SlideShare a Scribd company logo
1 of 6
Download to read offline
A Review on Privacy and Security Challenges in
the Internet of Things (IoT) to protect the Device
and Communication Networks
S. Balamurugan
Ph.D., Research Scholar
Department of CSE,
Annamalai University.
chella40978@gmail.com
Dr. A. Ayyasamy
Assistant Professor
Department of CSE
Annamalai University.
samy7771@yahoo.co.in
Dr. K. Suresh Joseph
Assistant Professor
Department of Computer Science
Pondicherry University,
Ksjoseph.csc@gmail.com
Abstract— Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
Keywords— Internet of Things, D2D, communication
Technology, internet, privacy, security, issues, challenges.
I. INTRODUCTION
Now-a-days the different communication technologies are
used to interconnection for the transfer of information, more
number of issues in security and privacy sectors. IoT [1] finds
its application in the all the fields, since new mode of
communication between the different systems and devices.
Internet of Things (IoT) also called the internet of everything
or industrial network is a wide technology which is been
viewed as a global network of machines and devices capable
of interacting with each other. The IoT allows things to be
controlled remotely across existing network infrastructure,
provide opportunities for more direct integration of the
physical world into computer-based systems, and resulting in
improved efficiency, accuracy and economic benefit in
addition to reduced human intervention. If the IOT devices are
poorly secured, cyber attackers will use them as gateway to
cause harm to other devices in the network. So, here arises the
issues in security and privacy and more attention is required in
IoT especially authenticity, confidentiality and integrity cum
availability [2] of data and services in IoT.
The main objective of this paper is to highlight security and
privacy issues surrounding Internet of Things. In terms of
security, IoT is a technology with unlimited challenges
because of following reasons:
a) IoT is typically regarded as extension of current
internet to several different technologies like Mobile
Broadband, Wireless Sensor Network which are open to attack
because of various loopholes.
b) In IoT, each and every device is be connected to
Internet and Internet is always an unsecured mode which
makes all these devices open door for hackers for various
breaches and remote code executions
c) If the IoT has a problem, or is exposed to
weaknesses, then the enterprises that are connected to it are
equally threatened. In fact, while security [27] is undoubtedly
one of major issues impacting the development, there are a
number of other problems that stem directly from this.
Figure 1 Data Security
Confidentiality makes sure the data at rest or data
transferred between end points remains secured through
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 6, June 2018
57 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
encryption. Integrity is to make sure the software in the device
or any part of the system is protected against unauthorized
modification. This can be achieved from different techniques
starting from simple hashing to digital signatures using Public
key cryptography. Availability is to make sure that the system
is available based on the service level expectations. This
requires systems to be aware of their weakness and have
counter measures built in.
II. KEY ELEMENTS INVOLVED IN IOT
A. Sensing
The first step in IoT workflow is gathering information at a
“point of activity.” The information collected may be
information collected by the appliance or any devices. The
sensing can be biometric, biological, environmental, visual or
audible.
B. Communication
IoT devices need a channel for sending collected
information at the device level to the Cloud-based service for
further processing. This expects either Wi-Fi (wireless LAN
based communications) or WAN (wide area network… i.e.
cellular) communications. Depending on the need of
communication other capabilities may also be required. That
may include Bluetooth, ZigBee, Near-field or a range of other
short range communication methods. GPS is required for
positioning.
C. Cloud Based Capture & Consolidation
Collected data is sent to the cloud based service where the
data is combined with other data to produce useful information
to the user. Collected information may be forming any
sources. Data processing is always required for analyzing.
D. Delivery of Information
Delivery of Information is the last step where the useful
information is sent to the user. That may be a consumer, a
commercial or an industrial user. The aim is to provide
information in a simple and transparent manner. It requires
execution of a well thought out, designed and executed user
interface that provides an optimized experience across
multiple device platforms – tablets, smart phones, desktop –
across multiple operating systems – iOS, Android, Windows,
etc.
III. PROTOCOLS AND NETWORK TECHNOLOGIES
IoT mainly uses the standard protocols and networking
technologies. The most important technologies and protocols
of IoT are RFID [9], NFC, low-energy Bluetooth, low-energy
wireless, low-energy radio protocols, LTE-A, and Wi-Fi
Direct. These technologies hold the explicit networking
functionality desirable in an IoT arrangement in dissimilarity
to a typical standardized network of general systems.
A. NFC and RFID
RFID (radio-frequency identification) and NFC (near-
field communication) offers simple, less energy, and flexible
options for characteristics and contact tokens, connection
bootstrapping, and payments. RFID technology utilizes 2-way
radio transmitter-receivers [25] to find and trail tags linked
with objects. NFC contains communication protocols for
electronic devices, generally a mobile device [16].
B. Low-Energy
Bluetooth affords the low-power, long-use require of IoT
purpose while uses a normal technology with local support
across systems.
C. Low-Energy Wireless
These technologies return the mass power starving
attribute of an IoT structure. Even though sensors and
additional elements can ability following over extended
periods, communication links (i.e., wireless) must remain in
listening mode. Low-energy wireless diminish consumption
thus extends the existence of the device. The following list
shows the protocols involved in internet of things devices and
applications.
• Infrastructure (ex: 6LowPAN, IPv4/IPv6, RPL)
• Identification (ex: EPC, uCode, IPv6, URIs)
• Communication / Transport (ex: Wi-fi, Bluetooth,
LPWAN)
• Discovery (ex: Physical Web, mDNS, DNS-SD)
• Data Protocols (ex: MQTT, CoAP, AMQP, Web
socket, Node)
• Device Management (ex: TR-069, OMA-DM)
• Semantic (ex: JSON-LD, Web Thing Model)
• Multi-layer Frameworks (ex: Alljoyn, IoTivity,
Weave, Homekit)
Figure 2 Compare Internet Protocol Suite with IP Smart
object protocol suite
D. CoAP
CoAP is designed to enable low-power sensors to use
RESTful services while meeting their power constrains. It is
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 6, June 2018
58 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
built over UDP, instead of TCP commonly used in HTTP [26]
and has a light mechanism to provide reliability. CoAP
architecture is divided into two main sub layers: messaging
and request/response. The messaging sub layer is responsible
for reliability and duplication of messages while the
request/response sub layer is responsible for communication.
E. 6LoWPAN
IPv6 over Low power Wireless Personal Area Network
(6LoWPAN) is the first and most commonly used standard in
this category. It efficiently encapsulates IPv6 long headers in
IEEE802.15.4 small packets, which cannot exceed 128 bytes.
The specification supports [15] different length addresses, low
