ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Security and Privacy Issues in Internet of Things (IoT)

Verified

Added on  2023/06/13

|5
|4679
|491
AI Summary
This research paper discusses the security and privacy issues in the Internet of Things (IoT) framework. It highlights the need for security measures to protect the user's private data and the challenges faced in implementing security protocols for IoT devices. The paper also examines the current environment of computing and identifies the various threats to security. It discusses malicious activities that could affect the IoT environment and focuses on the various measures of protecting the environment of IoT.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Security and Privacy Issues in Internet of Things
(IoT)
A. Author
Name of the University
author@first-third.edu.au
ABSTRACT The Internet of Things (IoT) is an
interconnected network comprising of various devices, which
are connected with the help of the internet. The devices,
which are connected with the help of the internet could
range from appliances of home, inbuilt sensors and many
other devices. The IoT possesses the capability to sense the
other devices and thus would be able to control them within
the pre-existing infrastructure of the network. The primary
idea behind the IoT infrastructure is that the devices would
be able to communicate among themselves and thus
maintain a connected ecosystem.
The IoT based devices are mainly used in homes, defense
systems, hospitals and in various other places. Hence these
systems would need a high level of protection in order to
avoid these systems from being vulnerable to attacks from
different hackers. In order to secure the interconnected
devices, various mitigation measures have to be taken.
The research paper is mainly focused on the examination
of the current environment of computing and then identify
the various threats of security. The paper also discusses
about the malicious activities that could affect the IoT
environment and also focusses on the various measures of
protecting the environment of IoT.
Keywords— IoT, Access Control, User Privacy
INTRODUCTION
The technology of the Internet of Things (IoT) could be
defined as the network of computers, which are
interconnected with each other with the help of internet
connection (Wortmann & Flüchter, 2015). The low cost of
the processors and the wireless based networks have the
potential to make the technology of IoT to be successful. With
the implementation of the IoT based technology, it would
supply an additional level of intelligence for the devices. With
the intelligence gained, the IoT based devices would be able to
relate and communicate with the other devices without any
kind of human based interaction (Gubbi et al., 2013). The IoT
based technology would be able to combine the possible gaps
within the digital and the physical worlds. The IoT based
technology has the ability to turn a physical object into an IoT
based device, which could be controllable with the help of an
internet-based connection.
A. Research Problem
The emergence of the IoT based technology and the ever
increasing number of the devices, which are being connected
with the help of the internet has been leading to a large
number of problems within the security of the devices (Rifkin,
2014). This research paper would discuss and then focus on
the several kind of issues that would arise with the escalating
growth of the IoT based networks. The main area of concern
within the IoT network should be in relation with the
protection and the security of the interconnected devices
(DEZHIGR & HOOSHMAND, 2017). The primary purpose of the
security within the IoT network is to maintain the
confidentiality of the information of the user and discuss
about the issues that would arise within the security of the
devices (Sicari et al., 2015).
B. Research Justification
The topic of the research would be able to discuss about
the aspects of the security within the network of IoT. The IoT
based security is an important aspect as the devices within the
IoT framework might contain the important details of the user.
The devices that are connected within the IoT framework
make use of a number of sensors for a wide range of devices.
The sensors that are enabled within the IoT based devices
utilize the different type of variables, which may include the
heart rate, speed, temperature and many others (Khalil et al.,
2014).
With the implementation of these kind of important
variables, there would be a major need for the security within
the IoT environment (Sivaraman et al., 2015). The devices
within the IoT have a low processing capacity, limited amount
of memory and lower power of the battery. Thus, the
traditional security mechanisms for the IoT based devices
would sometimes be inefficient for dealing with the different
situations for the security that would be arising with the ever-
changing trends within the environment of IoT. The various
kind of devices that are getting connected within the
interconnected framework. They would be able to continue to
perform their functions by using lower bandwidth (He, Yan &
Da Xu, 2014).
