Rushdy, E. (2019). Internet of things in smart education environment: Supportive framework in the decision‐making process. Concurrency and Computation: Practice and Experience, 31(10), e4515.
  • Ahmad, A., Hababeh, M., Abu-Hantash, A., AbuHour, Y., & Musleh, H. (2020). Reduce Effect of Dependent Malicious Sensor Nodes in WSNs using Pairs Counting and Fake Packets. International Journal of Computers, Communications and Control, 15(5).
  • Andreica, G. R., Bozga, L., Zinca, D., & Dobrota, V. (2020). Denial of service and man-in-the-middle attacks against IoT devices in a GPS-based monitoring software for intelligent transportation systems. Paper presented at the 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet).
  • Andy, S., Rahardjo, B., & Hanindhito, B. (2017). Attack scenarios and security analysis of MQTT communication protocol in IoT system. Paper presented at the 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).
  • Ashouri, M., Davidsson, P., & Spalazzese, R. (2018). Cloud, edge, or both? Towards decision support for designing IoT applications. Paper presented at the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security.
  • Borycki, D. (2017). Programming for the Internet of Things: Using Windows 10 IoT Core and Azure IoT Suite: Microsoft Press.
  • Ceron, J. M., Steding-Jessen, K., Hoepers, C., Granville, L. Z., & Margi, C. B. (2019). Improving iot botnet investigation using an adaptive network layer. Sensors, 19(3), 727.
  • Citoni, B., Fioranelli, F., Imran, M. A., & Abbasi, Q. H. (2019). Internet of Things and LoRaWAN-enabled future smart farming. IEEE Internet of Things Magazine, 2(4), 14-19.
  • Çınar, A., Yıldırım, M., & Eroğlu, Y. (2021). Classification of pneumonia cell images using improved ResNet50 model. Traitement du Signal, 38(1), 165-173.
  • Das, A., Dash, P., & Mishra, B. K. (2018). An innovation model for smart traffic management system using internet of things (IoT) Cognitive Computing for Big Data Systems Over IoT (pp. 355-370): Springer.
  • Eroğlu, Y., Yildirim, M., & Çinar, A. (2021). Convolutional Neural Networks based classification of breast ultrasonography images by hybrid method with respect to benign, malignant, and normal using mRMR. Computers in biology and medicine, 133, 104407. doi: https://doi.org/10.1016/j.compbiomed.2021.104407
  • Hoang, T. M., Nguyen, N. M., & Duong, T. Q. (2019). Detection of eavesdropping attack in UAV-aided wireless systems: Unsupervised learning with one-class SVM and k-means clustering. IEEE Wireless Communications Letters, 9(2), 139-142.
  • Kassab, W. a., & Darabkh, K. A. (2020). A–Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations. Journal of Network and Computer Applications, 163, 102663.
  • Khattak, H. A., Shah, M. A., Khan, S., Ali, I., & Imran, M. (2019). Perception layer security in Internet of Things. Future Generation Computer Systems, 100, 144-164.
  • Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE internet of things journal, 4(5), 1125-1142.
  • Luis Bustamante, A., Patricio, M. A., & Molina, J. M. (2019). Thinger. io: An open source platform for deploying data fusion applications in IoT environments. Sensors, 19(5), 1044.
  • Moraes, T., Nogueira, B., Lira, V., & Tavares, E. (2019). Performance Comparison of IoT Communication Protocols. Paper presented at the 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC).
  • Nasiri, H., Nasehi, S., & Goudarzi, M. (2019). Evaluation of distributed stream processing frameworks for IoT applications in Smart Cities. Journal of Big Data, 6(1), 1-24.
  • Navani, D., Jain, S., & Nehra, M. S. (2017). The internet of things (IoT): A study of architectural elements. Paper presented at the 2017 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).
  • Rao, T. A., & Haq, E. (2018). Security challenges facing IoT layers and its protective measures. International Journal of Computer Applications, 179(27), 31-35.
  • Rughoobur, P., & Nagowah, L. (2017). A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare. Paper presented at the 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions)(ICTUS).
  • Seleznev, S., & Yakovlev, V. (2019). Industrial Application Architecture IoT and protocols AMQP, MQTT, JMS, REST, CoAP, XMPP, DDS. International Journal of Open Information Technologies, 7(5), 17-28.
  • Sun, X., & Ansari, N. (2017). Dynamic resource caching in the IoT application layer for smart cities. IEEE internet of things journal, 5(2), 606-613.
  • YILDIRIM, M., ÇINAR, A., & CENGİL, E. Investigation of Cloud Computing Based Big Data on Machine Learning Algorithms. Bitlis Eren Üniversitesi Fen Bilimleri Dergisi, 10(2), 670-682.
  • Zhang, G., Kou, L., Zhang, L., Liu, C., Da, Q., & Sun, J. (2017). A new digital watermarking method for data integrity protection in the perception layer of IoT. Security and Communication Networks, 2017.

An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types

Yıl 2021, Sayı: 28, 665 - 669, 30.11.2021
https://doi.org/10.31590/ejosat.1010023

Öz

The Internet of Things (IoT) is a global network of devices that can communicate with each other through different communication protocols and have the ability to detect and process data. Since the Internet of Things connects electronic devices to the Internet for efficient examination and execution of daily activities, it has a seriously positive effect on human life. These devices use some communication protocols to communicate with each other. The selection of these communication protocols is of great importance. The data obtained from these smart devices are stored with the help of cloud technology. These stored data reveal the concept of big data. The processing and analysis of these data are of great importance. Machine learning methods are of great importance in processing this large amount of data. In this study, IoT, the basic components of the IoT, layer structure, security attacks are examined.

