SlideShare a Scribd company logo
1 of 5
Download to read offline
IJSRD || National Conference on ICT & IoT || January 2016
©IJSRD 2016 Published by IJSRD 35
A Survey Report on: Security & Challenges in
Internet of Things
Pratap Kumar1
Rakesh Singh Kunwar2
Alok Sachan3
1
M. Tech (Cyber Security) 2
Ph. D. (Cyber Security) 3
M. Tech (Information Security)
1,2
Department of Information Technology 3
Department of Computer Science and Engineering
1,2
Raksha Shakti University, Ahmedabad 3
BIT Mesra, Ranchi
Abstract— In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains
like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in
all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the
society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving
security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and
reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which
proportionally increases the security threats involved in IoT The relationship between the security and billions of devices
connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the
opportunities possible in the IoT with security threats and challenges associated with it.
Key words: Internet of Things (IoT), Challenges, Risk, Threats, Security
I. INTRODUCTION
The Internet of Things increasing preponderance of entities which is going to transform the real world objects into intelligent
virtual and physical objects. In the era of present technology, the main aim of IoT is to unify everything in our real world
under a common infrastructure andkeeping us informed of the state of the things. IoT devices include personal computers,
PDAs, laptops, watches, tablets, smart phones and other hand-held embedded devices. IoT communication comes from
computing machine and embedded sensor systems which is used in industrial machine-to-machine (M2M) communication
like as smart city, smart energy grids, smart home and building automation. Generally, IoT products are old and unpatched
embedded operating systems and software. To improve the security in IoT device which connects directly to the Internet,
should network access restricted. The network segment should then be monitored to identify potential anonymous traffic,
malicious activity and if there is a problem then take action over that. In December 2013, a researcher of Proof point (security
firm) discovered the first IoT botnet. By the Proofpoint, more than 25 percent of the botnet was made up of peripheral devices
other than computers, including smart watch, smart TVs,smart phone, baby monitors and other household appliances.
II. OPPORTUNITIES IN INTERNET OF THINGS
A. Smart Cities
By the McKinsey report Smart cities are the second or third largest target area for IoT ,with the project economic impact
totaling somewhere between $1 trillion and $1.6 trillion by 2025. Many of the advantages of smart cities like as, ability to
monitor and track the activities of citizens on a massive scale, These type of tracking of citizens raises serious issues
regarding privacy and security. There are several systems within a city that could potentially to analyze the buying list of
products so it is necessary to enforce standards for communications protocols.
B. Healthcare Things
An Internet of Healthcare Things (IoHT) can be a revolution in medicine, healthcare delivery and consumer health. Now it’s
working on Smart medical devices, including smartphones, watches, and other bio-based wearable’s which are connected to
IoHT, it can also provide improved, pervasive, cost-effective and personalized medical care. So, an IoHT can also improve
hospitals, nursing homes, assisted living, and continuous care retirement communities in many ways.[19] [21][23].
C. Smart Homes
Smart homes have been a dream for decades but due to the lack of experiences and practical technology (e.g., low cost, easy-
to-deploy, low maintenance, etc) has often limited large-scale deployments and mainstream adoption. There are over a 120
million homes in the U.S. and far fewer brand new homes are going to be built in the next couple decades. Finally
interoperability in the home continues to be a barrier compared to other IoT domains (health, city) that provide more
opportunities for professional system support and maintenance[19][23].
III. CHALLENGES /THREATS IN INTERNET OF THINGS
The Internet of Things (IoT) is the biggest revolution in the making in the IT industry. With the growth of special
requirements in IoT, several challenges and potential threats also grow with time which are discussed
below[2][3][4][5][6][7][8][12].
A Survey Report on: Security & Challenges in Internet of Things
(IJSRD/Conf/NCICT /2016/10)
36
A. Confidentiality and Encryption
Each and every device or node in the IoT can act as a potential risk. Preserving confidentiality of the data and its integrity
must be maintaining during the transmission of data. Sometime due to poor encryption and backdoor security mechanisms,
transmitted data is not secured against unauthorized interference or it can be capture and misuse by the attacker during
transmission across the network.
B. Trust and Data Integrity
During transmission messages send from sender to receiver can be spoof and false data can be send. This problem is exist in
several IoT devices which suddenly become connected. So, security must be built into the architectural design of these IoT
devices and systems to enable trust in both the hardware and integrity of the data.
C. Data Collection, Protection and Privacy
IoT provide several facilities which directly easier everyday lives by boosting efficiency and productivity of businesses with
employees. Using IoT in such a fashion have both pros and cons. In one side, the data collected will help us make effective