There is another problem that has majorly affected the IoT
framework. The solutions for the security of the devices might
be standardized for any of the area of the application. The IoT
based environment is affected due to the extreme need for
the interconnection between the devices (Botta et al., 2014).
The entire research would be based on the several forms of
discussion, which could arise within the security and the
privacy of the devices in the IoT framework. As the latest
technical advancements within the framework of IoT are
bringing major changes with the interoperability of the
devices, hence it would be extremely crucial to maintain the
secrecy of the private data of the user.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
LITERATURE REVIEW
The IoT is a form of a wide-ranging network of the everyday
objects that are in connection with each other with the help of
the internet. The devices within the internet framework are
accessible, addressable and are able to communicate with
each other (Huang, Zhu & Zhang, 2014). Every object within
the IoT framework would have their own designated ID. They
have the capability to communicate with other devices, sense
and would also be able to compute the basic problems. The
nature of pervasiveness of the various kind of objects within
IOT would enable the collection and the transmission of the
data for the private and the public use (Vlacheas et al., 2013).
The data integrity and the confidentiality of the data, which is
transmitted should be maintained properly. The
authentication of the different kind of objects is one of the
major aspects of the IoT based framework. The major issues to
the security of the devices within the network of IoT is
authentication, identification of the devices and the data and
heterogeneity of the data (Tonjes et al., 2014). There are a
number of different kind of challenges, which are needed to
be considered within the IoT framework that includes the
mechanism of the communication in scalability, integration,
ethics and the surveillance within the various models of the
business.
The IoT Based Technologies
There are many major technologies within the IoT
framework. These would include the Wireless Sensor
Networks (WSN), Radio Frequency Identification (RFID) and
the Near Field Communication (NFC).
Wireless Sensor Networks (WSN) This is a kind of
technology for the purpose of the use in the field of remote
sensing and with the collection of the information. The
wireless networks are good in the power of efficiency,
consume less amount of power and are cost effective. The
problems within the WSN could be solved with the help of the
deterministic algorithm that has the ability to cover the
common regions (Turanovic, Brumen & Holbl, 2014)
Radio Frequency Identification (RFID) – This is one of the
major form of technology that is used. Every object that is in
connection with the IoT framework would have a smart tag,
which is embedded within the devices (Zou et al., 2014). This
would help in the configuration of the other devices, which
would be possible with the help of computers. The objects
with the network of the IoT has an embedded microprocessor
or a smart chip. This would provide the capability to the
devices in order to sense the other devices that are also
connected within the network of the internet, compute the
necessary information and then would be able to
communicate the results to other objects or humans (Lee &
Lee, 2015).
Near Field Communication (NFC) – NFC is regarded as one
of the prime technologies that are mainly used for the
communication within the various kind of devices that are in
close connection with each other. The NFC based technology
make use of low power and require data. This technology is
also capable of supporting some basic features of IoT that
would include control of the accessibility, transport, smart
cards and other kinds of facilities (Coskun, Ozdenizci & Ok,
2013).
IoT Protocols Based on the Security
The network of IoT has been able to cover a wide range of
the application products. With the increasing use of the
number of devices, there is a high need of the number of
protocols. The different kind of protocols that are used for the
use in the higher level would be assigned to specific vendors.
They would provide the scope for the exact selection of the
different kind of capabilities and the features (Granjal,
Monteiro & Silva, 2015).
The Quick UDP Internet Connection (QUIC) is a form of
protocol that makes use of the User Datagram Protocol (UDP).
This protocol would be capable of supporting a merged group
of several connections. The QUIC protocol owns the capability
to provide security similar to the to the Transport Layer
Security or with the Secured Sockets Layer. The protocol has
the additional feature of the reduction of the latency of
transport and the number of the connections. The QUIC
protocol is designed in such a way that it would be able to
estimate the bandwidth in both directions. This would help in
the avoidance of the problems related with the congestion of
the networks (Zanella et al., 2014).
