A Comprehensive Report on Security Challenges in Internet of Things

Verified

Added on  2023/06/11

|9
|2591
|452
Report
AI Summary
This report provides an overview of Internet of Things (IoT) technology, highlighting its characteristics, applications, and security issues. It compares IoT to traditional networks, emphasizing its interconnectivity and data handling capabilities. The report discusses various IoT devices and applications, including smart living and cities, while also addressing security threats like insecure planning, lack of end-to-end protection, and side-channel attacks. Countermeasures such as resilience to attacks, data authentication, and access control are explored as mitigation techniques. The report concludes that IoT has advanced living standards but requires careful attention to security to protect data and privacy.
Document Page
overview of network security [Pick the date]
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction...........................................................................................................................................1
Literature Review on IoT......................................................................................................................1
Characteristics of IoT compared to the traditional network...................................................................2
Iot Devices.........................................................................................................................................2
Applications for IoT..............................................................................................................................3
Security issues in IoT........................................................................................................................3
Countermeasures/mitigation techniques used....................................................................................4
Conclusion.............................................................................................................................................5
References.............................................................................................................................................6
1 | P a g e
Document Page
Introduction
The interest of internet of things has grown from last years. Internet of things plays an
important role as it has changed the living standards of people and has altered the business
models. This report consists of the usage of internet of things in different applications which
is rising rapidly in the coming years. This report consists of detail description about features
of IoT and the applications where they are used. It helps the devices to communicate with
each other remotely without any human efforts. The main motive behind IoT is to offer a
smart environment and allowing the data to be accessed only by authorised users. Internet of
things is a booming technology that allow any business and service to access the data from
anywhere at any time[1]. This also leads to various attacks which may violate the privacy of
the network, all such cases has been future discussed in this report. This report also highlights
the major security issues that arises in the system due to IoT and the count measures used to
remove the flaws as also been discussed.
Literature Review on IoT
According to [2], Internet of things is a new concept which has changed the working
of an environment. It can be seen as a network of physical devices which are embedded along
with software’s. It makes all the devices unique by identifying them through the system.
Internet of things makes possible that all the system are controlled remotely by offering more
opportunities. Internet of things has resulted in improving the efficiency and economic
benefit of an organisation by reducing the human efforts. Internet of things makes use of
technology which helps in tracking the inventory and also provides control measures. Internet
of things covers all the smart devices and objects that are connected to internet. Thus all the
devices connected through internet form up a system, and such a system is termed as internet
of things. It is a smart feature that helps devices to communicate with each other and
complete the work automatically without any human involvement [3]. Every device is
connected to each other through internet that allows user to access the devices remotely.
In the views of [4], Internet of things make possible to access all the devices remotely by a
single devices. The process covers the connection of devices by capturing all the data through
sensors and then stores over big data. It makes use of artificial intelligence to analysis the
2 | P a g e
Document Page
communication over network. It offers huge benefits to smart applications and stakeholders
to get tangible benefits.
According to [5], Internet of things is a popular used technology and has covered almost all
the domain like agriculture, healthcare, mining and storing of data in an innovative system.
Internet of things can be seen as a secure place to secure the network and improve the
efficiency. Internet of things cover three C’s that is communication, control and automation
and cost saving. IoT helps in communicating with people and system to keep track of all the
information. It also helps business to control the work remotely by possibly delivering all the
response to the end users [6]. It also saves the overall cost of the business by improving the
overall performance. It also improves the customer’s engagement by attracting more audience
and improving their experiences by technology optimization. It improves the way in which
management of resources is done by analysing the data in an effective manner.
