ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Security in IoT - Literature Review and Current/Future Security Issues

Verified

Added on  2023/06/12

|11
|2511
|437
AI Summary
This paper presents a literature review on security in IoT and highlights the current and future security issues, threats, attacks, challenges, and countermeasures. It also discusses the characteristics of IoT compared to traditional networks and its application areas in healthcare, smart retail, and home automation.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: SECURITY IN IOT 1
Security in IoT
Institution
Name
Date

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2SECURITY IN IOT
Literature Review
These days individuals are progressively reliant on the Internet to direct their day by day
exercises. Because of this, there has been a rise in the use of the Internet of Things (IoT).
Subsequently, it has essentially expanded the gadgets associated with the Internet; stretching
around of 20 billion associated gadgets, and is relied upon to achieve 50 billion out of 2020. This
has made extraordinary difficulties for keeping up security and protection of data on the grounds
that most cell phones center around availability and are including default settings where security
is extremely influenced. This paper introduces the outcomes got by the convention of precise
audit to set up the present condition of security in IoT gadgets. The fundamental concerns,
dangers, assaults, difficulties, and a few countermeasures have been highlighted
Introduction
Internet of Things (IoT) is a representation of a universal idea for the capability of
devices that are connected in a network to detect and gather the data collected from our
environment, this collected data then is sent through the internet and thereafter it is used in
different fields as explained in [1].
A “thing” in the Internet of Things can represent a vehicle fitted with an automatic speed
sensor which sends alerts to the driver on the speed status, a person implanted with a heart sensor
recording and sending the condition of the heart or any of the man-made or natural objects that
are given abilities to send data through a network.
Document Page
3SECURITY IN IOT
Characteristics of the Internet of Things compared to the traditional network
Intelligence
Internet of Things is smart devices since they have a collection of calculations and
algorithms, hardware and software according to the work in [2]. The intelligence in this IoTs
raises the abilities which enable the objects to intelligently respond to a given condition and
aiding in doing those particular tasks. In contrast to traditional networks, IoT devices such as
automated vacuum cleaners do their work independently due to the intelligence. IoT intelligence
in specifically referred as a way of interaction among the devices even with the advancement in
smart technologies. Graphical user interface and any other input ways that are standard are used
in the interaction between the user and the devices.
Connectivity
Internet of Things is empowered by the connectivity that brings together daily life
objects. The connectivity between these object is important because primary object level
fundamental interactions promote corporate intelligence in a network of the Internet of Thing [3].
It facilitates the compatibility and accessibility of the network. Vehicles fitted with automatic
speed sensors are able to connect and send the speed status to the authorities over the internet,
unlike the traditional networks which would have just stored than to be read manually or to be
sent by the user.
Sensing abilities
Sensing capabilities is a crucial component of the Internet of Things which does not exist
in traditional networks. The work in [4] states that IoTs are equipped with sensors to detect any
Document Page
4SECURITY IN IOT
disparities in the surrounding and provide information about the status of that given environment.
Technology in sensing gives a way to come up with abilities reflecting an awareness that is true
about the people and the real world. For instance, sensors implanted on an organ like the human
heart which gives information such as the heart beats.
Heterogeneity of IoTs
Heterogeneity is the ability of Internet of Things to interact with other devices that have
different hardware and software programs over various networks. The architecture of the IoT
must be design to support devices connected to a network directly amongst the heterogeneous
networks. This capability may be present in traditional networks where most of the only
compatible with some selected networks [3].
Application areas of Internet of Things
Application of IoT on Healthcare
Internet of Things is getting useful in the field of Healthcare such as surveillance of
patients, detection of fall, care of sportsmen, medical fridges among others applications. For
example, the fall detectors will assist the elderly and the disabled who live on their own [6]. This
will reduce the medical issues and increase the joy of being healthy. In the near future, IoT will
provide a device that takes the measurements of Ultraviolet rays of the sun to reduce the
infection from this kind of pollution.
IoT application in Smart Retail

