SlideShare a Scribd company logo
1 of 20
Internet & IOT
security
Usman Anjum
SID:37081, BIT(Networking)
Project 2, Part A: study of Emerging Trends in Networking
Victorian Institute of Technology(Melbourne)
1What Is IOT ?
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy to
change colors, photos and Text.
2Security Issues in IOT
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy to
change colors, photos and Text.
3A security Breach Examples
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy to
change colors, photos and Text.
4Recommondations
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy to
change colors, photos and Text.
Overview
5Security Principals
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy to
change colors, photos and Text.
Future Direction
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy to
change colors, photos and Text.
6
Internet & IOT
What is IOT ?
.
The Internet of Things, also called The Internet of Objects, refers to a wireless network
between objects, usually the network will be wireless and self configuring, such as household
appliances.
------Wikipedia
Internet of Things refers to the concept that the Internet is no longer just a global network
for people to communicate with one another using computers, but it is also a platform for
devices to communicate electronically with the world around them.”
--Center for Data and Innovation
The term "Internet of Things" has come to describe a number of technologies and
research disciplines that enable the Internet to reach out into the real world of physical
objects.
------IoT 2008
Things having identities and virtual personalities operating in smart spaces using
intelligent interfaces to connect and communicate within social, environmental,
and user contexts”.
-------IoT in 2020
“Internet of Objects” “Machine-to-Machine Era” “Internet of Everything”
The term Internet of Things was first used by Kevin Ashton in 1999. Refers to uniquely
identifiable objects (things) and their virtual representations in an Internet-like
structure
Security Issues in IOT
What Is IT Security ?
Measures taken to protect a
computer/device/system on
the internet or off interne
from unauthorized access or
attacks
Security Issues in IOT
Privacy
The most dangerous part of IoT is
that consumers are surrendering
their privacy, bit by bit, without
realizing it,because they are
unaware of what data is being
collected and how it is being used.
Access Control
Access control deals with access
rights given to the things/devices in
IoT environment. In traditional
database systems, processing of
discrete data is done, however in IoT
processing of flowing data is done.
Some of the challenges related to
Access Control in IoT context involve:
How to handle the huge amount of
transmitted data (i.e., in the form of
stream data) in a common recognized
representation? How to support the
identification of?
Policy Enforcement
Policy enforcement refer to the
approaches used for the application of a
set of defined principals in a system.
Policies are set of defined rules which
desire to be acted for the purpose of
maintaining order, security, and
consistency on data. Only few works from
describe literature because of
Trust
The trust idea is used in different contexts
and with different explanations. Trust is a
complicated concept about which no
explanatory acquiescence endures in the
scientific literature, furthermore its
importance is dimensionally identified [7].
A core problem with many applications
towards trust description is that they do not
contribute themselves to the
demonstration of metrics and computation
methodologies.
Andrew Newman , CEO and Founder of Reason Software Company
“IoT security suffers today because the industry currently has many non-standard communication protocols,
making security for these devices incredibly complex.
Security Issues in IOT
www.free-powerpoint-templates-design.com
Mobile security
The common IoT vulnerabilities that I often see tie
into poor security on mobile applications," said
Deral Heiland, a veteran penetration tester
(pictured below) who leads Rapid7's IoT security
division[15]. "One of my biggest gripes is data
being stored on mobile apps.". What happens if a
worker simply loses a smartphone with valuable
data on it and that isn't backed up elsewhere?
Secure Middleware
The middleware has several tasks to
perform simultaneously, the primary
being to act as platform for different
technologies, protocols, network
environments, data replication. The top
vulnerabilities because of an insecure
middleware could be: Privacy concerns,
Insufficient authorization, Lack of
transport encryption, Insecure web
