Security Challenges in the Internet of Things (IoT)

Verified

Added on  2020/04/01

|4
|1836
|31
AI Summary
The Internet of Things (IoT) has revolutionized various industries by enabling interconnected devices to communicate seamlessly, thereby facilitating smarter environments and more efficient operations. However, this interconnectivity also introduces significant security challenges that can lead to severe consequences if not addressed effectively. Among the primary threats are unauthorized access, data breaches, and cyber-attacks targeting IoT devices. These vulnerabilities arise due to factors such as inadequate authentication mechanisms, lack of robust encryption protocols, and insufficient software updates. The paper delves into these security issues by examining case studies and current incidents that underscore the importance of securing IoT ecosystems. It then explores a range of solutions designed to mitigate these threats, including advanced encryption techniques, machine learning-based anomaly detection systems, and comprehensive device management frameworks. By implementing multi-layered security approaches and fostering collaboration among stakeholders, organizations can enhance their defenses against potential cyber-attacks. The paper concludes by emphasizing the need for ongoing research and development in IoT security to keep pace with evolving technological advancements and emerging threats.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network Management
Internet of Things
Authors Name/s per 1st Affiliation (Author)
line 1 (of Affiliation): dept. name of organization
line 2-name of organization, acronyms acceptable
line 3-City, Country
line 4-e-mail address if desired
Authors Name/s per 2nd Affiliation (Author)
line 1 (of Affiliation): dept. name of organization
line 2-name of organization, acronyms acceptable
line 3-City, Country
line 4-e-mail address if desired
Abstract— The concept of IoT is based on the
collection of many interconnected objects, people,
device and services that can interact as well as share
data along with information to accomplish common
set of goals in different sectors and applications.
Keywords—IoT, data, integrity, authentication
I. INTRODUCTION
The IoT is the concept for allowing the objects to be
sensed or controlled in the network infrastructure. It can
create better opportunities for the direct integration
into the computer based systems. [1] The improved
efficiency with economic benefits is mainly to reduce the
human intervention.
II. LITERATURE REVIEW
IoT is mainly to offer the advancement in the
connectivity of the devices, systems and then working
over the machine—to-machine communication and
covering the different variety of protocols. The
interconnection of the protocols, domains and the
applications is set with enabling the advancement of
the application. The strategy is clear and clever since it
is backed with functions that will help in heating in
remote manner and set it to completely turn down the
temperature when not required or no one is using.
Some can also tell the latter with the help of the
technology like motion sensing cameras or by tracking it
on smartphone. [2]
The concept of IoT is not limited to this because it
has the capacity to scale up and consist of many kinds of
smart towns where connected traffic signals that can
supervise the use based on utility. There are smart bins
as well which says that they should be emptied and the
industry with all kind of connected machinery for things
cover tracking the part to monitoring the crops. There is
a fact where the government is motivating energy based
companies to handle smart meters and all the functions
along with automated usage is more effective which
means there is usage of less energy. [3] There are
number of areas of IoT that shows such advantages with
the help of advanced gadgets which are more based one
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
whizz impact than the effectiveness and it may also be
the reason of more smart gadgets around. It is very
important to understand that every new and shiny thing
has some disadvantages as well and there is existence of
security as well as privacy that are some of the biggest
challenges for IoT. All the machines as well as systems
can collect a lot of personal based data related to people
and have smart kind of meter that understands the
presence of people at home or usage of electronic items
in the presence of people and it is also shared with other
machines as well and held based on databases as and
when provided by the companies. [4] There are number
of security experts that claims that there are not all the
possible actions are taken to build the security system
along with privacy into it usually at the early stages. To
prove this, some experts hacked the number of devices
from a connected monitor to automate the lights as well
as smart devices along with many city-wide systems like
traffic signals. The hackers have not for many part put a
lot of attention on the concept of IoT and there are
many people who connected their devices against any
kind of attack. But it is obvious with time hackers or
cyber-criminals will find a way for it as well. [5]
The framework of IoT is further susceptible to any kind
of attack with every layer and thus, there are many
challenges associated with security and need that must
be addresses. The present state of research in the
concept of IoT is mainly aimed on authenticating and
with access based control protocols. However, with rise
in level of advancement of present technology it is
important to also incorporate new networking based
protocols like 5G to accomplish the mashup of IoT
based topology. Another crucial method for the
authentication of ID at sensor nodes of the system. It is
