IoT Privacy and Security in Smart Devices: ITC595 Assignment

Verified

Added on  2025/05/03

|4
|2279
|188
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
INTERNET OF THINGS – PRIVACY AND SECURITY
A. Author
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT The Internet of things also known as IoT
provides a basic framework that gives a medium for the
interaction between the human and gadgets with the use of
internet connections. All the electronics devices are embedded
with sensors and connected via the internet and can track the
data from anywhere. One can operate all the applications task
in various ways and can perform various tasks depending upon
the command. In 1999 IoT is founded by Kevin Ashton. As all
the IoT things are stored on the cloud, it needs proper security
and preventive measure to protect the data from misuse. As the
IoT is the fasting emerging technology and it also in the boom
in various fields which leads to the adaptation of this
technology at a very high speed. It helps in various situations
and automatically senses the things and able to it with the help
of sensors. For example, automatic lights on-off in a room,
when a person is entered in a room the lights will automatically
on and when it will go out it will automatically off. It helps in
saving the energy but it is not cost effective, its cost for the
implementation and maintenance goes high because of some
various factors also the security cost also goes up high which
cost the total system highly costly, they are implemented on a
smart house, smart metro cities and many more place where it
find useful. This IoT plays a vital role in the implementation of
these things in 2020 around 20 billion devices are equipped
which this technology. The word things in the internet of things
refers to a machine equipped with IoT or a human being which
is operating, here objects are given specific IP addresses which
can be enable to transmit and receive the data with the help of
the internet. The technology used in devices is the embedded
technology that helps to interact with objects and perform the
task as per the command [4].
Keywords Internet of things, security, data security, cost
valuation.
INTRODUCTION
With the increasing demand technology and smart devices
which are equipped with internet connection, the need of
Internet of things increase gradually as it has good compilation
with all the smart devices and its popularity increase because of
its low power loss, in Internet of things, things are refer to as a
smart embedded sensor that are connected with an internet
connection. With the help of internet connectivity, the sensors
in the IoT can perform functions remotely to done the desired
task. The sensors are embedded in a small device to large
devices each sensor has a unique function. for example, a
thermosensor is used in a refrigerator for regulating of
temperature this can be controlled remotely by using the
application, these sensors are also used in washing machines,
camera, smart cars with the help of these sensors all the things
are operated easily and remotely with an application.
IoT is mostly used in a security camera for the surveillance, the
camera video can be accessed from anywhere via the internet
and can also help in rotation of camera angles with the
application. These are things which one can do form the IoT. In
the future, IoT plays a vital role in making life simple and
advanced. As the benefits of IoT is very good but its security
cannot be neglected, it can be easily hacked by any third person
because of its some loopholes which make this technology
unsafe for many purposes. This technology is totally based or
work on the data updates so its accuracy is not good sometimes
and it also runs on the battery so its life is also less [3].
A. Research Problem
In the Internet of Things, serious issue faced every time is
the security of the gadgets, as all the gadgets are operated
by using the internet, so it is easily hacked by the intruder
and access the gadgets. For example, in a smart house the
door is lock and unlock by sensors which are operated by
application via internet if the application would hack one
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
can easily open the door of the house and do whatever it
wants so the security concern of it is cannot be neglected.
B. Research Justification
The Internet of things is useful nowadays because of its ease of
use and its compatibility with other smart devices and can be
operated from anywhere. In the future, all the smart devices are
equipped with IoT are the safety of those applications is a must.
All title and author details must be in single-column format
and must be centered.
LITEERATURE REVIEW
The architecture of IoT: it consists of different types of sensors
embedded in the devices and it is interconnected through the
internet, the sensors used in the devices are easily identified
with the serial number or the shape [2].
the architecture of IoT is two parts: -
The first part is the software part which helps in the
coordination of the components, it is modelled in IoT-Lysa
control process are set here, it collects the data from all nodes,
sensors and performs actions as per the command
The second part is the hardware part, it deals with the
environment, it mainly made up of components like sensors
and actuators it helps in collection of data and does all the
mechanical task
In IoT, each node is remembered by a unique name l, this label
tells us much information about the sensors, IP address, data
information. All the collection and compilation of data is done
by each node and each node stored the memory of every
sensor.
Security requirements of IoT:
For a fully secured not network, some methods are used and
some things should be kept in mind for the security of data.
Data privacy and integrity: - As the data is traveled to
multiple paths with multiple reflections it should be encoded
properly to that data could be decoded, proper coding and
decoding mechanism are used for the data so that the attacker
cannot able to decode or change the data of the system.
Authentication: to get a secure transmission, the coding n
decoding key for both the transmitter and receiver has the key
to read the data. The access must be allowed only when the
correct security key is entered. This authentication
implementation must be followed properly and remove all the
loopholes to established a secure connection [4].
There are different types of security level:
High-level security – in this type is referred to the execution
of IoT as follows
1. CoAP security with a network: - The CoAP uses a well-
defined format RFC-7252 which is secured with an encoded
code for the transmission. this level layer is attackable to