interface Inadequate software protection
Authentication & Confidentiality
Different works, describe different protocols and
mechanisms to deal with authentication of a user and
confidentiality of data in the context of IoT. IoT
enables a
constant transfer and sharing of data among things
and
users. In such a sharing environment, authentication,
authorization, access control and non-repudiation are
important to ensure secure communication.
Kyle Wilhoit, Senior Cybersecurity Threat Researcher at Domain Tools
“Any unsecured web-connected device could give cybercriminals an access point to the “backbone”
of a home’s computer network, and lead to the compromising of more important devices.
Security Breach Examples
1 2 3
4 5 6
3
Facebook's stock has
plunged by more
than 6.7 percent
after an analytics
firm admitted it
stole data from over
50 million users to
push targeted
political advertising.
Recommendations
Cyber security expert Bruce
Schneier has called for
government regulation of the
IoT, concluding that both IoT
manufacturers and their
customers don’t care about
the security of the 8.4 billion
internet-connected devices in
current use.
Recommendations
Security by Design
it is important that any
decision on the introduction
of new
technologies and new
procedures should be taken
only after a privacy, security
and technology impact
assessment
. The new devices / technologies should
also address discriminatory or
exclusionary aspects of how information
is presented to citizens (including IT-
illiterates). We would like to develop
technologies that people use and not
just for the sake of it, so their
requirements should be a key
consideration.
Make devices /
technologies more user
friendly, be
„inclusive‟
Technical Knowledge
A very important consideration in this
is key management: such a holistic
framework should identify the actors
generating the encryption keys
(private/public keys), how these will
be distributed, (which
agencies/organizations/authorities)
will eventually be given access to
such keys when necessary
Armin Ebrahimi, Founder & CEO of Showcard
“We are currently at the point of maximum IoT vulnerability. A device can still get into the hands of a cyber
criminal, and there is no such thing as a ‘hack-proof’ device. Therefore to minimise enterprise vulnerability we
need to focus on identifying and validating the user.
Recommendations
. The new devices / technologies should
also address discriminatory or
exclusionary aspects of how information
is presented to citizens (including IT-
illiterates). We would like to develop
technologies that people use and not
just for the sake of it, so their
requirements should be a key
consideration.
Make devices / technologies
more user friendly, be
„inclusive‟
Re-evaluate existing
business structures AND
Find New model
IoT encourages enterprises to perform vertical
business process integration improvement, the
process improvement itself also guides the
evolution of the IoT implementation
(e.g., where to put the sensors, what types of
new readers are needed). More importantly,
enterprises should regard IoT beyond
incremental improvement and investigate
totally new business models (e.g., new way of
air transportation) to achieve strong
competitive advantages.
In October 2016, the
world was introduced
to the very first
“Internet of Things”
malware. The Mirai
malware accessed the
devices using default
password and usernames.
The malware then turns
the affected devices into
a botnet in order to
facilitate a Distributed
Denial of Service (DDoS)
attack
Hagai Feiner, CEO of
Access Networks
“As IoT devices become
more common in homes,
security will need to be at
the forefront of product
design. IoT device
manufacturers need to
address the primary
vulnerabilities within their
operating systems (OS) and
applications (apps).”
Security Principals
A principal in computer security is an entity that can be
authenticated by a computer system or network. It is
referred to as a security principal in Java and Microsoft
literature. Principals can be individual people, computers,
services, computational entities such as processes and
threads, or any group of such things.
Security Principals
Australian Privacy Principles (APPs)
01 Open and transparent management of personal information
02 Collection of identity information that is not required for the business
purpose, collecting data just because you can is not permissible.
03 Dealing with unsolicited personal information
04 Notification of collection of personal information
IoT SECURITY
GUIDELINE V1.2 16
November 2017
Security Principals
• Australian Privacy Principles (APPs)
