Security Issues and Countermeasures in Internet of Things (IoT)
Verified
Added on 2023/06/11
|9
|2591
|452
AI Summary
This report discusses the security issues and countermeasures in Internet of Things (IoT). It covers the characteristics of IoT compared to traditional networks, IoT devices, applications for IoT, and the major security threats. It also provides mitigation techniques to secure the network.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
overview of network security[Pick the date]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents Introduction...........................................................................................................................................1 Literature Review on IoT......................................................................................................................1 Characteristics of IoT compared to the traditional network...................................................................2 Iot Devices.........................................................................................................................................2 Applications for IoT..............................................................................................................................3 Security issues in IoT........................................................................................................................3 Countermeasures/mitigation techniques used....................................................................................4 Conclusion.............................................................................................................................................5 References.............................................................................................................................................6 1|P a g e
Introduction The interest of internet of things has grown from last years. Internet of things plays an important role as it has changed the living standards of people and has altered the business models. This report consists of the usage of internet of things in different applications which is rising rapidly in the coming years. This report consists of detail description about features of IoT and the applications where they are used. It helps the devices to communicate with each other remotely without any human efforts. The main motive behind IoT is to offer a smart environment and allowing the data to be accessed only by authorised users. Internet of things is a booming technology that allow any business and service to access the data from anywhere at any time[1]. This also leads to various attacks which may violate the privacy of the network, all such cases has been future discussed in this report. This report also highlights the major security issues that arises in the system due to IoT and the count measures used to remove the flaws as also been discussed. Literature Review on IoT According to [2], Internet of things is a new concept which has changed the working of an environment. It can be seen as a network of physical devices which are embedded along with software’s. It makes all the devices unique by identifying them through the system. Internet of things makes possible that all the system are controlled remotely by offering more opportunities. Internet of things has resulted in improving the efficiency and economic benefit of an organisation by reducing the human efforts. Internet of things makes use of technology which helps in tracking the inventory and also provides control measures. Internet of things covers all the smart devices and objects that are connected to internet. Thus all the devices connected through internet form up a system, and such a system is termed as internet of things. It is a smart feature that helps devices to communicate with each other and complete the work automatically without any human involvement [3]. Every device is connected to each other through internet that allows user to access the devices remotely. In the views of [4], Internet of things make possible to access all the devices remotely by a single devices. The process covers the connection of devices by capturing all the data through sensors and then stores over big data. It makes use of artificial intelligence to analysis the 2|P a g e
communication over network. It offers huge benefits to smart applications and stakeholders to get tangible benefits. According to [5], Internet of things is a popular used technology and has covered almost all the domain like agriculture, healthcare, mining and storing of data in an innovative system. Internet of things can be seen as a secure place to secure the network and improve the efficiency. Internet of things cover three C’s that is communication, control and automation and cost saving. IoT helps in communicating with people and system to keep track of all the information. It also helps business to control the work remotely by possibly delivering all the response to the end users [6]. It also saves the overall cost of the business by improving the overall performance. It also improves the customer’s engagement by attracting more audience and improving their experiences by technology optimization. It improves the way in which management of resources is done by analysing the data in an effective manner. Characteristics of IoT compared to the traditional network It offers interconnectivity among all the devices over the globe. Internet of things is better than the old tradition methods as it is capable of providing privacy protection between the devices by making them connected to each other virtually. It covers all the devices that are different in terms of hardware platform. The traditional methods do not allow devices and services to interact through each other over a different network. Internets of things make this possible for all the devices to interact on a platform through different network. The traditional method did not allow any devices to change their state dynamically. The enormous scale of devices is managed altogether with the help of internet of things [7]. It also helps in data handling by interpreting data easily. Internet of things also offers better safety as compare to old traditional method. It secures the end points of the network by enabling accessing over a network. It offers better characteristics as compared to rational method as it is cost effective approach that offers high security and privacy of network. Internet of things is often used in home security that helps in monitoring and controlling the applications and smart devices. It also helps in making right decisions as more information is stored at a single place. It also saves the overall time by monitoring the devices digitally. It allows machines to interact with each other without human intervention [8]. The biggest advantage of interne of things as compare to traditional method is money. Iot Devices Internet of things uses many devices that are connected over the network with the ability to transfer data. There are various home applications where IOT devices are used like in hardware’s, sensors, communication technology, network technology, software’s and algorithms, signal processing and various security and privacy technology. The devices that are connected through a network include smart TVs, speakers and many more smart appliances [9].The Internet of Things refers to the ever-growing network of all the physical devices that include vehicles, software’s, actuators and other objects that enables the connectivity to exchange