and smarter decisions. But on the other side, it impacts the privacy expectations. If connected device which collect the data is
compromised, then it will undermine the trust in the IoT.
D. Mobility
Mobility is one of the eminent attributes of the IoT devices, where the devices hyper connected to the network without prior
configuration. So it is necessary to develop mobility springy security algorithms for the IoT devices.
E. Identifying & Implementing Security Controls
In digital world, redundancy is critical; if one product fail, another is there to capture. Similarly concept of layered security
works, but it is notable thing to see how well enterprises can keep security and manage the redundancy. The biggest
challenges for enterprises is to identifying where security controls are needed for this emerging breed of internet-connected
devices and then implementing these controls effectively.
F. Modular Hardware and Software Components
It is very important part in which security must be considered and implemented in every domain of IoT to maintain and
control the parts or modules of Internet-connected devices. The major problem is that the attackers unfortunately compromise
the supply chain of IoT devices, after implanting malicious code and other vulnerabilities they exploit all the devices have
been implemented in an enterprise environment. It may prove necessary to adopt a security paradigm
G. Resource Constraints
Every peripheral IoT devices are resource constrained. i.e, they need computational resources, onboard memory, energy,
bandwidth etc. In open environment these nodes accessible physically, so easily be cloned and tampered.
H. Resource and Service Discovery
In Iot large number of end devices are deployed in the field therefore, most of the Iot devices can function autonomously with
the requirement. They also acquire and use the required services which are useful for the connection. So, coordinators in an
IoT deployment must implement resource and service directories that can be queried on a public interface. Due to distributed
architecture in nature, all the data is spread over clouds. So without proper security measures it may lead to information
leakage and user privacy issues.
As there are several challenges and threats spread which effect the IoT, some of these threats are listed in table
below which display on different attack based on threats or challenges:
Table 1: various attack based on threats in IoT
A Survey Report on: Security & Challenges in Internet of Things
(IJSRD/Conf/NCICT /2016/10)
37
IV. SECURITY IN INTERNET OF THINGS
According to SANS technology, we collect information as respect to security, challenge and an opportunity for new ways of
thinking about ecologies of security [17] shown in fig1. Whereas in fig 2, The threat of IoT listed in different aspect would
be, the most difficulty patching thing (31%) in embedded operating systems and applications. Malware and any infection
through virus it cited as (26%), with the concern being that IoT devices would end up spreading malware into the enterprise.
Denial of service attack on things(13%) and sabotage and destruction of connected Things (12%) were also concern.
Fig. 1: Perception about IoT Security[17]
Fig. 2: Threats to the Internet of Things[17]
A. Risk in IoT
Internet connection as the riskiest aspect of the IoT devices because for consumer power constraints and also guarantee
security. As per sans technology Command and control channels to the devices (24%), with concerns about device operating
systems (11%) and firmware (9%) rounding out the list. Organizations using IoT will need to add more security in IoT
applications need to configuration and patch management maintenance.
Fig. 3: Greatest Risk in IoT[17].
A Survey Report on: Security & Challenges in Internet of Things
(IJSRD/Conf/NCICT /2016/10)
38
V. SECURITY DEVICE LIFE CYCLE
Security is the major concern in IoT Security must be addressed throughout the device lifecycle, from the initial design to till
operational environment.
Fig. 4: IOT Security Device Life Cycle
A. Secure Booting
When power is introduced into the device, the authenticity and integrity of the software on the device is verified using
cryptographically generated digital signatures. A digital signature attached to the software image and verified by the device
ensures that only the software that has been authorized to run on that device, and signed by the entity that authorized it, but
the device still needs protection from various run-time threats and malicious intentions.
B. Access Control
Access control is applied in different forms of resource that controls built into the operating system limit the privileges of
device components and applications so they access only the resources. It is important to understand that device-based access
control mechanisms are correspondent to network-based access control systems i.e. even if intruder able to steal corporate
credentials to gain access to a network, only limited information will open to access.
C. Device Authentication
When the device is plugged into the network, it should authenticate itself prior to receiving or transmitting data Just as user
authentication allows a user to access a corporate network based on user name and password, machine authentication allows a
device to access a network based on a similar set of credentials stored in a secure storage area.
D. Firewalling and IPS
The device needs a firewall or the packet inspection capability to control traffic that is destined to terminate at the device
.Embedded devices have unique protocols, For instance, the every smart energy grid must has its own set of rules and