5 use or disclosure of personal information
6 Direct marketing.
7 Cross border disclosure of personal information
8 Adoption, use or disclosure of government-related identifiers
The Office of the
Australian Information
Commissioner (OAIC) has
published a range of
relevant guidance on its
website, www.oaic.gov.au.
Brian Geisel, CEO of
Geisel Software
“In 10 years, we’re going to
see security in the IoT
mature, much as we’ve seen
the networked PC do over
the past 15 years. By that
point, security will actually
be one of the key points used
by product reviewers for
devices.”
Security Principals
Australian Privacy Principles (APPs)
9 Quality of personal information
10 Security of personal information.
11 Access to personal information
12 Correction of personal information
Matt Kozloski, VP
of Professional
Services at Kelser
Corporation.
“As the number of
sensors watching and
interacting with our
lives increases over
the next 10-15 years,
we’re going to need
OSHA-like regulations
for the security of
these devices, from
their development to
integration and use.
Security Principals
OWASP(Open web application security principals ) Principles of Security
IoT systems should have capabilities to
respond to compromises, hostile participants,
malware, or other adverse events.
Plan for the Worst
New encryption, advances in protocols, new attack methods and
techniques, and changing topology all necessitate that IoT systems
be capable of addressing emerging security.
The Long Haul
Attackers will identify the weakest component and
attempt to exploit it. Mobile interfaces, hidden API's, or
resource constrained environments must enforce
security in the same way as more robust or feature rich
interfaces.
Attackers Target Weakness
To the extent possible limit access based on acceptable use criteria.
There's no advantage in exposing a sensor interface to the entire
internet if there's no good case for a remote user in a hostile country.
Limit access to white lists of rules that make sense.
Limit What You Can
Automated systems are extremely capable of presenting
misinformation in convincing formats. IoT systems should always verify
data from the edge in order to prevent autonomous misinformation
from tainting a system
Internet of Lies
Phil Richards, CISO
at Ivanti
“As we see IoT
adoption and expand
into new markets, new
products and new
services; security will
become an increasingly
larger component of
these tools.”
Future Of IOT Security
Predictions
Storm Of Devices
By 2020, it is estimated that there will be
up to 21 billion connected devices
1
More DDoS attacks
Hackers will continue to use IoT devices
to facilitate DDoS attacks
2
Smart Cities
More cities will become "smart. Consumers won’t be
the only ones using IoT devices. Cities and
companies, will also start adopting “smart”
technologies.
3
Artificial intelligence will really become a “thing”
smart home hubs, thermostats, lighting systems
and even coffee makers all collect data on your
habits and patterns of usage. All of this data is
collected to help facilitate what is called machine
learning.
4
Routers will become more secure and “smarter”
The router is essentially the entry point of the
Internet into your home. While the connected devices
cannot be protected by themselves, the router has
the ability to provide protection at the entry point.
5
SDN
With the help of software defined
networking , physical networks would
much easier to manage and control 6
Secure first, then
connect: The
future of IoT
security
Future of IOT Security
IOT Security forecasts
www.free-powerpoint-templates-design.com
01
An increasing use of artificial intelligence for real-time
security monitoring, depending on the use case
02
Appearance of blockchain (distributed ledger technology)
in IoT security and an ongoing integration of IoT and
blockchain.
03
Reliance on partners and system integrators with clear
SLAs for security and privacy.
04 A shift of focus to and end-to-end security approach with
embedded security by design.
05
Policy Regulations and security standards will be
deployed..
CONCLUSION
In short, current security services are insufficient for such contradictory
technologies and communication standard. As IoT deals with interconnecting various
heterogeneous things, currently there are many challenges occurring while building
it. So this area has many open research issues. The future research directions mainly
consists of how to deal with the challenges, may be related to security issues, faced
by IoT. I hope this research will be helpful in order to allow a valuable deployment of
IoT systems and in suggesting the future security research directions
Internet & iot security