The Datagram Transport Layer (DTLS) is another form of
protocol that is primarily responsible for the supply to the
privacy of the communication for the purpose of UDP. The
DTLS protocol would be helpful in enabling the applications of
the server/client in order to be eligible for any such issues with
the interfering of the messages, imitation of the messages or
eavesdropping. These are to be avoided.
Needs for the Security and Privacy
The devices that are connected within the IoT framework
have a restricted amount of resources. Hence the complete
security suite could not be provided and used. Specially
designed frameworks for the purpose of security could be
designed or they could even be acquired from the existing
solutions. For providing solutions based on the security,
lightweight solutions have to be made for the purpose of
securing the IoT network.
1. Requirements of the Security Framework – The impact
on the privacy and the security of the data of different users
would be entirely based on the architecture of IoT. The
meaning of the security and the privacy would be necessary in
order to secure the data of the user within the IoT
environment. The privacy of any information is the individual
right (Bernabe et al., 2014).
1.1 Privacy of the User – There are certain number of steps,
which is needed to be persuaded so that the supplier of the
information would be able to abstain from a lookup system
that is in connection with the user. The most important
requirement within the IoT networks is to keep a focus and
thus be able to enhance the user privacy and secure the
information in an efficient way.
The tagging of the data would also be needed to be put
forward for the sole purpose of managing the privacy of the
information within the IoT environment. This process is also
Document Page
meant to preserve the important data that would be able to
demonstrate the privacy model.
1.2 Control of Access The information provider should be
capable of applying any kind of mechanism for the purpose of
the control of access. This would mean to secure the data
from any kind of potential misuses and any form of damage to
the private based information.
1.3 Management of the Identity – The IoT network is
mainly considered as one of the vast area of administration
that deal with the identification of any type of object by using
different forms of techniques within the system. This would be
able to control the access by providing the rights to the users
and putting some barriers to the identity that has been
identified (Zhao & Ge, 2013).
1.4 Secure Communication of Data – The communication of
the secured form of information would be considered as one
of the important part in the environment of IoT. This process
would include the authentication of the various objects, which
would be able to communicate and thus maintain the data
integrity. This would also involve the method of data
protection within the objects that are communicating with
each other (Jing et al., 2014).
1.5 Resilience against Attacks - Several attackers are
capable of discovering and exploiting any such kind of
vulnerability within the pre-existing system in relation with the
open and the IoT connected world. The IoT based systems
should be capable of supporting any such kind of mechanism
in order to protect themselves from any such kind of
vulnerable attacks. The IoT based system should protect
themselves against single point of failure and they should be
able to adjust in several cases of node-based failures.
1.6 Mobile Based Security – There is always a regular
movement of the nodes of the mobile from one part of the
cluster of networks to another part of the IoT based network.
In order to allow for the privacy of the data, a protocol based
on cryptography should be constantly kept in usage. The ad-
hoc based protocol should be able to provide the ability for
the quick supply of the several kind of protections and thus
provide guard against the attacks. The attacks would include
the process of eavesdropping, the tracking of the location and
the replay based attack and many other kinds of attacks.
2. Technologies for Enhancing of the Privacy – The primary
area of concern for the issues related to the privacy and the
security of the data within the framework of IoT is in direct
relation with the privacy of the data of the user. To enhance
the private data of the user, there a number of technologies
that are currently being used.
2.1 Security of the Transport Layer – The Transport Layer
Security (TLS) is extremely helpful in order to increase the
integrity and the confidentiality within the data within the
network of IoT. The major issue within the TLS is that each of
the object would have a major requirement of the connection
based on the TLS and they would in search for the
information.
2.2 Virtual Private Network These are the kind of
networks, which could be easily accessible from the outside
based area that would be formed with the help of a close
group. The VPN based networks could easily access the IoT
based systems. This would promise to main the user
confidentiality and the maintenance of the data integrity. The
VPN is not responsible for providing the information. The
information would remain confined within a limited area that
would help in enhancing the privacy of the information.