bandwidth, different topologies including star or mesh, power
consumption, low cost, scalable networks, mobility,
unreliability and long sleep time.
F. MQTT
It is designed to provide embedded connectivity between
applications and middleware’s on one side and networks and
communications on the other side.
G. Radio Protocols
ZigBee, Z-Wave, and Thread are radio protocols used for
establishing low-rate private area networks. These
technologies not only use low-power but also offer high
throughput. This increases the power of small local device
networks without the typical costs.
H. LTE-A
LTE-A, or LTE Advanced, provides an important boost to
LTE technology by increasing not only its coverage, but also
reducing its latency and raising its throughput. It gives IoT an
enormous power by increasing its range, with its most
noteworthy applications being vehicle, UAV.
I. Wi-Fi Direct
Wi-Fi Direct removes the need of an access point. It allows
P2P (peer-to-peer) connections retaining the speed of Wi-Fi,
but with lower latency. Wi-Fi Direct removes an element of a
network that often marshs it down and it does not compromise
on speed or throughput
IV. BACKGROUND
The most significant features of IoT include artificial
intelligence, connectivity, sensors, active engagement, and
small device use. An overview of this features are IoT mainly
makes virtually anything “smart”, meaning it improves every
phase of life with the influence of data collection, artificial
intelligence algorithms, and networks. New IoT networking
mean networks are no longer entirely tied to major service
providers. Networks can exist on a much smaller and cheaper
scale. IoT creates these small networks between its system
devices [10]. IoT loses its merit without sensors. They act as
major instruments which transfers IoT from a standard passive
network of devices into an active system capable of real-time
integration. Most of the interaction with technology is done
through passive engagement. IoT paves a new way for active
content, product, or service engagement. Devices have
become smaller, cheaper, and more powerful over time. IoT
explores purpose-built small devices to deliver its accuracy,
scalability, and flexibility [24].
V. ALGORITHM USED IN IOT
Trilateration is the process of shaping absolute or relative
locations of points by measurement of distances. Trilateration
does have realistic applications in surveying and navigation,
including global positioning systems (GPS).
Figure 3 GPS technology determines your location by
measuring distances from three satellites, using the
mathematical principle of trilateration.
VI. CHALLENGES IN IOT
A. Security Challenges
For many tech firms across the world IoT has become a
serious concern in terms of security. The hacking of baby
monitors, smart fridges, Barbie dolls, drug infusion pumps,
cameras and even assault rifle has caused a nightmare for the
future of IoT. So many new nodes being added to networks
and the internet will provide malicious actors with
innumerable attack [3] vectors and possibilities to carry out
their evil deeds, especially since a considerable number of
them suffer from security holes. The most important transfer
in security will arise from the fact that IoT will become more
deep-seated in our lives. Alarms will no longer be narrowed to
the protection of sensitive information and assets. Our very
lives and health can become the target of IoT hack attacks.
There are many reasons for the state of insecurity in IoT.
Some of it has to do with the industry being in its “gold rush”
state, where every vendor is hastily seeking to find out the
next innovative connected gadget before their competitors do.
Under such circumstances, functionality becomes the main
focus and security takes a back seat [11, 22]. Scalability issues
also one of reason for the creation of unsecure IoT products.
The fact is that many security solutions present today have
been created with generic computing devices in mind. IoT
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 6, June 2018
59 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
devices often lack the computational power, storage capacity
and even proper operating system to deploy such solutions.
B. Privacy Challenges
Some of the data collected by IoT are highly sensitive and
are protected by legislations such as the Health Insurance
Portability and Accountability Act (HIPAA) in the U.S. and
are basically different from our browsing and clicking habits.
But necessary measures are not taken for storing such kind of
data and sharing it with other service providers. Vendors and
manufacturers should either discard this data or remove the
Personally Identifiable Information (PII) [13] to ensure that
consumers aren’t damaged in case of data breaches.
Another consideration to be taken is that while data
generated about a single appliance may not be sensitive, but
when combined with data generated from other devices, it can
reveal information such as the life pattern of consumer, which
can become very danger if the data fall into the hands of the
wrong people. In many cases, criminals don’t even need to pry
into your encrypted communications in order to obtain the
information they want. The IoT creates unique challenges to
privacy, many that go beyond the data privacy issues that
currently exist. Much of this stems from integrating devices
into our environments without us consciously using them.
This is becoming more prevalent in consumer devices,
such as tracking devices [14] for phones and cars as well as
smart televisions. In terms of the latter, voice recognition or
vision features are being integrated that can continuously
listen to conversations or watch for activity and selectively
transmit that data to a cloud service for processing, which
sometimes includes a third party. The collection of this
information exposes legal and regulatory challenges facing
data protection and privacy law. In addition, many IoT
scenarios involve device deployments and data collection
activities with multinational or global scope that cross social
and cultural boundaries.
Security is an essential pillar of the and most significant
challenge for the IoT. Increasing the number of connected
devices increases the opportunity to exploit security
vulnerabilities [30], as do poorly designed devices, which can
expose user data to theft by leaving data streams inadequately
protected and in some cases people’s health and safety
(implanted, Internet-enabled medical devices and hackable
cars) can be put at risk. Many IoT deployments will also
consist of collections of identical or near identical devices.
This homogeneity magnifies the potential impact of any single
security vulnerability by the sheer number of devices that all
have the same characteristics. Without standards to guide
manufacturers, developers sometimes design products that
operate in disruptive ways on the Internet without much regard
to their impact. If poorly designed and configured, such
devices can have negative consequences for the networking
resources they connect to and the broader Internet. A lot of
this comes down to cost constraints and the need to develop a
product for release quicker than competitors. Add to this the
difficulties with managing and configuring larger numbers of
IoT devices, the need for thoughtful design and
standardization of configuration tools, methods, and
interfaces, coupled with the adoption of IPv6, will be essential
in the future [6].
Like privacy, there are a wide range of regulatory and legal
questions surrounding the IoT, which need thoughtful
consideration. Legal issues with IoT devices include cross
border data flow [4]; conflict between law enforcement