More Related Content

What's hot

Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prustyamarprusty
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 

What's hot (20)

Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 

Similar to Internet & iot security

Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfJPLoft Solutions
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...RSIS International
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...RSIS International
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 

Similar to Internet & iot security (20)

Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
iot ppt.pptx
iot ppt.pptxiot ppt.pptx
iot ppt.pptx
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...
 
76 s201918
76 s20191876 s201918
76 s201918
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 

Recently uploaded

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 

Recently uploaded (20)

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 

Internet & iot security

  • 1. Internet & IOT security Usman Anjum SID:37081, BIT(Networking) Project 2, Part A: study of Emerging Trends in Networking Victorian Institute of Technology(Melbourne)
  • 2. 1What Is IOT ? You can simply impress your audience and add a unique zing and appeal to your Presentations. Easy to change colors, photos and Text. 2Security Issues in IOT You can simply impress your audience and add a unique zing and appeal to your Presentations. Easy to change colors, photos and Text. 3A security Breach Examples You can simply impress your audience and add a unique zing and appeal to your Presentations. Easy to change colors, photos and Text. 4Recommondations You can simply impress your audience and add a unique zing and appeal to your Presentations. Easy to change colors, photos and Text. Overview 5Security Principals You can simply impress your audience and add a unique zing and appeal to your Presentations. Easy to change colors, photos and Text. Future Direction You can simply impress your audience and add a unique zing and appeal to your Presentations. Easy to change colors, photos and Text. 6
  • 4. What is IOT ? . The Internet of Things, also called The Internet of Objects, refers to a wireless network between objects, usually the network will be wireless and self configuring, such as household appliances. ------Wikipedia Internet of Things refers to the concept that the Internet is no longer just a global network for people to communicate with one another using computers, but it is also a platform for devices to communicate electronically with the world around them.” --Center for Data and Innovation The term "Internet of Things" has come to describe a number of technologies and research disciplines that enable the Internet to reach out into the real world of physical objects. ------IoT 2008 Things having identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within social, environmental, and user contexts”. -------IoT in 2020 “Internet of Objects” “Machine-to-Machine Era” “Internet of Everything” The term Internet of Things was first used by Kevin Ashton in 1999. Refers to uniquely identifiable objects (things) and their virtual representations in an Internet-like structure
  • 5. Security Issues in IOT What Is IT Security ? Measures taken to protect a computer/device/system on the internet or off interne from unauthorized access or attacks
  • 6. Security Issues in IOT Privacy The most dangerous part of IoT is that consumers are surrendering their privacy, bit by bit, without realizing it,because they are unaware of what data is being collected and how it is being used. Access Control Access control deals with access rights given to the things/devices in IoT environment. In traditional database systems, processing of discrete data is done, however in IoT processing of flowing data is done. Some of the challenges related to Access Control in IoT context involve: How to handle the huge amount of transmitted data (i.e., in the form of stream data) in a common recognized representation? How to support the identification of? Policy Enforcement Policy enforcement refer to the approaches used for the application of a set of defined principals in a system. Policies are set of defined rules which desire to be acted for the purpose of maintaining order, security, and consistency on data. Only few works from describe literature because of Trust The trust idea is used in different contexts and with different explanations. Trust is a complicated concept about which no explanatory acquiescence endures in the scientific literature, furthermore its importance is dimensionally identified [7]. A core problem with many applications towards trust description is that they do not contribute themselves to the demonstration of metrics and computation methodologies. Andrew Newman , CEO and Founder of Reason Software Company “IoT security suffers today because the industry currently has many non-standard communication protocols, making security for these devices incredibly complex.