2.3 Encryption of the Data – The majority of the devices
that are in connection with the framework of IoT are operated
on the power of the battery. The technology of encryption
would be able to provide constraints for low processing power
based algorithms. The encryption could be performed for the
purpose of data integration and the transportation of useful
data.
2.4 Onion Routing – This is considered as one of the
technique for enhancing the data privacy, which would be able
to encrypt and thus merge the traffic of internet for several
kind of sources. The technology of onion routing could affect
the matching of the different packets of data from a particular
source.
3. Major Issues of Security – The IoT based technology
through the change of time. It has been a major change within
the technical field. In order to design the IoT network in a
feasible way, it is extremely important to reduce the costs and
hence increase the number of devices, which would be
supported by the devices. There are a major of technical issues
along with the security issues that would be needed to be
solved before the goals would be achieved for the purpose of
wider adoption of the IoT based environment.
The major technical based issues within the framework of
IoT would include the wireless communication, security of the
energy and the scalability. The vital issues that are in relation
with the security are:
3.1 Identification – The identification of any kind of device
that would be mainly required for the purpose of keeping a
check based on the originality or any form of malicious code.
There would be a need for the purpose of the reference of the
manufacturer.
3.2 Authentication The biggest issue within the
environment of IoT is of authentication. The authentication of
every connected device within the framework of IoT is a
difficult task. There are many mechanisms for the security that
had been proposed earlier and they would be based on the
cryptographic based primitives of the private key.
3.3 Management of the Data – The prime problem within
the environment of IoT would be based on the identification of
the several kind of devices and thus would address the various
kind of issues, which might arise (Abomhara & Koien, 2014).
4. Remediation of the Problems – Various kinds of solutions
to the various issues that are in relation with the privacy and
security in the IoT framework are:
Document Page
4.1 Identification – The identification of the several devices
could be performed by considering the physical addresses of
the deployment with the help of the IPv6.
4.2 Authentication – The authentication based process of
the several devices within the current timeframe could be
regarded as an issue. The RFID is able to play a major role for
the identification based purposes based on the several kind of
objects. The process of authentication makes use of the
electromagnetic induction and the propagation of the
electromagnetic waves for the purpose of identification of the
different objects (Xiaohui, 2013).
4.3 Management of the Data – The process of identification
with the help of the bar coded image would be considered as
the common methods and thus would consume less amount
of power. The barcode scanner would be able to scan the
barcoded image that would be able to transfer the data, which
would be identifies with the help of computers (Wu et al.,
2016).
CONCLUSION
Based on the above report, it could be concluded that in the
recent times, IoT could be taken into consideration as one of
the important part related to the future of the internet
technology. With the ongoing developments within the IoT
environment, the privacy and the security of the devices that
are in connection with the internet would also be needed to
be developed. To achieve the goal of the security and the
privacy of the information, a proper framework design is
extremely crucial. There are some major research areas in
which the focus should be put such as the appropriate use of
the Big Data, dependencies, openness, scaling and
architecture. As there is no such standards for the IoT
architecture, it is extremely crucial to have a form of
architecture. This would help in the control, communication
and the connectivity of the information. The need of a proper
framework for the security of the devices should be taken into
deep consideration. The research paper has also put a deep
focus on the on the several forms of the privacy of the data of
the user and the issues of the security within the IoT
framework. These aspects also include the applications and
the architecture of the IoT.
REFERENCES
Abomhara, M., & Køien, G. M. (2014, May). Security and
privacy in the Internet of Things: Current status and open
issues. In Privacy and Security in Mobile Systems (PRISMS),
2014 International Conference on (pp. 1-8). IEEE.
Bernabe, J. B., Hernández, J. L., Moreno, M. V., & Gomez, A. F.
S. (2014, December). Privacy-preserving security framework
for a social-aware internet of things. In International
conference on ubiquitous computing and ambient
intelligence(pp. 408-415). Springer, Cham.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014,
August). On the integration of cloud computing and internet
of things. In Future internet of things and cloud (FiCloud),
2014 international conference on (pp. 23-30). IEEE.