surveillance and civil rights; data retention and destruction
policies; and legal liability for unintended uses, security
breaches or privacy lapses. Further, technology is advancing
much more rapidly than the associated policy and regulatory
environments. Regulatory analysis of IoT devices is
increasingly being viewed from a general, technology-neutral
perspective legal lens, which seeks to prevent unfair or
deceptive practices against consumers [29].
C. Technological challenges
Progressing from the Internet of computers to the remote
and somewhat unclear goal of an Internet of Things is
something that must therefore be done one step at a time. In
addition to the expectation that the technology must be
available at low cost if a large number of objects are actually
to be equipped, we are also faced with many other challenges,
such as:
a) Scalability: An Internet of Things has a larger scope than
the usual Internet of computers. But then things work together
mainly within a local environment. Basic functionality such as
communication and service discovery therefore need to
function equally efficiently in both small scale and large-scale
environments [5, 31].
b) Interoperability: Since the world of physical things is
extremely diverse, in an Internet of Things each type of smart
object will have different information, processing and
communication capabilities. Different smart objects would
also be subjected to very different conditions such as the
energy available and the communications bandwidth required.
However, to ease communication and cooperation, general
practices and standards are required.
C) Detection: In dynamic environments, suitable services for
things must be automatically identified, which requires
appropriate semantic [7] means of explaining their
functionality. Users will want to receive product-related
information, and will want to use search engines that can find
things or provide information about an object’s state.
d) Software complexity: Although the software systems in
smart objects will have to function with minimal resources, as
in traditional embedded systems, an extensive software
infrastructure will be needed on the network and on
background servers in order to control the smart objects and
provide services to support them.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 6, June 2018
60 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
e) Data volumes: While some application will involve brief
communication, others, such as sensor networks, large-scale
“real-world awareness” scenarios, will involve huge volumes
of data on central network nodes.
f) Data interpretation: To support the users of smart things,
we would want to interpret the local context determined by
sensors [25] as accurately as possible.
g) Security and individual privacy: In addition to the security
and protection aspects of the Internet, other requirements
would also be important in an Internet of Things. At times we
might want to give selective access to certain services, or
prevent them from communicating with other things. Ex.
Business transactions involving smart objects would need to
be protected from competitors’ prying eyes.
h) Fault tolerance: Structuring an Internet of Things in a
robust and trustworthy manner would require redundancy on
several levels and an ability to automatically adapt to changed
conditions since we want to rely on things functioning
properly [28].
i) Power supply: Things typically move around and are not
connected to a power supply, so their smartness needs to be
powered from a self-sufficient energy source. Unfortunately,
battery technology is making relatively slow progress, and
“energy harvesting”, i.e. generating electricity from the
environment (using temperature differences, vibrations, air
currents, light, etc.), is not yet powerful enough to meet the
energy requirements of current electronic systems in many
application scenarios. Hopes are pinned on future low-power
processors and communications units for embedded systems
that can function with significantly less energy. Energy saving
is a factor not only in hardware and system architecture, but
also in software, for example the implementation of protocol
stacks, where every single transmission byte will have to
justify its existence. There are already some battery-free
wireless sensors that can transmit their readings a distance of a
few meters. Like RFID systems [22], they obtain the power
they require either remotely or from the measuring process
itself, for example by using piezoelectric or electric materials
for pressure and temperature measurements.
D. Connectivity Challenges
The biggest challenge lies in connection of more number
of devices, and it will challenge the very structure of current
communication models and the fundamental technologies. At
present we rely on the centralized, server/client paradigm to
authenticate, authorize and connect different nodes [19] in a
network. This model is sufficient for only for present IoT
ecosystems, where tens, hundreds or even thousands of
devices are engaged. But when networks grow to join billions
and hundreds of billions of devices, centralized brokered
systems will turn into a bottleneck. Such systems will require
large investments and spending in maintaining cloud servers
that can handle such large amounts of information exchange,
and entire systems can go down if the server becomes
unavailable. The future of IoT will very much have to rely on
decentralizing IoT networks. Part of it can become possible by
moving functionality to the edge, such as using fog computing
models [18] where smart devices such as IoT hubs take charge
of time-critical operations and cloud servers take care of
gathering data of and analytical responsibilities.
Other solutions involve the use of peer-to-peer
communications, where devices identify and authenticate each
other directly and exchange information without the
involvement of a broker. Networks will be created in meshes
with no single point of failure. This model will have its own
set of challenges, especially from a security perspective, but
these challenges can be met with some of the emerging IoT
technologies such as the Phantom protocol, or leveraging the
success of other tried and tested models such as the block
chain.
E. Compatibility and Longevity Challenges
As an industry that is going through its baby steps, IoT is
growing in many different directions, with many different
technologies competing to become the standard. For instance,
we currently have ZigBee, Z-Wave, WI-Fi, Bluetooth and
Bluetooth Low Energy (BTLE) all vying to become the
dominant transport mechanism between devices and hubs.
This will cause difficulties and require the deployment of extra
hardware and software when connecting devices. Other
compatibility issues stem from non-unified cloud services,
lack of standardized M2M protocols and diversities in
firmware and operating systems among IoT devices [23].
Some of these technologies [20] will eventually become
obsolete in the next few years, effectively rendering the
devices implementing them useless. This is especially
important, since in contrast to generic computing devices
which have a lifespan of a few years, IoT appliances (such as
smart fridges or TVs) tend to remain in service for much
longer, and should be able to function even if their
manufacturer goes out of service.
VII. APPLICATIONS OF IOT
The applications of IoT in environmental monitoring are
broad: environmental protection, extreme weather monitoring,
water safety, endangered species protection, commercial
farming, and more. In these applications, sensors detect and
measure every type of environmental change. Present
monitoring technology for air and water safety mainly uses