Kaynakça

  • Abdel‐Basset, M., Manogaran, G., Mohamed, M., & Rushdy, E. (2019). Internet of things in smart education environment: Supportive framework in the decision‐making process. Concurrency and Computation: Practice and Experience, 31(10), e4515.
  • Ahmad, A., Hababeh, M., Abu-Hantash, A., AbuHour, Y., & Musleh, H. (2020). Reduce Effect of Dependent Malicious Sensor Nodes in WSNs using Pairs Counting and Fake Packets. International Journal of Computers, Communications and Control, 15(5).
  • Andreica, G. R., Bozga, L., Zinca, D., & Dobrota, V. (2020). Denial of service and man-in-the-middle attacks against IoT devices in a GPS-based monitoring software for intelligent transportation systems. Paper presented at the 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet).
  • Andy, S., Rahardjo, B., & Hanindhito, B. (2017). Attack scenarios and security analysis of MQTT communication protocol in IoT system. Paper presented at the 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).
  • Ashouri, M., Davidsson, P., & Spalazzese, R. (2018). Cloud, edge, or both? Towards decision support for designing IoT applications. Paper presented at the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security.
  • Borycki, D. (2017). Programming for the Internet of Things: Using Windows 10 IoT Core and Azure IoT Suite: Microsoft Press.
  • Ceron, J. M., Steding-Jessen, K., Hoepers, C., Granville, L. Z., & Margi, C. B. (2019). Improving iot botnet investigation using an adaptive network layer. Sensors, 19(3), 727.
  • Citoni, B., Fioranelli, F., Imran, M. A., & Abbasi, Q. H. (2019). Internet of Things and LoRaWAN-enabled future smart farming. IEEE Internet of Things Magazine, 2(4), 14-19.
  • Çınar, A., Yıldırım, M., & Eroğlu, Y. (2021). Classification of pneumonia cell images using improved ResNet50 model. Traitement du Signal, 38(1), 165-173.
  • Das, A., Dash, P., & Mishra, B. K. (2018). An innovation model for smart traffic management system using internet of things (IoT) Cognitive Computing for Big Data Systems Over IoT (pp. 355-370): Springer.
  • Eroğlu, Y., Yildirim, M., & Çinar, A. (2021). Convolutional Neural Networks based classification of breast ultrasonography images by hybrid method with respect to benign, malignant, and normal using mRMR. Computers in biology and medicine, 133, 104407. doi: https://doi.org/10.1016/j.compbiomed.2021.104407
  • Hoang, T. M., Nguyen, N. M., & Duong, T. Q. (2019). Detection of eavesdropping attack in UAV-aided wireless systems: Unsupervised learning with one-class SVM and k-means clustering. IEEE Wireless Communications Letters, 9(2), 139-142.
  • Kassab, W. a., & Darabkh, K. A. (2020). A–Z survey of Internet of Things: Architectures, protocols, applications, recent advances, future directions and recommendations. Journal of Network and Computer Applications, 163, 102663.
  • Khattak, H. A., Shah, M. A., Khan, S., Ali, I., & Imran, M. (2019). Perception layer security in Internet of Things. Future Generation Computer Systems, 100, 144-164.
  • Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE internet of things journal, 4(5), 1125-1142.
  • Luis Bustamante, A., Patricio, M. A., & Molina, J. M. (2019). Thinger. io: An open source platform for deploying data fusion applications in IoT environments. Sensors, 19(5), 1044.
  • Moraes, T., Nogueira, B., Lira, V., & Tavares, E. (2019). Performance Comparison of IoT Communication Protocols. Paper presented at the 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC).
  • Nasiri, H., Nasehi, S., & Goudarzi, M. (2019). Evaluation of distributed stream processing frameworks for IoT applications in Smart Cities. Journal of Big Data, 6(1), 1-24.
  • Navani, D., Jain, S., & Nehra, M. S. (2017). The internet of things (IoT): A study of architectural elements. Paper presented at the 2017 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).
  • Rao, T. A., & Haq, E. (2018). Security challenges facing IoT layers and its protective measures. International Journal of Computer Applications, 179(27), 31-35.
  • Rughoobur, P., & Nagowah, L. (2017). A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare. Paper presented at the 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions)(ICTUS).
  • Seleznev, S., & Yakovlev, V. (2019). Industrial Application Architecture IoT and protocols AMQP, MQTT, JMS, REST, CoAP, XMPP, DDS. International Journal of Open Information Technologies, 7(5), 17-28.
  • Sun, X., & Ansari, N. (2017). Dynamic resource caching in the IoT application layer for smart cities. IEEE internet of things journal, 5(2), 606-613.
  • YILDIRIM, M., ÇINAR, A., & CENGİL, E. Investigation of Cloud Computing Based Big Data on Machine Learning Algorithms. Bitlis Eren Üniversitesi Fen Bilimleri Dergisi, 10(2), 670-682.
  • Zhang, G., Kou, L., Zhang, L., Liu, C., Da, Q., & Sun, J. (2017). A new digital watermarking method for data integrity protection in the perception layer of IoT. Security and Communication Networks, 2017.
Toplam 25 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Muhammed Yıldırım 0000-0003-1866-4721

Uğur Demiroğlu 0000-0002-0000-8411

Bilal Şenol 0000-0002-3734-8807

Yayımlanma Tarihi 30 Kasım 2021
Yayımlandığı Sayı Yıl 2021 Sayı: 28

Kaynak Göster

APA Yıldırım, M., Demiroğlu, U., & Şenol, B. (2021). An in-depth exam of IoT, IoT Core Components, IoT Layers, and Attack Types. Avrupa Bilim Ve Teknoloji Dergisi(28), 665-669. https://doi.org/10.31590/ejosat.1010023