Coskun, V., Ozdenizci, B., & Ok, K. (2013). A survey on near
field communication (NFC) technology. Wireless personal
communications, 71(3), 2259-2294.
DEZHGIR, H., & HOOSHMAND, H. (2017). SECURITY ON THE
INTERNET OF THINGS.
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the
internet of things: a survey of existing protocols and open
research issues. IEEE Communications Surveys &
Tutorials, 17(3), 1294-1312.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013).
Internet of Things (IoT): A vision, architectural elements,
and future directions. Future generation computer
systems, 29(7), 1645-1660.
He, W., Yan, G., & Da Xu, L. (2014). Developing vehicular data
cloud services in the IoT environment. IEEE Transactions on
Industrial Informatics, 10(2), 1587-1595.
Huang, H., Zhu, J., & Zhang, L. (2014). An SDN_based
management framework for IoT devices.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014).
Security of the Internet of Things: perspectives and
challenges. Wireless Networks, 20(8),
Khalil, N., Abid, M. R., Benhaddou, D., & Gerndt, M. (2014,
April). Wireless sensors networks for Internet of Things.
In Intelligent Sensors, Sensor Networks and Information
Processing (ISSNIP), 2014 IEEE Ninth International
Conference on (pp. 1-6). IEEE.
Lee, I., & Lee, K. (2015). The Internet of Things (IoT):
Applications, investments, and challenges for
enterprises. Business Horizons, 58(4), 431-440.
Rifkin, J. (2014). The zero marginal cost society: The internet of
things, the collaborative commons, and the eclipse of
capitalism. St. Martin's Press.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015).
Security, privacy and trust in Internet of Things: The road
ahead. Computer networks, 76, 146-164.
Sivaraman, V., Gharakheili, H. H., Vishwanath, A., Boreli, R., &
Mehani, O. (2015, October). Network-level security and
privacy control for smart-home IoT devices. In Wireless and
Mobile Computing, Networking and Communications
(WiMob), 2015 IEEE 11th International Conference on (pp.
163-167). IEEE.
Tönjes, R., Barnaghi, P., Ali, M., Mileo, A., Hauswirth, M., Ganz,
F., ... & Puiu, D. (2014). Real time iot stream processing and
large-scale data analytics for smart city applications.
In poster session, European Conference on Networks and
Communications.
Turkanović, M., Brumen, B., & Hölbl, M. (2014). A novel user
authentication and key agreement scheme for
heterogeneous ad hoc wireless sensor networks, based on
the Internet of Things notion. Ad Hoc Networks, 20, 96-112.
Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D.,
Foteinos, V., Poulios, G., ... & Moessner, K. (2013). Enabling
smart cities through a cognitive management framework
for the internet of things. IEEE communications
magazine, 51(6), 102-111.
Wortmann, F., & Flüchter, K. (2015). Internet of
things. Business & Information Systems Engineering, 57(3),
221-224.
Wu, D. J., Taly, A., Shankar, A., & Boneh, D. (2016, September).
Privacy, discovery, and authentication for the internet of
things. In European Symposium on Research in Computer
Security (pp. 301-319). Springer, Cham.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Xiaohui, X. (2013, June). Study on security problems and key
technologies of the internet of things. In Computational and
Information Sciences (ICCIS), 2013 Fifth International
Conference on (pp. 407-410). IEEE.
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M.
(2014). Internet of things for smart cities. IEEE Internet of
Things journal, 1(1), 22-32.
Zhao, K., & Ge, L. (2013, December). A survey on the internet
of things security. In Computational Intelligence and
Security (CIS), 2013 9th International Conference on (pp.
663-667). IEEE.
Zou, Z., Chen, Q., Uysal, I., & Zheng, L. (2014). Radio frequency
identification enabled wireless sensing for intelligent food
logistics. Phil. Trans. R. Soc. A, 372(2017), 20130313.
1 out of 5
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]