protocols governing how devices talk to each other . The network appliances must take care of it but it mainly need to filter
the specific data bound to terminate on that device in a way that makes optimal use of the limited computational resources
available.
E. Updates and Patches
Once the devices is in the field performing critical operation or services and are dependent on security patches to protect
against the inevitable vulnerability that escapes into the wild. In IoT software updates and security patches must be delivered
in a way that conserves the limited bandwidth.
VI. FUTURE WORK
In the future, the Internet of Things is likely to combine the virtual and physical worlds together such a way that it makes
difficult to understand. As a security and privacy perspective, the predicted pervasive of sensors and devices such as home,
the car and wearable and ingestible, poses particular challenges. Physical objects in our everyday lives, share our observations
and detect the feature particular to detect.
A Survey Report on: Security & Challenges in Internet of Things
(IJSRD/Conf/NCICT /2016/10)
39
VII. CONCLUSION
In this paper, we have surveyed the most important security aspects of the Internet of Things with focus on the security and
challenges concern with the IoT. As the IoT comes with the different opportunity, due to outgrow the number of personal
computers and even mobile phones by several orders of magnitude. It also raises different types of challenges.
REFERENCES
[1] OETZEE, Louis; EKSTEEN, Johan “The Internet of Things - promise for the future? An introduction” IST-Africa
Conference 2011 , Issue Date: 11-13 May 2011
[2] Xu, Teng; Wendt, James B.; Potkonjak, Miodrag “Security of IoT systems: Design challenges and opportunities”
Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on , Issue Date: 2-6 Nov. 2014
[3] Fink, G.A.; Zarzhitsky, D.V.; Carroll, T.E.; Farquhar, E.D “Security and privacy grand challenges for the Internet of
Things” Collaboration Technologies and Systems (CTS), 2015 International Conference on, Issue Date: 1-5 June 2015
[4] S.S.; Tripathy, S.; Chowdhury, A.R “Design challenges and security issues in the Internet of Things” Region 10
Symposium (TENSYMP), 2015 IEEE, Issue Date: 13-15 May 2015
[5] Sadeghi, A.-R.; Wachsmann, C.; Waidner, M. “Security and privacy challenges in industrial Internet of Things”Design
Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE, Issue Date: 8-12 June 2015
[6] Billure, R.; Tayur, V.M.; Mahesh, V. “Internet of Things - a study on the security challenges” Advance Computing
Conference (IACC), 2015 IEEE International, Issue Date: 12-13 June 2015
[7] Hossain, M.M.; Fotouhi, M.; Hasan, R. “Towards an Analysis of Security Issues, Challenges, and Open Problems in the
Internet of Things” Services (SERVICES), 2015 IEEE World Congress on, Issue Date: June 27 2015-July 2 2015
[8] Matharu, G.S.; Upadhyay, P.; Chaudhary, L. “The Internet of Things: Challenges & security issues”Emerging
Technologies (ICET), 2014 International Conference on, Issue Date: 8-9 Dec. 2014
[9] Axelrod, C.W. “Enforcing security, safety and privacy for the Internet of Things” Systems, Applications and
Technology Conference (LISAT), 2015 IEEE Long Island, Issue Date: 1-1 May 2015
[10]Li, Lan “ Study on security architecture in the Internet of Things” Measurement, Information and Control (MIC), 2012
International Conference on , Issue Date: 18-20 May 2012
[11]XuXiaohui “Study on Security Problems and Key Technologies of the Internet of Things”Computational and
Information Sciences (ICCIS), 2013 Fifth International Conference on, Issue Date: 21-23 June 2013
[12]G.S.; Upadhyay, P.; Chaudhary, L. “The Internet of Things: Challenges & security issues” Emerging Technologies
(ICET), 2014 International Conference on, Issue Date: 8-9 Dec. 2014
[13]Harald Bauer, Mark Patel, and Jan Veira “Internet of Things: Opportunities and challenges for semiconductor
companies”Article by McKinsey’soctober 2015
[14]http://www.forbes.com/sites/davelewis/2014/09/16/security-and-the-internet-of-things/
[15]Madakam, S. ,Ramaswamy, R. and Tripathi, S. (2015) Internet of Things (IoT): A Literature Review. Journal of
Computer and Communications,3, 164-173. doi: 10.4236/jcc.2015.35021.
[16]Wind River System white paper “Security In The Internet Of Things” 2015
[17]John Pescatore “Securing the Internet of Things Survey” A SANS Analyst Survey: January 2014
[18]Carolyn Marsan “The Internet of Things: an overview” Internet Society October 2015
[19]Rajeev Alur, Emery Berger, Ann W. Drobnis, Limor Fix, Kevin Fu, Gregory D. Hager, Daniel Lopresti, KlaraNahrstedt,
Elizabeth Mynatt, Shwetak Patel, Jennifer Rexford, John A. Stankovic, and Benjamin Zorn “Systems Computing
Challenges in the Internet of Things” computing community consortium(ccc), Issue Date: September 22, 2015
[20]JayavardhanaGubbi ,RajkumarBuyya , SlavenMarusic , MarimuthuPalaniswami “Internet of Things (IoT): A Vision,
Architectural Elements, and Future Directions” by buyya 2012
[21]Sir Mark Walport “The Internet of Things: making the most of the Second Digital Revolution” UK Government Chief
Scientific Adviser 2014
[22]http://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security
[23]Tavis C. McCourt, DanielToomey, SimonLeopold, GeorgiosKyriakopoulos,AlexanderSklar,Brian Peterson “The
Internet of Things: A Study in Hype, Reality, Disruption, and Growth”U.S. Research Published by Raymond James &
Associates, , Issue Date : January 24, 2014
[24]Dave Evans “The Internet of Things: How the Next Evolution of the Internet Is Changing Everything” by postscapes
Issue Date: July 09, 2012