also considered as a one time and one of its kind of
cipher based on request related methods. There are
dynamic elements cipher is executed by usage based
pre-shared matrix that exist between the interaction
related parties. The parties can create a randomly
coordinated effort that will help as the main coordinate.
The important coordinate which can get transferred
between the two parties not the important stuff. The
key in other words is also called as password and is also
generated from the present coordinate. All the
messages are then sent with the help of encryption with
the help of the key along with important coordinate,
timestamp and device IDs. [6] Therefore, there are two
devices that can interact by properly validating the
timestamps and therefore can also cancel the session
associated with it. A mutual authentication scheme was
presented by IoT since the platform and because of
terminal nodes. The scheme also based on hashing and
the nature of extraction. The characteristics of
extraction was also combined with hash activity to
ignore any kind of collision attack. The scheme also
provides a desirable solution for gaining authentication
in the system. The used process of extraction has all the
important properties that are completely irreversible
and needed to make sure the security level and it is also
light weight which can be desired in the process. The
scheme also aims on many authentication processes
especially when the platform is trying to send
information to the nodes of terminal. However, the
scheme will also improve the security by comfortably
keeping the information sent is decreased and it work
Document Page
only based on theory and there is no other proof of the
concept that can support it.
III. CURRENT AND FUTURE SECURITY ISSUES IN IOT
The issues are related to data confidentiality: it
is significant to make sure that the data is safe and only
present to provide authority to people. In IoT the work
user consists of human as well as devices and services.
It also consists of many internal objects as well that are
specifically part of the network and there are external
objects as well where the devices that are not part of
the current network. [7] For instance, it is important to
ensure that the sensors do not reveal the current
collected data for many neighbourhood nodes. There is
one more problem that should be addresses in the IoT
based security is how data will be managed. It is crucial
for the users of IoT to stay more aware of data based
management as well as mechanism that will be applied
along with the process or employees accountable for
the management and to make sure that the data is
protected in the complete process.
Authentication in every object in the concept
must be able to clearly recognize as well as authenticate
many other kinds of objects. At the same time, the
process can create problems since it is based on the
nature of IoT and there are number of entities that are
part of the process. Moreover, there are times when
the object can need to communicate with many other
objects from the starting. Integrity is the process of IoT
primarily based on overall exchange of data and
information that exist between different kind of devices
and it is also crucial to make sure the overall accuracy of
the current data and data is being received from the
right kind of sender as well as also make sure that the
data is not meddled with in the process of transmission
because of unintended interference. [1]
IV. SOLUTIONS FOR THE THREATS
The implementation of the mobile device
management program will help in taking control of the
policies which has access to the different profiles and
the development. [3] The specifications are on how the
devices are secured, tracked and managed. This is
important to analyze the restrictions with the attack
vendor associated with the IoT data to make sure that
the attacks are not introduced in the network. The
overall integrity based features also imposed by
maintenance of end to end security in the
communication. The overall traffic associated with data
can be managed typically by the usage of the firewalls as
well as protocols. However, these processes do not
always guarantee the overall integrity of the finish line in
this concept. [3]
CONCLUSION
The concept can also be executed in many diverse
domains which consist of transportation, healthcare,
agriculture, production of energy as well as distribution
and many other connected areas. IoT need things to
interact over the Internet to conduct business functions
in an intelligent manner without any active involvement
of human beings.
REFERENCES
Document Page
[1] Chahid Y, Benabdellah M, Azizi A. Internet of things
security. InWireless Technologies, Embedded and
Intelligent Systems (WITS), 2017 International
Conference on 2017 Apr 19 (pp. 1-6). IEEE.
[2] Svigals J, inventor. Internet of things security.
United States patent US 9,432,378. 2016 Aug 30.
[3] Li S, Da Xu L. Securing the Internet of Things.
Syngress; 2017 Jan 11.
[4] Dawson M, Dawson M, Eltayeb M, Omar M.
Security Solutions for Hyperconnectivity and the
Internet of Things.
[5] Cheng KM, Tseng CE, Tseng CH. Maker and Internet
of Things application in the intelligent security by
example of power extension cord. InApplied System
Innovation (ICASI), 2017 International Conference
on 2017 May 13 (pp. 239-241). IEEE.
[6] Li S, Tryfonas T, Li H. The internet of things: a
security point of view. Internet Research. 2016 Apr
4;26(2):337-59.
[7] Bughin J, Chui M. The Internet of Things: Assessing
Its Potential and Identifying the Enablers Needed to
Capture the Opportunity. InThe Internet of Things in
the Modern Business Environment 2017 (pp. 111-
125). IGI Global..
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]