manual labor along with advanced instruments, and lab
processing. IoT improves this technology by decreasing the
need for human labor, allowing frequent sampling, increasing
the range of sampling and monitoring [12], allowing
sophisticated testing on-site and joining response efforts to
detection systems New IoT advances promise more fine-
grained data, better accuracy, and flexibility. Effective
forecasting [8] requires high detail and flexibility in range,
instrument type, and deployment. This allows early detection
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 6, June 2018
61 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
and early responses to prevent loss of life and property.
Today’s sophisticated commercial farms have exploited
advanced technology and biotechnology for quite some time,
however, IoT introduces more access to deeper automation
and analysis. Much of commercial farming, like weather
monitoring, suffers from a lack of precision and requires
human work in the area of monitoring [21].
VIII. CONCLUSIONS
The foremost highlighting of this paper was to
underline major issues in security of IoT predominantly,
meeting point the security attacks and their solutions.
Concession security mechanism in IoT devices, finished many
devices objective for hackers. In this paper, the security
necessities are discussed such as confidentiality, integrity, and
authentication, etc. Trust in mind the significance of security
in IoT environment, it is really very important to include
security method in IoT devices and communication networks.
Moreover, to protect from any security threat, it is also
recommended not to use default passwords for the devices and
read the security requirements for the devices before using it
for the first time. Disabling the features that are not used may
decrease the chances of security attacks. Moreover, it is
important to study different security protocols used in IoT
devices and networks.
References
[1] J. S. Kumar and D. R. Patel, “A survey on internet of things: Security
and privacy issues,” International Journal of Computer Applications,
vol. 90, no. 11, 2014.
[2] M. Abomhara and G. M. Køien, “Security and privacy in the internet of
things: Current status and open issues,” in Privacy and Security in
Mobile Systems (PRISMS), International Conference on. IEEE, 2014,
pp. 1–8.
[3] S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, “A vision of iot:
Applications, challenges, and opportunities with china perspective,”
IEEE Internet of Things journal, vol. 1, no. 4, pp. 349–359, 2014.
[4] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,”
Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct 2010.
[5] M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis of
security issues, challenges, and open problems in the internet of things,”
in Services (SERVICES), 2015 IEEE World Congress on. IEEE, 2015,
pp. 21–28.
[6] L. Da Xu, W. He, and S. Li, “Internet of things in industries: A survey,”
IEEE Transactions on industrial informatics, vol. 10, no. 4, pp. 2233–
2243, 2014.
[7] L. M. R. Tarouco, L. M. Bertholdo, L. Z. Granville, L. M. R. Arbiza, F.
Carbone, M. Marotta, and J. J. C. de Santanna, “Internet of things in
healthcare: Interoperatibility and security issues,” in Communications
(ICC), IEEE International Conference on. IEEE, 2012, pp. 6121–6125.
[8] A. Mohan, “Cyber security for personal medical devices internet of
things,” in Distributed Computing in Sensor Systems (DCOSS), 2014
IEEE International Conference on. IEEE, 2014, pp. 372–374
[9] S. Yoon, H. Park, and H. S. Yoo, “Security issues on smarthome in iot
environment,” in Computer Science and its Applications. Springer,
2015, pp. 691–696.
[10] R. H. Weber, “Internet of things–new security and privacy challenges,”
Computer law & security review, vol. 26, no. 1, pp. 23–30, 2010.
[11] S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, “Proposed
security model and threat taxonomy for the internet of things (iot),” in
International Conference on Network Security and Applications.
Springer, 2010, pp. 420–429.
[12] Y. H. Hwang, “Iot security & privacy: threats and challenges,” in
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and
Security. ACM, 2015, pp. 1–1.
[13] M. A. Qureshi, A. Aziz, B. Ahmed, A. Khalid, and H. Munir,
“Comparative analysis and implementation of efficientdigital image
watermarking schemes,” International Journal of Computer and
Electrical Engineering, vol. 4, no. 4, p. 558, 2012.
[14] M. Abdur Razzaq, R. A. Sheikh, A. Baig, and A. Ahmad, “Digital image
security: Fusion of encryption, steganography and watermarking,”
International Journal of Advanced Computer Science and Applications
(IJACSA), vol. 8, no. 5, 2017.
[15] S. Singh and N. Singh, “Internet of things (iot): Security challenges,
business opportunities & reference architecture for e-commerce,” in
Green Computing and Internet of Things (ICGCIoT), 2015 International
Conference on. IEEE, 2015, pp. 1577–1581.
[16] K. Rose, S. Eldridge, and L. Chapin, “The internet of things: An
overview,” The Internet Society (ISOC), pp. 1–50, 2015.
[17] H. Ning, H. Liu, and L. T. Yang, “Cyberentity security in the internet of
things,” Computer, vol. 46, no. 4, pp. 46–53, 2013.
[18] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,”
Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
[19] S. Andreev and Y. Koucheryavy, “Internet of things, smart spaces, and
next generation networking,” Springer, LNCS, vol. 7469, p. 464, 2012.
[20] J. S. Kumar and D. R. Patel, “A survey on internet of things: Security
and privacy issues,” International Journal of Computer Applications,
vol. 90, no. 11, pp. 20–26, March 2014, published by Foundation of
Computer Science, New York, USA.
[21] A. Stango, N. R. Prasad, and D. M. Kyriazanos, “A threat analysis
methodology for security evaluation and enhancement planning,” in
Emerging Security Information, Systems and Technologies, 2009.
SECURWARE’09. Third International Conference on. IEEE, 2009, pp.
262–267.
[22] D. Jiang and C. ShiWei, “A study of information security for m2m of
iot,” in Advanced Computer Theory and Engineering (ICACTE), 2010
3rd International Conference on, vol. 3. IEEE, 2010, pp. V3–576.
[23] B. Schneier, Secrets and lies: digital security in a networked world. John
Wiley & Sons, 2011.
[24] J. M. Kizza, Guide to Computer Network Security. Springer, 2013.
[25] M. Taneja, “An analytics framework to detect compromised iot devices
using mobility behavior,” in ICT Convergence (ICTC), 2013
International Conference on. IEEE, 2013, pp. 38–43.
[26] G. M. Koien and V. A. Oleshchuk, Aspects of Personal Privacy in
Communications-Problems, Technology and Solutions. River
Publishers, 2013.
[27] N. R. Prasad, “Threat model framework and methodology for personal
networks (pns),” in Communication Systems Software and Middleware,
2007. COMSWARE 2007. 2nd International Conference on. IEEE,
2007, pp. 1–6.
[28] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A.
Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer et al.
“Internet of things strategic research roadmap,” Internet of ThingsGlobal
Technological and Societal Trends, pp. 9–52, 2011.
[29] S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service modelling for
the internet of things,” in Computer Science and Information Systems
(FedCSIS), 2011 Federated Conference on. IEEE, 2011, pp. 949–955.
[30] G. Xiao, J. Guo, L. Xu, and Z. Gong, “User interoperability with
heterogeneous iot devices through transformation,” 2014.
[31] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things
(iot): A vision, architectural elements, and future directions,” Future
Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 6, June 2018
62 https://sites.google.com/site/ijcsis/
ISSN 1947-5500