More Related Content

What's hot

15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
IOT Unit-1 (Introduction to IOT) by Durgacharan
IOT Unit-1 (Introduction to IOT) by DurgacharanIOT Unit-1 (Introduction to IOT) by Durgacharan
IOT Unit-1 (Introduction to IOT) by DurgacharanDurgacharan Kondabathula
 
iot report 3 (2)
iot report 3 (2)iot report 3 (2)
iot report 3 (2)AISWARYA T
 
FTC Internet of Things Article
FTC Internet of Things ArticleFTC Internet of Things Article
FTC Internet of Things ArticleKimberly Verska
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of ThingsIRJET Journal
 
Internet of Things -Overview
Internet of Things -OverviewInternet of Things -Overview
Internet of Things -OverviewIJRST Journal
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
 
Societal Change and Transformation by Internet of Things (IoT)
Societal Change and Transformation by Internet of Things (IoT)Societal Change and Transformation by Internet of Things (IoT)
Societal Change and Transformation by Internet of Things (IoT)CSCJournals
 
New Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and SolutionsNew Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and SolutionsTELKOMNIKA JOURNAL
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Mayank Vijh
 
IOT- information Technology
IOT- information Technology IOT- information Technology
IOT- information Technology khushi pokharna
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Tarika Verma
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET Journal
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET Journal
 
IOT in electrical engineering
IOT in electrical engineeringIOT in electrical engineering
IOT in electrical engineeringdeepakbagam
 
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...IRJET Journal
 

What's hot (20)