Characteristics of IoT compared to the traditional network
It offers interconnectivity among all the devices over the globe. Internet of things is
better than the old tradition methods as it is capable of providing privacy protection between
the devices by making them connected to each other virtually. It covers all the devices that
are different in terms of hardware platform. The traditional methods do not allow devices and
services to interact through each other over a different network. Internets of things make this
possible for all the devices to interact on a platform through different network. The traditional
method did not allow any devices to change their state dynamically. The enormous scale of
devices is managed altogether with the help of internet of things [7]. It also helps in data
handling by interpreting data easily. Internet of things also offers better safety as compare to
old traditional method. It secures the end points of the network by enabling accessing over a
network. It offers better characteristics as compared to rational method as it is cost effective
approach that offers high security and privacy of network.
Internet of things is often used in home security that helps in monitoring and
controlling the applications and smart devices. It also helps in making right decisions as more
information is stored at a single place. It also saves the overall time by monitoring the devices
digitally. It allows machines to interact with each other without human intervention [8]. The
biggest advantage of interne of things as compare to traditional method is money.
Iot Devices
Internet of things uses many devices that are connected over the network with the
ability to transfer data. There are various home applications where IOT devices are used like
in hardware’s, sensors, communication technology, network technology, software’s and
algorithms, signal processing and various security and privacy technology.
The devices that are connected through a network include smart TVs, speakers and
many more smart appliances [9]. The Internet of Things refers to the ever-growing network
of all the physical devices that include vehicles, software’s, actuators and other objects that
enables the connectivity to exchange the data.
3 | P a g e
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Applications for IoT
Internet of things has various applications and is used in diverse areas.
Internet of smart living- Internet of things have offered many ways to make the
living easy. There are various remote control appliances that save energy and also
help in transmitting to long distance. There are various smart appliances used in home
like refrigerators, LCD screen and automatic electrical appliances [10]. These
appliances make use of internet of things that helps in eliminating the human efforts
by making all the work automatically.
Internet of smart cities- It involves monitoring the material and conditions of all the
buildings, bridges and roads in the city. Internet of things analyse the devices properly
by also proving alerts of the conditions that are not appropriate and harmful for the
city. Internet of things has involved cities in many ways as they offer smart parking
facility along with smart waste management in the city.
Wearable’s- Internet of things has been mostly used among wearable these days. It is
a new innovation that is been used by many people in present time [11]. The wearable
are very beneficial for humans as they keep the record of all the activities. It includes
smart watches, headphones, smart glasses, camera or clothing that is connected via
internet.
Security issues in IoT
Apart from proving carious benefits internet of things offers threats in daily life as
well. Security threats are related to the loss of information or service. Internet of things also
affects the physical security of network. It is necessary to consider the importance of security
in the applications of IoT to protect all the data from the threats [12]. It is important to secure
the channels as privacy of information is significant. Some of the security threats that are
caused due to internet of things are:
Secure planning- The interconnection and communication of devices vary according
to the scenario. As in case of IoT data is collected from various devices that are
connected over a network and data is shared between these devices. Thus there are
chances of leakage of privacy as anyone and everyone can access the information
from anywhere.
End to end protection- Internet of thing do not offer any end to end protection of
data packet as it is connected to millions of devices all together. It does not offer a
framework to protect the data packets and manage the privacy of data. The main issue
arises at time of misconfiguration of services. There are no such realistic policies and
security mechanism to protect the data.
Side channel attacks- Tough data packets are encrypted still they leave the scope of
side channel attack. In this the information is leaked by some side doors and can be
accessed by unauthorised users [13]. This leads to trust issues among the
organisations as now day’s companies completely rely on the information that is
stored on internet. Hackers identify the side channels to enter the system and access
the data.
4 | P a g e
Document Page
Countermeasures/mitigation techniques used
Internet of things has changed the living style in the society. They offer various issues
that need to be resolved. So, some mitigation techniques have been discussed to secure the
network.
Resilience to attacks- The system is designed in such a way that they are capable
enough to recover themselves after the attack [14]. There are chances of data leakage,
unauthorised access and many attacks thus it that cases system should be prepared to
recover from all the intrusion. So, that no loss of data occurs.