the data. 3|P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Applications for IoT Internet of things has various applications and is used in diverse areas. Internet of smart living- Internet of things have offered many ways to make the living easy. There are various remote control appliances that save energy and also help in transmitting to long distance. There are various smart appliances used in home like refrigerators, LCD screen and automatic electrical appliances [10]. These appliances make use of internet of things that helps in eliminating the human efforts by making all the work automatically. Internet of smart cities- It involves monitoring the material and conditions of all the buildings, bridges and roads in the city. Internet of things analyse the devices properly by also proving alerts of the conditions that are not appropriate and harmful for the city. Internet of things has involved cities in many ways as they offer smart parking facility along with smart waste management in the city. Wearable’s- Internet of things has been mostly used among wearable these days. It is a new innovation that is been used by many people in present time [11]. The wearable are very beneficial for humans as they keep the record of all the activities. It includes smart watches, headphones, smart glasses, camera or clothing that is connected via internet. Security issues in IoT Apart from proving carious benefits internet of things offers threats in daily life as well. Security threats are related to the loss of information or service. Internet of things also affects the physical security of network. It is necessary to consider the importance of security in the applications of IoT to protect all the data from the threats [12]. It is important to secure the channels as privacy of information is significant. Some of the security threats that are caused due to internet of things are: Secure planning-The interconnection and communication of devices vary according to the scenario. As in case of IoT data is collected from various devices that are connected over a network and data is shared between these devices. Thus there are chances of leakage of privacy as anyone and everyone can access the information from anywhere. End to end protection-Internet of thing do not offer any end to end protection of data packet as it is connected to millions of devices all together. It does not offer a framework to protect the data packets and manage the privacy of data. The main issue arises at time of misconfiguration of services.There are no such realistic policies and security mechanism to protect the data. Side channel attacks-Tough data packets are encrypted still they leave the scope of side channel attack. In this the information is leaked by some side doors and can be accessed by unauthorised users [13]. This leads to trust issues among the organisations as now day’s companies completely rely on the information that is stored on internet. Hackers identify the side channels to enter the system and access the data. 4|P a g e
Countermeasures/mitigation techniques used Internet of things has changed the living style in the society. They offer various issues that need to be resolved. So, some mitigation techniques have been discussed to secure the network. Resilience to attacks- The system is designed in such a way that they are capable enough to recover themselves after the attack [14]. There are chances of data leakage, unauthorised access and many attacks thus it that cases system should be prepared to recover from all the intrusion. So, that no loss of data occurs. Authentication of data- Internet of things covers all the sensitive information of an organisation thus it is necessary to provide proper authentication. The authentication mechanism should be done in such a way that it allows only authenticated data to be transmitted and blocking all the users. Access control-To avoid the chances of loss of confidentiality and integrity a proper access control should be provided. There should be a proper control regarding who can read and access the information. If the rights are provide in a proper manner than misuse of information will not occur. The defining the rights of information only valid users could read the relevant portion of the database. 5|P a g e
Conclusion It can be concluded from this report that internet of things has advanced the living standard in the society by offering various services that are automatic and easily access from anywhere. Internet of things can be seen as a technology to improve the flexibility among users.in this report the analyses has been done upon the how internet of things is better than the old traditional methods. Apart from that it has covered devices in very field thus various devices that are used in IOF has been discussed. This report also throws the limelight on the applications that are offered by internet of things. Apart from that they offer various security issues that have discussed and their countermeasures have also been discussed. 6|P a g e
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References [1] F,Wortmann, and F Kristina. "Internet of things."Business & Information Systems Engineering57, no. 3, pp. 221-224, 2015 [2] A, Osseiran, E, Omar, JaeSeung Song, and M Jose. "Internet of Things."IEEE Communications Standards Magazine1, no. 2 , pp. 84-84, 2017. [3] S, Chandrakanth, K. Venkatesh, M, Uma and K. Naganjaneyulu. "Internet of things."International Journal of Innovations & Advancement in Computer Science3, no. 8 pp. 16-20, 2014 [4] Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A survey."IEEE Transactions on industrial informatics10, no. 4 (2014): 2233-2243. [5] M, Bawa, C, Dagma, S, Ivan and S, Daniela. "Importance of internet of things and big data in building smart city and what would be its challenges." InSmart City 360°, pp. 605- 616. Springer, Cham, 2016. [6] M, Georgescu and P, Daniela. "The Importance of Internet of Things Security for Smart Cities." InSmart Cities Technologies. InTech, 2016. [7] G, Ho, L,Derek,M, Pratyush ,H, Ashkan , S, Dawn and W, David. "Smart locks: Lessons for securing commodity internet of things devices." InProceedings of the 11th ACM on Asia conference on computer and communications security, pp. 461-472. ACM, 2016. [8] Maheshwari, Ankit, K, Akash and S, Atul. "MANAGING INTERNET OF THINGS (IoT) DEVICES BASED ON ELECTRICAL POWER RELIABILITY." U.S. Patent Application 15/266,780, filed March 15, 2018. [9] Kamath, H, Srikanth, P, Suyashi, and T, Kar. "Security Issues in Internet of Things."International Journal of Emerging Research in Management &Technology6, no. 5, pp-260-264, 2017. [10] Whitmore, Andrew, A, Anurag and Li Da Xu. "The Internet of Things—A survey of topics and trends."Information Systems Frontiers17, no. 2 ,pp- 261-274, 2015. [11] S., Sicari, A., Rizzardi, L.A Grieco,. and Coen-Porisini, A., Security, privacy and trust in Internet of Things: The road ahead.Computer networks,76, pp.146-164, 201 [12] Sadeghi, Ahmad-Reza, Christian Wachsmann, and Michael Waidner. "Security and privacy challenges in industrial internet of things." InProceedings of the 52nd annual design automation conference, p. 54. ACM, 2015. [13] Conti, Mauro, Ali Dehghantanha, Katrin Franke, and Steve Watson. "Internet of Things security and forensics: Challenges and opportunities." pp-544-546, 2018. 7|P a g e
[14] Sadeghi, R, Ahmad, W Christian, and W Michael. "Security and privacy challenges in industrial internet of things." InProceedings of the 52nd annual design automation conference, p. 54. ACM, 2015. 8|P a g e