15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
IOT Unit-1 (Introduction to IOT) by Durgacharan
IOT Unit-1 (Introduction to IOT) by DurgacharanIOT Unit-1 (Introduction to IOT) by Durgacharan
IOT Unit-1 (Introduction to IOT) by Durgacharan
 
iot report 3 (2)
iot report 3 (2)iot report 3 (2)
iot report 3 (2)
 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
FTC Internet of Things Article
FTC Internet of Things ArticleFTC Internet of Things Article
FTC Internet of Things Article
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
Iot Report
Iot ReportIot Report
Iot Report
 
Internet of Things -Overview
Internet of Things -OverviewInternet of Things -Overview
Internet of Things -Overview
 
theiva
theivatheiva
theiva
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected things
 
Societal Change and Transformation by Internet of Things (IoT)
Societal Change and Transformation by Internet of Things (IoT)Societal Change and Transformation by Internet of Things (IoT)
Societal Change and Transformation by Internet of Things (IoT)
 
New Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and SolutionsNew Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and Solutions
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
 
IOT- information Technology
IOT- information Technology IOT- information Technology
IOT- information Technology
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future Internet
 
A Methodology for Building the Internet of Things
A Methodology for Building the Internet of ThingsA Methodology for Building the Internet of Things
A Methodology for Building the Internet of Things
 
IOT in electrical engineering
IOT in electrical engineeringIOT in electrical engineering
IOT in electrical engineering
 
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
 

Similar to A Survey Report on : Security & Challenges in Internet of Things

IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutionsijtsrd
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfSeasiaInfotech2
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 

Similar to A Survey Report on : Security & Challenges in Internet of Things (20)

IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
iot ppt.pptx
iot ppt.pptxiot ppt.pptx
iot ppt.pptx
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
76 s201918
76 s20191876 s201918
76 s201918
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Future of Internet.pptx
Future of Internet.pptxFuture of Internet.pptx
Future of Internet.pptx
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 

More from ijsrd.com

Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONijsrd.com
 
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...ijsrd.com
 
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...ijsrd.com
 
Study of Compensation of Variable Delay in Communication Link Using Communica...
Study of Compensation of Variable Delay in Communication Link Using Communica...Study of Compensation of Variable Delay in Communication Link Using Communica...
Study of Compensation of Variable Delay in Communication Link Using Communica...ijsrd.com
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
 

More from ijsrd.com (20)

Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
 
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing f...
 
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...
Neural Network Based Voltage and Frequency Controller for standalone Wind Pow...
 
Study of Compensation of Variable Delay in Communication Link Using Communica...
Study of Compensation of Variable Delay in Communication Link Using Communica...Study of Compensation of Variable Delay in Communication Link Using Communica...
Study of Compensation of Variable Delay in Communication Link Using Communica...
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