More Related Content

What's hot

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
 
EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDY
EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDYEMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDY
EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDYijwmn
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io tPuneet Mishra
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesNavjyotsinh Jadeja
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsSumanPramanik7
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey ofVinod Salunkhe
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsBHAVANA KONERU
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
 
The technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncThe technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncAntenna Manufacturer Coco
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 

What's hot (19)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDY
EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDYEMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDY
EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDY
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
76 s201913
76 s20191376 s201913
76 s201913
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
Iot
IotIot
Iot
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey of
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
The technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncThe technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas Inc
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 

Similar to A Review on Privacy and Security Challenges in the Internet of Things (IoT) to protect the Device and Communication Networks

SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxBharat Tank
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTDaniel Wachtel
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfMurugeswariKrishnan
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfMurugeswariKrishnan
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...ijmnct
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applicationsCSITiaesprime
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
 
Internet of things
Internet of thingsInternet of things
Internet of thingsTamojit Das
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTMuhammad Ahad
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 

Similar to A Review on Privacy and Security Challenges in the Internet of Things (IoT) to protect the Device and Communication Networks (20)

SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
IoT
IoTIoT
IoT
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor network
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 

Recently uploaded

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

A Review on Privacy and Security Challenges in the Internet of Things (IoT) to protect the Device and Communication Networks