attackers to overcome this DTLS is used in various forms to
protect the data from end to end encryption.
2. Unauthorized connection: if the transmission of data is
used on an unauthorized channel it may affect the data privacy.
3. Insecure firmware: The programming language used in
making the software must be tested carefully and firmware also
be checked
mid-level security: - this security mainly concern with the
transmission and receiving path happening at different layers.
The compiling of IPv6 packets is mandatory for the
equipment’s related to IEEE low-level security 802.15.4
standard [5].
1. RPL routing attack; the IPv6 routing procedure for low
energy networks is attacked by an attacker, this attack may
result in the degradation of the sources. Some examples of this
kind are sinkhole and wormhole. In the sinkhole attack, the
intruder tries to decode the transmission path which makes the
path unsafe for the data to travel. In wormhole attack the task
on 6LoWPAN due to wormhole attack in which a packets data
is changed their path from the original path by making a tunnel.
These attacks will lead to a privacy issue of data.
2. Sybil Attack: in this attack, not devices decrease in the
performance when this Sybil attack happen to result in the loss
in the data
3. Transportation level end to end security – it provides an
end to end data security by setting up a secure system so that
the data is encoded properly by the transmitter and only the
2
Document Page
receiver have the key to decode it which results in the proper
safety of the data
4. Session establishment and resumption: - this
communication node sometimes require re-establishment of
changing the sequence number
5. Privacy breach on cloud-based IoT: various attacks may
breach different information and loss of private data which is
based on the IoT. such violations can change and access the
confidential information that is transmitted [2].
Low level: - this is the first and the most basic level of
security at both the hardware and the software, some examples
are
1. Jamming adversaries: - the jamming attack on the wireless
network devices emits radio frequency of different wavelengths
without specific requirements. These interfaces can disturb
some operational task like transmission or receiving of the data
resulting in the degradation of the system
A network must be secured form staring till the end . all the
layers of IoT must be fully secured to stop data being stolen.
2) Man in the middle attack: - in this method a virtual access
point is created which alters the data that is being transmitted,
to done this both devices should use the same
hopping speed. In this no one able to know that any third
person is connected with the devices which are altering their
data. In this type the intruder only alters or access the
transmission information it will not able to enter in the device
information
3) Relay Attack: also known as a reflection attack, two-person
who are communicating are joined with the same devices, both
the person wasn’t able to know that some other devices are also
connected [3].
4) Mac Address spoofing attack: it consists of forty-eight bits
in which the first twenty-four bits are assigned to those entities
which are creating the devices and the rest twenty-four bits are
used by the creator to assign every unique number to devices
for further track. In this attack, a virtual mac address is created
for taking the others data with knowing them
Some best ways to protect the data in IoT:
IoT encoding: - encoding of information between IoT enabled
devices and end systems at rest and in transit using standard
encoding methods, results in maintain data compilation and
prevent hackers to hack the data. The good range of Internet of
Things gadgets and hardware description limit the capacity to
have defined method and protocols for encoding [5].
Always install a good firmware security software on the
mobile, laptops where all the applications are installed
always use different pass-codes for gadgets accounts,
wireless networks, and connected devices. Don’t use basic
passwords in the system to access, such as “name”
always alert While using and installing an application, do
read or go through its various policies written in it and go
through how it will use the information.
Always do the study or read all the information about the
application and application maker, its background which
company is making the application and how it will and
where it stored the information and what type of
information it will use and what information it will share
with other entities
• Always have a idea of what application data it will use share
and what type of permission it will take. By unnecessary
allowance the data with the application will make an issue in
security of data
Always use trusted and secure VPN which helps in the
secure transmission of information on the laptop and the
mobile
Always update the device software frequently for good
protecting of data.
Always alert while sharing any personal information or data
socially, application can store the information like name,
location, financial details. The attacker can track the user by its
location sharing or can stole the money by using their financial
details
Do not leave the gadget or the application unlocked, anyone
can use the application to take the personal information.
Always switch off the data transfer application or switch it off
when not using it. Attacker can pair with the data transfer
application to get the information it is on.
CONCLUSION
All the IoT devices must have inbuilt security for the protection
of data as their demand is increasing day by day its security
layers should be increased so that its data cannot be hacked,
3
Document Page
because of its loopholes in security this technology is not able
to implement properly
References
[1] M. Ahmad and K. Salah, “IoT security : Review , blockchain solutions , and open challenges,”
Future Generation Computer Systems, vol. 82, no. 2, p. 395–411., 2018.
[2] C. Bodei, S. Chessa and L. Galletta, “Measuring security in IoT communications.,” Theoretical
Computer Science, , vol. 764, no. 76, p. 100–124..
[3] D. Minoli and B. Occhiogrosso, “Internet of Things Blockchain mechanisms for IoT security.,”
Internet of Things, , p. 1–13., 2018.
[4] K. Sha, W. Wei, T. A. Yang, Z. Wang and W. Shi, “On security challenges and open issues in
Internet of Things.,” Future Generation Computer Systems, , vol. 83, no. 2, p. 326–337., 2018.
[5] M. Wazid, A. K. Das, R. Hussain, G. Succi and J. J. P. C. Rodrigues, “Authentication in cloud-
driven IoT-based big data environment : Survey and outlook.,” Journal of Systems Architecture, vol.
5, no. 1, pp. 2-8, 2018.
.
4
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]