A Survey Report on : Security & Challenges in Internet of Things

  • 1. IJSRD || National Conference on ICT & IoT || January 2016 ©IJSRD 2016 Published by IJSRD 35 A Survey Report on: Security & Challenges in Internet of Things Pratap Kumar1 Rakesh Singh Kunwar2 Alok Sachan3 1 M. Tech (Cyber Security) 2 Ph. D. (Cyber Security) 3 M. Tech (Information Security) 1,2 Department of Information Technology 3 Department of Computer Science and Engineering 1,2 Raksha Shakti University, Ahmedabad 3 BIT Mesra, Ranchi Abstract— In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it. Key words: Internet of Things (IoT), Challenges, Risk, Threats, Security I. INTRODUCTION The Internet of Things increasing preponderance of entities which is going to transform the real world objects into intelligent virtual and physical objects. In the era of present technology, the main aim of IoT is to unify everything in our real world under a common infrastructure andkeeping us informed of the state of the things. IoT devices include personal computers, PDAs, laptops, watches, tablets, smart phones and other hand-held embedded devices. IoT communication comes from computing machine and embedded sensor systems which is used in industrial machine-to-machine (M2M) communication like as smart city, smart energy grids, smart home and building automation. Generally, IoT products are old and unpatched embedded operating systems and software. To improve the security in IoT device which connects directly to the Internet, should network access restricted. The network segment should then be monitored to identify potential anonymous traffic, malicious activity and if there is a problem then take action over that. In December 2013, a researcher of Proof point (security firm) discovered the first IoT botnet. By the Proofpoint, more than 25 percent of the botnet was made up of peripheral devices other than computers, including smart watch, smart TVs,smart phone, baby monitors and other household appliances. II. OPPORTUNITIES IN INTERNET OF THINGS A. Smart Cities By the McKinsey report Smart cities are the second or third largest target area for IoT ,with the project economic impact totaling somewhere between $1 trillion and $1.6 trillion by 2025. Many of the advantages of smart cities like as, ability to monitor and track the activities of citizens on a massive scale, These type of tracking of citizens raises serious issues regarding privacy and security. There are several systems within a city that could potentially to analyze the buying list of products so it is necessary to enforce standards for communications protocols. B. Healthcare Things An Internet of Healthcare Things (IoHT) can be a revolution in medicine, healthcare delivery and consumer health. Now it’s working on Smart medical devices, including smartphones, watches, and other bio-based wearable’s which are connected to IoHT, it can also provide improved, pervasive, cost-effective and personalized medical care. So, an IoHT can also improve hospitals, nursing homes, assisted living, and continuous care retirement communities in many ways.[19] [21][23]. C. Smart Homes Smart homes have been a dream for decades but due to the lack of experiences and practical technology (e.g., low cost, easy- to-deploy, low maintenance, etc) has often limited large-scale deployments and mainstream adoption. There are over a 120 million homes in the U.S. and far fewer brand new homes are going to be built in the next couple decades. Finally interoperability in the home continues to be a barrier compared to other IoT domains (health, city) that provide more opportunities for professional system support and maintenance[19][23]. III. CHALLENGES /THREATS IN INTERNET OF THINGS The Internet of Things (IoT) is the biggest revolution in the making in the IT industry. With the growth of special requirements in IoT, several challenges and potential threats also grow with time which are discussed below[2][3][4][5][6][7][8][12].
  • 2. A Survey Report on: Security & Challenges in Internet of Things (IJSRD/Conf/NCICT /2016/10) 36 A. Confidentiality and Encryption Each and every device or node in the IoT can act as a potential risk. Preserving confidentiality of the data and its integrity must be maintaining during the transmission of data. Sometime due to poor encryption and backdoor security mechanisms, transmitted data is not secured against unauthorized interference or it can be capture and misuse by the attacker during transmission across the network. B. Trust and Data Integrity During transmission messages send from sender to receiver can be spoof and false data can be send. This problem is exist in several IoT devices which suddenly become connected. So, security must be built into the architectural design of these IoT devices and systems to enable trust in both the hardware and integrity of the data. C. Data Collection, Protection and Privacy IoT provide several facilities which directly easier everyday lives by boosting efficiency and productivity of businesses with employees. Using IoT in such a fashion have both pros and cons. In one side, the data collected will help us make effective and smarter decisions. But on the other side, it impacts the privacy expectations. If connected device which collect the data is compromised, then it will undermine the trust in the IoT. D. Mobility Mobility is one of the eminent attributes of the IoT devices, where the devices hyper