  • 1. A Review on Privacy and Security Challenges in the Internet of Things (IoT) to protect the Device and Communication Networks S. Balamurugan Ph.D., Research Scholar Department of CSE, Annamalai University. chella40978@gmail.com Dr. A. Ayyasamy Assistant Professor Department of CSE Annamalai University. samy7771@yahoo.co.in Dr. K. Suresh Joseph Assistant Professor Department of Computer Science Pondicherry University, Ksjoseph.csc@gmail.com Abstract— Internet of Things (IoT) plays a vital role in our day to day life and normally used in our houses, in industry, schools and in hospitals which implemented outside to manage and control for taking report the changes in location prevent from dangers and many more favorable things. Moreover all other advantages can approach of big risks of privacy loss and security issues. To protect the IoT devices, so many research works have been measure to find those problems and locate a best way to eradicate those risks or at least to reduce their effect on the security and privacy requirement. Formation the concept of device to device (D2D) communication technology, IoT plays the information transfer from one end to another end as node of interconnection. This paper examines the constraints and security challenges posed by IoT connected devices and the ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive. Keywords— Internet of Things, D2D, communication Technology, internet, privacy, security, issues, challenges. I. INTRODUCTION Now-a-days the different communication technologies are used to interconnection for the transfer of information, more number of issues in security and privacy sectors. IoT [1] finds its application in the all the fields, since new mode of communication between the different systems and devices. Internet of Things (IoT) also called the internet of everything or industrial network is a wide technology which is been viewed as a global network of machines and devices capable of interacting with each other. The IoT allows things to be controlled remotely across existing network infrastructure, provide opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention. If the IOT devices are poorly secured, cyber attackers will use them as gateway to cause harm to other devices in the network. So, here arises the issues in security and privacy and more attention is required in IoT especially authenticity, confidentiality and integrity cum availability [2] of data and services in IoT. The main objective of this paper is to highlight security and privacy issues surrounding Internet of Things. In terms of security, IoT is a technology with unlimited challenges because of following reasons: a) IoT is typically regarded as extension of current internet to several different technologies like Mobile Broadband, Wireless Sensor Network which are open to attack because of various loopholes. b) In IoT, each and every device is be connected to Internet and Internet is always an unsecured mode which makes all these devices open door for hackers for various breaches and remote code executions c) If the IoT has a problem, or is exposed to weaknesses, then the enterprises that are connected to it are equally threatened. In fact, while security [27] is undoubtedly one of major issues impacting the development, there are a number of other problems that stem directly from this. Figure 1 Data Security Confidentiality makes sure the data at rest or data transferred between end points remains secured through International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 6, June 2018 57 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 2. encryption. Integrity is to make sure the software in the device or any part of the system is protected against unauthorized modification. This can be achieved from different techniques starting from simple hashing to digital signatures using Public key cryptography. Availability is to make sure that the system is available based on the service level expectations. This requires systems to be aware of their weakness and have counter measures built in. II. KEY ELEMENTS INVOLVED IN IOT A. Sensing The first step in IoT workflow is gathering information at a “point of activity.” The information collected may be information collected by the appliance or any devices. The sensing can be biometric, biological, environmental, visual or audible. B. Communication IoT devices need a channel for sending collected information at the device level to the Cloud-based service for further processing. This expects either Wi-Fi (wireless LAN based communications) or WAN (wide area network… i.e. cellular) communications. Depending on the need of communication other capabilities may also be required. That may include Bluetooth, ZigBee, Near-field or a range of other short range communication methods. GPS is required for positioning. C. Cloud Based Capture & Consolidation Collected data is sent to the cloud based service where the data is combined with other data to produce useful information to the user. Collected information may be forming any sources. Data processing is always required for analyzing. D. Delivery of Information Delivery of Information is the last step where the useful information is sent to the user. That may be a consumer, a commercial or an industrial user. The aim is to provide information in a simple and transparent manner. It requires execution of a well thought out, designed and executed user interface that provides an optimized experience across multiple device platforms – tablets, smart phones, desktop – across multiple operating systems – iOS, Android, Windows, etc. III. PROTOCOLS AND NETWORK TECHNOLOGIES IoT mainly uses the standard protocols and networking technologies. The most important technologies and protocols of IoT are RFID [9], NFC, low-energy Bluetooth, low-energy wireless, low-energy radio protocols, LTE-A, and Wi-Fi Direct. These technologies hold the explicit networking functionality desirable in an IoT arrangement in dissimilarity to a typical standardized network of general systems. A. NFC and RFID RFID (radio-frequency identification) and NFC (near- field communication) offers simple, less energy, and flexible options for characteristics and contact tokens, connection bootstrapping, and payments. RFID technology utilizes 2-way radio transmitter-receivers [25] to find and trail tags linked with objects. NFC contains communication protocols for electronic devices, generally a mobile device [16]. B. Low-Energy Bluetooth affords the low-power, long-use require of IoT purpose while uses a normal technology with local support across systems. C. Low-Energy Wireless These technologies return the mass power starving attribute of an IoT structure. Even though sensors and additional elements can ability following over extended periods, communication links (i.e., wireless) must remain in listening mode. Low-energy wireless diminish consumption thus extends the existence of the device. The following list shows the protocols involved in internet of things devices and applications. • Infrastructure (ex: 6LowPAN, IPv4/IPv6, RPL) • Identification (ex: EPC, uCode, IPv6, URIs) • Communication / Transport (ex: Wi-fi, Bluetooth, LPWAN) • Discovery (ex: Physical Web, mDNS, DNS-SD) • Data Protocols (ex: MQTT, CoAP, AMQP, Web socket, Node) • Device Management (ex: TR-069, OMA-DM) • Semantic (ex: JSON-LD, Web Thing Model) • Multi-layer Frameworks (ex: Alljoyn, IoTivity, Weave, Homekit) Figure 2 Compare Internet Protocol Suite with IP Smart object protocol suite D. CoAP CoAP is designed to enable low-power sensors to use RESTful services while meeting their power constrains. It is International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 6, June 2018 58 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 3. built over UDP, instead of TCP commonly used in HTTP [26] and has a light mechanism to provide reliability. CoAP architecture is divided into two main sub layers: messaging and request/response. The messaging sub layer is responsible for reliability and duplication of messages while the request/response sub layer is responsible for communication. E. 6LoWPAN IPv6 over Low power Wireless Personal Area Network (6LoWPAN) is the first and most commonly used standard in this category. It efficiently encapsulates IPv6 long headers in IEEE802.15.4 small packets, which cannot exceed 128 bytes. The specification supports [15] different length addresses, low bandwidth, different topologies including star or mesh, power consumption, low cost, scalable networks, mobility, unreliability and long sleep time. F. MQTT It is designed to provide embedded connectivity between applications and middleware’s on one side and networks and communications on the other side. G. Radio Protocols ZigBee, Z-Wave, and Thread are radio protocols used for establishing low-rate private area networks. These technologies not only use low-power but also offer high throughput. This increases the power of small local device networks without the typical costs. H. LTE-A LTE-A, or LTE Advanced, provides an important boost to LTE technology by increasing not only its coverage, but also reducing its latency and raising its throughput. It gives IoT an enormous power by increasing its range, with its most noteworthy applications being vehicle, UAV. I. Wi-Fi Direct Wi-Fi Direct removes the need of an access point. It allows P2P (peer-to-peer) connections retaining the speed of Wi-Fi, but with lower latency. Wi-Fi Direct removes an element of a network that often marshs it down and it does not compromise on speed or throughput IV. BACKGROUND The most significant features of IoT include artificial intelligence, connectivity, sensors, active engagement, and small device use. An overview of this features are IoT mainly makes virtually anything “smart”, meaning it improves every phase of life with the influence of data collection, artificial intelligence algorithms, and networks. New IoT networking mean networks are no longer entirely tied to major service providers. Networks can exist on a much smaller and cheaper scale. IoT creates these small networks between its system devices [10]. IoT loses its merit without sensors. They act as major instruments which transfers IoT from a standard passive network of devices into an active system capable of real-time integration. Most of the interaction with technology is done through passive engagement. IoT