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5SECURITY IN IOT
Smart retails such as product tagging has come due to IoT technology, product tagging
enables retailers to get a lot of benefits including effective and accurate inventory as per the
experts in the business field. Then retail sectors where the Internet of things has promoted
include wireless tracking and sensing, virtual reality, home replenishment and home hubs among
others. The retailers will be able to get more information about the users because of the IoT
characteristic which assists in aggregating private and public sources of information [5].
Home Automation and Building
Control systems for most if not all of the homes and buildings have been easily
maintained and more concentrated by the Internet of Things and this is among the greatest
achievements of IoT. Measuring of water usage and electricity is possible because of the
immense contributions of IoT which make it easy to comprehend how resources are being
utilized and planning for the future expenses [7]. This will also extend to goods and art
preservation of in museums and it will make it possible to monitor their status.
Current or future security issues in IoT and its countermeasures and tools used.
Critical security issues in the Internet of Things
Internet of Things encounters several security issues due to various reasons, each of the
three layers faces some security issues as analyzed in [8].
Perception Layer
Perception layer of the IoT faces three security issues itself. Interception of the sensor
node by either owner or the unauthorized person in IoT gadgets this is due to the fact that nodes
Document Page
6SECURITY IN IOT
are operated in outdoor and the external environment which exposes sensors to the physical
attack as the attacker can interfere with the hardware of the IoT devices. Secondly, poor strength
of the wireless signals. The transmission of the signals from one node to another is through
wireless network technology where the signal efficiency is disturbed by the waves within the
environment. The third and the last security issue in perception layer of the IoT is underlying
quality of the topology of the network which is able to change and adapt constantly since the
nodes of IoT are more often than not taken to various locations. This perceptions layer of the IoT
is majorly made of Radio Frequency Identifications (RFID) and sensors where its power usage,
computation abilities and capacity of the storage make the weak in terms of the security. This
layer can easily be attacked by altering, replaying or spooling the specific data in the IoT devices
[9].
This security issues in perception layer can be minimized or solved by using end-to-end
or point-to-point encryption, verifying the identities of the devices in the network through the
authentication process and taking fool control of those devices who are able to access the
network.
The issues in this section can also be solved by the trust among the owners which helps in
the trust among the owners helps in the passage of the IoT devices in relation to permissions and
access control since the IoT devices move from one owner to the other in a physical way.
Issues in the Network Layer
The network layer of the Internet of Things is vulnerable to Denial of Service (DoS)
attempts, passive monitoring, and eavesdropping [10]. The main reason why this attack happens
Document Page
7SECURITY IN IOT
is due to the exchange of data among the IoT devices and the mechanism of the remote access.
This layer is extremely vulnerable to eavesdropping by the attackers within the network. The
eavesdropping of a given IoT device in a network leads to complete compromise of the
communication link. The primary exchange mechanism should be accorded maximum security
to forbid attackers from eavesdropping. The increases security issues in IoT devices compared to
those devices on the internet is due to communication between the machines and the
heterogeneity of IoT devices making them impossible to apply present network protocols. This
protocols would have provided high security among the devices on the network. The fact that
IoT devices are connected for the purpose of gaining more information on users to be used in the
future criminal offenses makes it vulnerable to the attackers.
Protection of objects in the network and network protection is a basic action to be taken.
Objects in the network must be able to defend themselves against the attackers and to be able to
understand the status of the network in terms of the security. This security measure can be
possibly attained with a software and the well-programmed protocols able to deal with a security
issue in a network.
The solution for security issues in this point is solved by creating security platforms in
each and every IoT gadget which will be responsible in preventing attacker and knowing exactly
when the attacker when they or will try to attack. This method will call for organized intelligent
actions by the providers of the IoT. The IoT providers should also ensure auto-updates to the
software which in turn will be able to deal with any incoming attack.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
8SECURITY IN IOT
The large amount of data that are transmitted by the IoT devices over the network should
be encoded with a robust encryption to secure them against the attackers any kind of unencrypted
data should be avoided since the attackers take advantage of this.
Security issues in the application layer
There are numerous issues that associate with the security of the application due to lack
global standards and policies in IoT rules which controls and restricts the application
development. It is extremely hard to ascertain the identity authentication and privacy of data
since various applications have different authentication mechanism. The many numbers of the
connected Internet of Things devices on a network that participate in data sharing process will
cause an enormous overhead on applications that processes and analyze data which in turn can
highly affect the service availability as clearly analyzed in [11]. Many issues must be taken into
consideration when creating the applications. These are issues include the person who will be
responsible for managing the applications, how various users will act together with the
applications and lastly the quantity of information that will be disclosed. The user should possess
the tools used in data control on basics of data to be revealed and must understand how those
data will be used at which time by who.
In this case of application layer which lack global standards and policies, the architecture
of Internet of Things should have a global architecture with a centralized system or internal
independence able to overpower the heterogeneity of different devices, protocols, and software.
There should be mechanisms responsible for enforcing this policies and standards.
Document Page
9SECURITY IN IOT
References
[1] Silva, B. N., Khan, M., & Han, K. (2017). Internet of things: a comprehensive review
of enabling technologies, architecture, and challenges. IETE Technical Review, 1-16.
[2] Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments,
and challenges for enterprises. Business Horizons, 58(4), 431-440.
[3] Xu, K., Qu, Y., & Yang, K. (2016). A tutorial on the internet of things: From a
heterogeneous network integration perspective. IEEE Network, 30(2), 102-108.
Document Page
10SECURITY IN IOT
[4] Jin, J., Gubbi, J., Marusic, S., & Palaniswami, M. (2014). An information framework
for creating a smart city through internet of things. IEEE Internet of Things Journal, 1(2), 112-
121.
[5] Benardos, P. G., & Vosniakos, G. C. (2017). Internet of things and industrial
applications for precision machining. In Solid State Phenomena (Vol. 261, pp. 440-447). Trans
Tech Publications.
[6] Islam, S. R., Kwak, D., Kabir, M. H., Hossain, M., & Kwak, K. S. (2015). The
internet of things for health care: a comprehensive survey. IEEE Access, 3, 678-708.
[7] Hui, T. K., Sherratt, R. S., & Sánchez, D. D. (2017). Major requirements for building
Smart Homes in Smart Cities based on Internet of Things technologies. Future Generation
Computer Systems, 76, 358-369.
[8] Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on
the security concerns of internet of things (IoT). International Journal of Computer
Applications, 111(7).
[9] Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2016). Threats to networking cloud and
edge datacenters in the internet of things. IEEE Cloud Computing, 3(3), 64-71.
[10] Perera, C., Liu, C. H., & Jayawardena, S. (2015). The emerging internet of things
marketplace from an industrial perspective: A survey. IEEE Transactions on Emerging Topics in
Computing, 3(4), 585-598.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
11SECURITY IN IOT
[11] Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy
issues of Internet of Things. arXiv preprint arXiv:1501.02211.
1 out of 11
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]