Authentication of data- Internet of things covers all the sensitive information of an
organisation thus it is necessary to provide proper authentication. The authentication
mechanism should be done in such a way that it allows only authenticated data to be
transmitted and blocking all the users.
Access control- To avoid the chances of loss of confidentiality and integrity a proper
access control should be provided. There should be a proper control regarding who
can read and access the information. If the rights are provide in a proper manner than
misuse of information will not occur. The defining the rights of information only valid
users could read the relevant portion of the database.
5 | P a g e
Document Page
Conclusion
It can be concluded from this report that internet of things has advanced the living
standard in the society by offering various services that are automatic and easily access
from anywhere. Internet of things can be seen as a technology to improve the flexibility
among users.in this report the analyses has been done upon the how internet of things is
better than the old traditional methods. Apart from that it has covered devices in very
field thus various devices that are used in IOF has been discussed. This report also throws
the limelight on the applications that are offered by internet of things. Apart from that
they offer various security issues that have discussed and their countermeasures have also
been discussed.
6 | P a g e
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
[1] F, Wortmann, and F Kristina. "Internet of things." Business & Information Systems
Engineering 57, no. 3, pp. 221-224, 2015
[2] A, Osseiran, E, Omar, JaeSeung Song, and M Jose. "Internet of Things." IEEE
Communications Standards Magazine 1, no. 2 , pp. 84-84, 2017.
[3] S, Chandrakanth, K. Venkatesh, M, Uma and K. Naganjaneyulu. "Internet of
things." International Journal of Innovations & Advancement in Computer Science 3, no. 8
pp. 16-20, 2014
[4] Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A survey." IEEE
Transactions on industrial informatics 10, no. 4 (2014): 2233-2243.
[5] M, Bawa, C, Dagma, S, Ivan and S, Daniela. "Importance of internet of things and big
data in building smart city and what would be its challenges." In Smart City 360°, pp. 605-
616. Springer, Cham, 2016.
[6] M, Georgescu and P, Daniela. "The Importance of Internet of Things Security for Smart
Cities." In Smart Cities Technologies. InTech, 2016.
[7] G, Ho, L,Derek,M, Pratyush ,H, Ashkan , S, Dawn and W, David. "Smart locks: Lessons
for securing commodity internet of things devices." In Proceedings of the 11th ACM on Asia
conference on computer and communications security, pp. 461-472. ACM, 2016.
[8] Maheshwari, Ankit, K, Akash and S, Atul. "MANAGING INTERNET OF THINGS (IoT)
DEVICES BASED ON ELECTRICAL POWER RELIABILITY." U.S. Patent Application
15/266,780, filed March 15, 2018.
[9] Kamath, H, Srikanth, P, Suyashi, and T, Kar. "Security Issues in Internet of
Things." International Journal of Emerging Research in Management &Technology 6, no. 5,
pp-260-264, 2017.
[10] Whitmore, Andrew, A, Anurag and Li Da Xu. "The Internet of Things—A survey of
topics and trends." Information Systems Frontiers 17, no. 2 ,pp- 261-274, 2015.
[11] S., Sicari, A., Rizzardi, L.A Grieco,. and Coen-Porisini, A., Security, privacy and trust in
Internet of Things: The road ahead. Computer networks, 76, pp.146-164, 201
[12] Sadeghi, Ahmad-Reza, Christian Wachsmann, and Michael Waidner. "Security and
privacy challenges in industrial internet of things." In Proceedings of the 52nd annual design
automation conference, p. 54. ACM, 2015.
[13] Conti, Mauro, Ali Dehghantanha, Katrin Franke, and Steve Watson. "Internet of Things
security and forensics: Challenges and opportunities." pp-544-546, 2018.
7 | P a g e
Document Page
[14] Sadeghi, R, Ahmad, W Christian, and W Michael. "Security and privacy challenges in
industrial internet of things." In Proceedings of the 52nd annual design automation
conference, p. 54. ACM, 2015.
8 | P a g e
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]