paves a new way for active content, product, or service engagement. Devices have become smaller, cheaper, and more powerful over time. IoT explores purpose-built small devices to deliver its accuracy, scalability, and flexibility [24]. V. ALGORITHM USED IN IOT Trilateration is the process of shaping absolute or relative locations of points by measurement of distances. Trilateration does have realistic applications in surveying and navigation, including global positioning systems (GPS). Figure 3 GPS technology determines your location by measuring distances from three satellites, using the mathematical principle of trilateration. VI. CHALLENGES IN IOT A. Security Challenges For many tech firms across the world IoT has become a serious concern in terms of security. The hacking of baby monitors, smart fridges, Barbie dolls, drug infusion pumps, cameras and even assault rifle has caused a nightmare for the future of IoT. So many new nodes being added to networks and the internet will provide malicious actors with innumerable attack [3] vectors and possibilities to carry out their evil deeds, especially since a considerable number of them suffer from security holes. The most important transfer in security will arise from the fact that IoT will become more deep-seated in our lives. Alarms will no longer be narrowed to the protection of sensitive information and assets. Our very lives and health can become the target of IoT hack attacks. There are many reasons for the state of insecurity in IoT. Some of it has to do with the industry being in its “gold rush” state, where every vendor is hastily seeking to find out the next innovative connected gadget before their competitors do. Under such circumstances, functionality becomes the main focus and security takes a back seat [11, 22]. Scalability issues also one of reason for the creation of unsecure IoT products. The fact is that many security solutions present today have been created with generic computing devices in mind. IoT International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 6, June 2018 59 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 4. devices often lack the computational power, storage capacity and even proper operating system to deploy such solutions. B. Privacy Challenges Some of the data collected by IoT are highly sensitive and are protected by legislations such as the Health Insurance Portability and Accountability Act (HIPAA) in the U.S. and are basically different from our browsing and clicking habits. But necessary measures are not taken for storing such kind of data and sharing it with other service providers. Vendors and manufacturers should either discard this data or remove the Personally Identifiable Information (PII) [13] to ensure that consumers aren’t damaged in case of data breaches. Another consideration to be taken is that while data generated about a single appliance may not be sensitive, but when combined with data generated from other devices, it can reveal information such as the life pattern of consumer, which can become very danger if the data fall into the hands of the wrong people. In many cases, criminals don’t even need to pry into your encrypted communications in order to obtain the information they want. The IoT creates unique challenges to privacy, many that go beyond the data privacy issues that currently exist. Much of this stems from integrating devices into our environments without us consciously using them. This is becoming more prevalent in consumer devices, such as tracking devices [14] for phones and cars as well as smart televisions. In terms of the latter, voice recognition or vision features are being integrated that can continuously listen to conversations or watch for activity and selectively transmit that data to a cloud service for processing, which sometimes includes a third party. The collection of this information exposes legal and regulatory challenges facing data protection and privacy law. In addition, many IoT scenarios involve device deployments and data collection activities with multinational or global scope that cross social and cultural boundaries. Security is an essential pillar of the and most significant challenge for the IoT. Increasing the number of connected devices increases the opportunity to exploit security vulnerabilities [30], as do poorly designed devices, which can expose user data to theft by leaving data streams inadequately protected and in some cases people’s health and safety (implanted, Internet-enabled medical devices and hackable cars) can be put at risk. Many IoT deployments will also consist of collections of identical or near identical devices. This homogeneity magnifies the potential impact of any single security vulnerability by the sheer number of devices that all have the same characteristics. Without standards to guide manufacturers, developers sometimes design products that operate in disruptive ways on the Internet without much regard to their impact. If poorly designed and configured, such devices can have negative consequences for the networking resources they connect to and the broader Internet. A lot of this comes down to cost constraints and the need to develop a product for release quicker than competitors. Add to this the difficulties with managing and configuring larger numbers of IoT devices, the need for thoughtful design and standardization of configuration tools, methods, and interfaces, coupled with the adoption of IPv6, will be essential in the future [6]. Like privacy, there are a wide range of regulatory and legal questions surrounding the IoT, which need thoughtful consideration. Legal issues with IoT devices include cross border data flow [4]; conflict between law enforcement surveillance and civil rights; data retention and destruction policies; and legal liability for unintended uses, security breaches or privacy lapses. Further, technology is advancing much more rapidly than the associated policy and regulatory environments. Regulatory analysis of IoT devices is increasingly being viewed from a general, technology-neutral perspective legal lens, which seeks to prevent unfair or deceptive practices against consumers [29]. C. Technological challenges Progressing from the Internet of computers to the remote and somewhat unclear goal of an Internet of Things is something that must therefore be done one step at a time. In addition to the expectation that the technology must be available at low cost if a large number of objects are actually to be equipped, we are also faced with many other challenges, such as: a) Scalability: An Internet of Things has a larger scope than the usual Internet of computers. But then things work together mainly within a local environment. Basic functionality such as communication and service discovery therefore need to function equally efficiently in both small scale and large-scale environments [5, 31]. b) Interoperability: Since the world of physical things is extremely diverse, in an Internet of Things each type of smart object will have different information, processing and communication capabilities. Different smart objects would also be subjected to very different conditions such as the energy available and the communications bandwidth required. However, to ease communication and cooperation, general practices and standards are required. C) Detection: In dynamic environments, suitable services for things must be automatically identified, which requires appropriate semantic [7] means of explaining their functionality. Users will want to receive product-related information, and will want to use search engines that can find things or provide information about an object’s state. d) Software complexity: Although the software systems in smart objects will have to function with minimal resources, as in traditional embedded systems, an extensive software infrastructure will be needed on the network and on background servers in order to control the smart objects and provide services to support them. International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 6, June 2018 60 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 5. e) Data volumes: While some application will involve brief communication, others, such as sensor networks, large-scale “real-world awareness” scenarios, will involve huge volumes of data on central network nodes. f) Data interpretation: To support the users of smart things, we would want to interpret the local context determined by sensors [25] as accurately as possible. g) Security and individual privacy: In addition to the security and protection aspects of the Internet, other requirements would also be important in an Internet of Things. At times we might want to give selective access to certain services, or prevent them from communicating with other things. Ex. Business transactions involving smart objects would need to be protected from competitors’ prying eyes. h) Fault tolerance: Structuring an Internet of Things in a robust and trustworthy manner would require redundancy on several levels and an ability to automatically adapt to changed conditions since we want to rely on things functioning properly [28]. i) Power supply: Things typically move around and are not connected to a power supply, so their smartness needs to be powered from a self-sufficient energy source. Unfortunately, battery technology is making relatively slow progress, and “energy harvesting”, i.e. generating electricity from the environment (using temperature differences, vibrations, air currents, light, etc.), is not yet powerful enough to meet the energy requirements of current electronic systems in many application scenarios. Hopes are pinned on future low-power processors and communications units for embedded systems that can function with significantly less energy. Energy saving is a factor not only in hardware and system architecture, but also in software, for example the implementation of protocol stacks, where every single transmission byte will have to justify its existence. There are already some battery-free wireless sensors that can transmit their readings a distance of a few meters. Like RFID systems [22], they obtain the power they require either remotely or from the measuring process itself, for example by using piezoelectric or electric materials for pressure and temperature measurements. D. Connectivity Challenges The biggest challenge lies in connection of