connected to the network without prior configuration. So it is necessary to develop mobility springy security algorithms for the IoT devices. E. Identifying & Implementing Security Controls In digital world, redundancy is critical; if one product fail, another is there to capture. Similarly concept of layered security works, but it is notable thing to see how well enterprises can keep security and manage the redundancy. The biggest challenges for enterprises is to identifying where security controls are needed for this emerging breed of internet-connected devices and then implementing these controls effectively. F. Modular Hardware and Software Components It is very important part in which security must be considered and implemented in every domain of IoT to maintain and control the parts or modules of Internet-connected devices. The major problem is that the attackers unfortunately compromise the supply chain of IoT devices, after implanting malicious code and other vulnerabilities they exploit all the devices have been implemented in an enterprise environment. It may prove necessary to adopt a security paradigm G. Resource Constraints Every peripheral IoT devices are resource constrained. i.e, they need computational resources, onboard memory, energy, bandwidth etc. In open environment these nodes accessible physically, so easily be cloned and tampered. H. Resource and Service Discovery In Iot large number of end devices are deployed in the field therefore, most of the Iot devices can function autonomously with the requirement. They also acquire and use the required services which are useful for the connection. So, coordinators in an IoT deployment must implement resource and service directories that can be queried on a public interface. Due to distributed architecture in nature, all the data is spread over clouds. So without proper security measures it may lead to information leakage and user privacy issues. As there are several challenges and threats spread which effect the IoT, some of these threats are listed in table below which display on different attack based on threats or challenges: Table 1: various attack based on threats in IoT
  • 3. A Survey Report on: Security & Challenges in Internet of Things (IJSRD/Conf/NCICT /2016/10) 37 IV. SECURITY IN INTERNET OF THINGS According to SANS technology, we collect information as respect to security, challenge and an opportunity for new ways of thinking about ecologies of security [17] shown in fig1. Whereas in fig 2, The threat of IoT listed in different aspect would be, the most difficulty patching thing (31%) in embedded operating systems and applications. Malware and any infection through virus it cited as (26%), with the concern being that IoT devices would end up spreading malware into the enterprise. Denial of service attack on things(13%) and sabotage and destruction of connected Things (12%) were also concern. Fig. 1: Perception about IoT Security[17] Fig. 2: Threats to the Internet of Things[17] A. Risk in IoT Internet connection as the riskiest aspect of the IoT devices because for consumer power constraints and also guarantee security. As per sans technology Command and control channels to the devices (24%), with concerns about device operating systems (11%) and firmware (9%) rounding out the list. Organizations using IoT will need to add more security in IoT applications need to configuration and patch management maintenance. Fig. 3: Greatest Risk in IoT[17].
  • 4. A Survey Report on: Security & Challenges in Internet of Things (IJSRD/Conf/NCICT /2016/10) 38 V. SECURITY DEVICE LIFE CYCLE Security is the major concern in IoT Security must be addressed throughout the device lifecycle, from the initial design to till operational environment. Fig. 4: IOT Security Device Life Cycle A. Secure Booting When power is introduced into the device, the authenticity and integrity of the software on the device is verified using cryptographically generated digital signatures. A digital signature attached to the software image and verified by the device ensures that only the software that has been authorized to run on that device, and signed by the entity that authorized it, but the device still needs protection from various run-time threats and malicious intentions. B. Access Control Access control is applied in different forms of resource that controls built into the operating system limit the privileges of device components and applications so they access only the resources. It is important to understand that device-based access control mechanisms are correspondent to network-based access control systems i.e. even if intruder able to steal corporate credentials to gain access to a network, only limited information will open to access. C. Device Authentication When the device is plugged into the network, it should authenticate itself prior to receiving or transmitting data Just as user authentication allows a user to access a corporate network based on user name and password, machine authentication allows a device to access a network based on a similar set of credentials stored in a secure storage area. D. Firewalling and IPS The device needs a firewall or the packet inspection capability to control traffic that is destined to terminate at the device .Embedded devices have unique protocols, For instance, the every smart energy grid must has its own set of rules and protocols governing how devices talk to each other . The