more number of devices, and it will challenge the very structure of current communication models and the fundamental technologies. At present we rely on the centralized, server/client paradigm to authenticate, authorize and connect different nodes [19] in a network. This model is sufficient for only for present IoT ecosystems, where tens, hundreds or even thousands of devices are engaged. But when networks grow to join billions and hundreds of billions of devices, centralized brokered systems will turn into a bottleneck. Such systems will require large investments and spending in maintaining cloud servers that can handle such large amounts of information exchange, and entire systems can go down if the server becomes unavailable. The future of IoT will very much have to rely on decentralizing IoT networks. Part of it can become possible by moving functionality to the edge, such as using fog computing models [18] where smart devices such as IoT hubs take charge of time-critical operations and cloud servers take care of gathering data of and analytical responsibilities. Other solutions involve the use of peer-to-peer communications, where devices identify and authenticate each other directly and exchange information without the involvement of a broker. Networks will be created in meshes with no single point of failure. This model will have its own set of challenges, especially from a security perspective, but these challenges can be met with some of the emerging IoT technologies such as the Phantom protocol, or leveraging the success of other tried and tested models such as the block chain. E. Compatibility and Longevity Challenges As an industry that is going through its baby steps, IoT is growing in many different directions, with many different technologies competing to become the standard. For instance, we currently have ZigBee, Z-Wave, WI-Fi, Bluetooth and Bluetooth Low Energy (BTLE) all vying to become the dominant transport mechanism between devices and hubs. This will cause difficulties and require the deployment of extra hardware and software when connecting devices. Other compatibility issues stem from non-unified cloud services, lack of standardized M2M protocols and diversities in firmware and operating systems among IoT devices [23]. Some of these technologies [20] will eventually become obsolete in the next few years, effectively rendering the devices implementing them useless. This is especially important, since in contrast to generic computing devices which have a lifespan of a few years, IoT appliances (such as smart fridges or TVs) tend to remain in service for much longer, and should be able to function even if their manufacturer goes out of service. VII. APPLICATIONS OF IOT The applications of IoT in environmental monitoring are broad: environmental protection, extreme weather monitoring, water safety, endangered species protection, commercial farming, and more. In these applications, sensors detect and measure every type of environmental change. Present monitoring technology for air and water safety mainly uses manual labor along with advanced instruments, and lab processing. IoT improves this technology by decreasing the need for human labor, allowing frequent sampling, increasing the range of sampling and monitoring [12], allowing sophisticated testing on-site and joining response efforts to detection systems New IoT advances promise more fine- grained data, better accuracy, and flexibility. Effective forecasting [8] requires high detail and flexibility in range, instrument type, and deployment. This allows early detection International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 6, June 2018 61 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 6. and early responses to prevent loss of life and property. Today’s sophisticated commercial farms have exploited advanced technology and biotechnology for quite some time, however, IoT introduces more access to deeper automation and analysis. Much of commercial farming, like weather monitoring, suffers from a lack of precision and requires human work in the area of monitoring [21]. VIII. CONCLUSIONS The foremost highlighting of this paper was to underline major issues in security of IoT predominantly, meeting point the security attacks and their solutions. Concession security mechanism in IoT devices, finished many devices objective for hackers. In this paper, the security necessities are discussed such as confidentiality, integrity, and authentication, etc. Trust in mind the significance of security in IoT environment, it is really very important to include security method in IoT devices and communication networks. Moreover, to protect from any security threat, it is also recommended not to use default passwords for the devices and read the security requirements for the devices before using it for the first time. Disabling the features that are not used may decrease the chances of security attacks. Moreover, it is important to study different security protocols used in IoT devices and networks. References [1] J. S. Kumar and D. R. Patel, “A survey on internet of things: Security and privacy issues,” International Journal of Computer Applications, vol. 90, no. 11, 2014. [2] M. Abomhara and G. M. Køien, “Security and privacy in the internet of things: Current status and open issues,” in Privacy and Security in Mobile Systems (PRISMS), International Conference on. IEEE, 2014, pp. 1–8. [3] S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, “A vision of iot: Applications, challenges, and opportunities with china perspective,” IEEE Internet of Things journal, vol. 1, no. 4, pp. 349–359, 2014. [4] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct 2010. [5] M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis of security issues, challenges, and open problems in the internet of things,” in Services (SERVICES), 2015 IEEE World Congress on. IEEE, 2015, pp. 21–28. [6] L. Da Xu, W. He, and S. Li, “Internet of things in industries: A survey,” IEEE Transactions on industrial informatics, vol. 10, no. 4, pp. 2233– 2243, 2014. [7] L. M. R. Tarouco, L. M. Bertholdo, L. Z. Granville, L. M. R. Arbiza, F. Carbone, M. Marotta, and J. J. C. de Santanna, “Internet of things in healthcare: Interoperatibility and security issues,” in Communications (ICC), IEEE International Conference on. IEEE, 2012, pp. 6121–6125. [8] A. Mohan, “Cyber security for personal medical devices internet of things,” in Distributed Computing in Sensor Systems (DCOSS), 2014 IEEE International Conference on. IEEE, 2014, pp. 372–374 [9] S. Yoon, H. Park, and H. S. Yoo, “Security issues on smarthome in iot environment,” in Computer Science and its Applications. Springer, 2015, pp. 691–696. [10] R. H. Weber, “Internet of things–new security and privacy challenges,” Computer law & security review, vol. 26, no. 1, pp. 23–30, 2010. [11] S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, “Proposed security model and threat taxonomy for the internet of things (iot),” in International Conference on Network Security and Applications. Springer, 2010, pp. 420–429. [12] Y. H. Hwang, “Iot security & privacy: threats and challenges,” in Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security. ACM, 2015, pp. 1–1. [13] M. A. Qureshi, A. Aziz, B. Ahmed, A. Khalid, and H. Munir, “Comparative analysis and implementation of efficientdigital image watermarking schemes,” International Journal of Computer and Electrical Engineering, vol. 4, no. 4, p. 558, 2012. [14] M. Abdur Razzaq, R. A. Sheikh, A. Baig, and A. Ahmad, “Digital image security: Fusion of encryption, steganography and watermarking,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 5, 2017. [15] S. Singh and N. Singh, “Internet of things (iot): Security challenges, business opportunities & reference architecture for e-commerce,” in Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on. IEEE, 2015, pp. 1577–1581. [16] K. Rose, S. Eldridge, and L. Chapin, “The internet of things: An overview,” The Internet Society (ISOC), pp. 1–50, 2015. [17] H. Ning, H. Liu, and L. T. Yang, “Cyberentity security in the internet of things,” Computer, vol. 46, no. 4, pp. 46–53, 2013. [18] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010. [19] S. Andreev and Y. Koucheryavy, “Internet of things, smart spaces, and next generation networking,” Springer, LNCS, vol. 7469, p. 464, 2012. [20] J. S. Kumar and D. R. Patel, “A survey on internet of things: Security and privacy issues,” International Journal of Computer Applications, vol. 90, no. 11, pp. 20–26, March 2014, published by Foundation of Computer Science, New York, USA. [21] A. Stango, N. R. Prasad, and D. M. Kyriazanos, “A threat analysis methodology for security evaluation and enhancement planning,” in Emerging Security Information, Systems and Technologies, 2009. SECURWARE’09. Third International Conference on. IEEE, 2009, pp. 262–267. [22] D. Jiang and C. ShiWei, “A study of information security for m2m of iot,” in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, vol. 3. IEEE, 2010, pp. V3–576. [23] B. Schneier, Secrets and lies: digital security in a networked world. John Wiley & Sons, 2011. [24] J. M. Kizza, Guide to Computer Network Security. Springer, 2013. [25] M. Taneja, “An analytics framework to detect compromised iot devices using mobility behavior,” in ICT Convergence (ICTC), 2013 International Conference on. IEEE, 2013, pp. 38–43. [26] G. M. Koien and V. A. Oleshchuk, Aspects of Personal Privacy in Communications-Problems, Technology and Solutions. River Publishers, 2013. [27] N. R. Prasad, “Threat model framework and methodology for personal networks (pns),” in Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on. IEEE, 2007, pp. 1–6. [28] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer et al. “Internet of things strategic research roadmap,” Internet of ThingsGlobal Technological and Societal Trends, pp. 9–52, 2011. [29] S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service modelling for the internet of things,” in Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on. IEEE, 2011, pp. 949–955. [30] G. Xiao, J. Guo, L. Xu, and Z. Gong, “User interoperability with heterogeneous iot devices through transformation,” 2014. [31] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013. International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 6, June 2018 62 https://sites.google.com/site/ijcsis/ ISSN 1947-5500