network appliances must take care of it but it mainly need to filter the specific data bound to terminate on that device in a way that makes optimal use of the limited computational resources available. E. Updates and Patches Once the devices is in the field performing critical operation or services and are dependent on security patches to protect against the inevitable vulnerability that escapes into the wild. In IoT software updates and security patches must be delivered in a way that conserves the limited bandwidth. VI. FUTURE WORK In the future, the Internet of Things is likely to combine the virtual and physical worlds together such a way that it makes difficult to understand. As a security and privacy perspective, the predicted pervasive of sensors and devices such as home, the car and wearable and ingestible, poses particular challenges. Physical objects in our everyday lives, share our observations and detect the feature particular to detect.
  • 5. A Survey Report on: Security & Challenges in Internet of Things (IJSRD/Conf/NCICT /2016/10) 39 VII. CONCLUSION In this paper, we have surveyed the most important security aspects of the Internet of Things with focus on the security and challenges concern with the IoT. As the IoT comes with the different opportunity, due to outgrow the number of personal computers and even mobile phones by several orders of magnitude. It also raises different types of challenges. REFERENCES [1] OETZEE, Louis; EKSTEEN, Johan “The Internet of Things - promise for the future? An introduction” IST-Africa Conference 2011 , Issue Date: 11-13 May 2011 [2] Xu, Teng; Wendt, James B.; Potkonjak, Miodrag “Security of IoT systems: Design challenges and opportunities” Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on , Issue Date: 2-6 Nov. 2014 [3] Fink, G.A.; Zarzhitsky, D.V.; Carroll, T.E.; Farquhar, E.D “Security and privacy grand challenges for the Internet of Things” Collaboration Technologies and Systems (CTS), 2015 International Conference on, Issue Date: 1-5 June 2015 [4] S.S.; Tripathy, S.; Chowdhury, A.R “Design challenges and security issues in the Internet of Things” Region 10 Symposium (TENSYMP), 2015 IEEE, Issue Date: 13-15 May 2015 [5] Sadeghi, A.-R.; Wachsmann, C.; Waidner, M. “Security and privacy challenges in industrial Internet of Things”Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE, Issue Date: 8-12 June 2015 [6] Billure, R.; Tayur, V.M.; Mahesh, V. “Internet of Things - a study on the security challenges” Advance Computing Conference (IACC), 2015 IEEE International, Issue Date: 12-13 June 2015 [7] Hossain, M.M.; Fotouhi, M.; Hasan, R. “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things” Services (SERVICES), 2015 IEEE World Congress on, Issue Date: June 27 2015-July 2 2015 [8] Matharu, G.S.; Upadhyay, P.; Chaudhary, L. “The Internet of Things: Challenges & security issues”Emerging Technologies (ICET), 2014 International Conference on, Issue Date: 8-9 Dec. 2014 [9] Axelrod, C.W. “Enforcing security, safety and privacy for the Internet of Things” Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, Issue Date: 1-1 May 2015 [10]Li, Lan “ Study on security architecture in the Internet of Things” Measurement, Information and Control (MIC), 2012 International Conference on , Issue Date: 18-20 May 2012 [11]XuXiaohui “Study on Security Problems and Key Technologies of the Internet of Things”Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on, Issue Date: 21-23 June 2013 [12]G.S.; Upadhyay, P.; Chaudhary, L. “The Internet of Things: Challenges & security issues” Emerging Technologies (ICET), 2014 International Conference on, Issue Date: 8-9 Dec. 2014 [13]Harald Bauer, Mark Patel, and Jan Veira “Internet of Things: Opportunities and challenges for semiconductor companies”Article by McKinsey’soctober 2015 [14]http://www.forbes.com/sites/davelewis/2014/09/16/security-and-the-internet-of-things/ [15]Madakam, S. ,Ramaswamy, R. and Tripathi, S. (2015) Internet of Things (IoT): A Literature Review. Journal of Computer and Communications,3, 164-173. doi: 10.4236/jcc.2015.35021. [16]Wind River System white paper “Security In The Internet Of Things” 2015 [17]John Pescatore “Securing the Internet of Things Survey” A SANS Analyst Survey: January 2014 [18]Carolyn Marsan “The Internet of Things: an overview” Internet Society October 2015 [19]Rajeev Alur, Emery Berger, Ann W. Drobnis, Limor Fix, Kevin Fu, Gregory D. Hager, Daniel Lopresti, KlaraNahrstedt, Elizabeth Mynatt, Shwetak Patel, Jennifer Rexford, John A. Stankovic, and Benjamin Zorn “Systems Computing Challenges in the Internet of Things” computing community consortium(ccc), Issue Date: September 22, 2015 [20]JayavardhanaGubbi ,RajkumarBuyya , SlavenMarusic , MarimuthuPalaniswami “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions” by buyya 2012 [21]Sir Mark Walport “The Internet of Things: making the most of the Second Digital Revolution” UK Government Chief Scientific Adviser 2014 [22]http://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security [23]Tavis C. McCourt, DanielToomey, SimonLeopold, GeorgiosKyriakopoulos,AlexanderSklar,Brian Peterson “The Internet of Things: A Study in Hype, Reality, Disruption, and Growth”U.S. Research Published by Raymond James & Associates, , Issue Date : January 24, 2014 [24]Dave Evans “The Internet of Things: How the Next Evolution of the Internet Is Changing Everything” by postscapes Issue Date: July 09, 2012