  • 7. Security Issues in IOT www.free-powerpoint-templates-design.com Mobile security The common IoT vulnerabilities that I often see tie into poor security on mobile applications," said Deral Heiland, a veteran penetration tester (pictured below) who leads Rapid7's IoT security division[15]. "One of my biggest gripes is data being stored on mobile apps.". What happens if a worker simply loses a smartphone with valuable data on it and that isn't backed up elsewhere? Secure Middleware The middleware has several tasks to perform simultaneously, the primary being to act as platform for different technologies, protocols, network environments, data replication. The top vulnerabilities because of an insecure middleware could be: Privacy concerns, Insufficient authorization, Lack of transport encryption, Insecure web interface Inadequate software protection Authentication & Confidentiality Different works, describe different protocols and mechanisms to deal with authentication of a user and confidentiality of data in the context of IoT. IoT enables a constant transfer and sharing of data among things and users. In such a sharing environment, authentication, authorization, access control and non-repudiation are important to ensure secure communication. Kyle Wilhoit, Senior Cybersecurity Threat Researcher at Domain Tools “Any unsecured web-connected device could give cybercriminals an access point to the “backbone” of a home’s computer network, and lead to the compromising of more important devices.
  • 8. Security Breach Examples 1 2 3 4 5 6 3 Facebook's stock has plunged by more than 6.7 percent after an analytics firm admitted it stole data from over 50 million users to push targeted political advertising.
  • 9. Recommendations Cyber security expert Bruce Schneier has called for government regulation of the IoT, concluding that both IoT manufacturers and their customers don’t care about the security of the 8.4 billion internet-connected devices in current use.
  • 10. Recommendations Security by Design it is important that any decision on the introduction of new technologies and new procedures should be taken only after a privacy, security and technology impact assessment . The new devices / technologies should also address discriminatory or exclusionary aspects of how information is presented to citizens (including IT- illiterates). We would like to develop technologies that people use and not just for the sake of it, so their requirements should be a key consideration. Make devices / technologies more user friendly, be „inclusive‟ Technical Knowledge A very important consideration in this is key management: such a holistic framework should identify the actors generating the encryption keys (private/public keys), how these will be distributed, (which agencies/organizations/authorities) will eventually be given access to such keys when necessary Armin Ebrahimi, Founder & CEO of Showcard “We are currently at the point of maximum IoT vulnerability. A device can still get into the hands of a cyber criminal, and there is no such thing as a ‘hack-proof’ device. Therefore to minimise enterprise vulnerability we need to focus on identifying and validating the user.
  • 11. Recommendations . The new devices / technologies should also address discriminatory or exclusionary aspects of how information is presented to citizens (including IT- illiterates). We would like to develop technologies that people use and not just for the sake of it, so their requirements should be a key consideration. Make devices / technologies more user friendly, be „inclusive‟ Re-evaluate existing business structures AND Find New model IoT encourages enterprises to perform vertical business process integration improvement, the process improvement itself also guides the evolution of the IoT implementation (e.g., where to put the sensors, what types of new readers are needed). More importantly, enterprises should regard IoT beyond incremental improvement and investigate totally new business models (e.g., new way of air transportation) to achieve strong competitive advantages. In October 2016, the world was introduced to the very first “Internet of Things” malware. The Mirai malware accessed the devices using default password and usernames. The malware then turns the affected devices into a botnet in order to facilitate a Distributed Denial of Service (DDoS) attack Hagai Feiner, CEO of Access Networks “As IoT devices become more common in homes, security will need to be at the forefront of product design. IoT device manufacturers need to address the primary vulnerabilities within their operating systems (OS) and applications (apps).”
  • 12. Security Principals A principal in computer security is an entity that can be authenticated by a computer system or network. It is referred to as a security principal in Java and Microsoft literature. Principals can be individual people, computers, services, computational entities such as processes and threads, or any group of such things.
  • 13. Security Principals Australian Privacy Principles (APPs) 01 Open and transparent management of personal information 02 Collection of identity information that is not required for the business purpose, collecting data just because you can is not permissible. 03 Dealing with unsolicited personal information 04 Notification of collection of personal information IoT SECURITY GUIDELINE V1.2 16 November 2017
  • 14. Security Principals • Australian Privacy Principles (APPs) 5 use or disclosure of personal information 6 Direct marketing. 7 Cross border disclosure of personal information 8 Adoption, use or disclosure of government-related identifiers The Office of the Australian Information Commissioner (OAIC) has published a range of relevant guidance on its website, www.oaic.gov.au. Brian Geisel, CEO of Geisel Software “In 10 years, we’re going to see security in the IoT mature, much as we’ve seen the networked PC do over the past 15 years. By that point, security will actually be one of the key points used by product reviewers for devices.”
  • 15. Security Principals Australian Privacy Principles (APPs) 9 Quality of personal information 10 Security of personal information. 11 Access to personal information 12 Correction of personal information Matt Kozloski, VP of Professional Services at Kelser Corporation. “As the number of sensors watching and interacting with our lives increases over the next 10-15 years, we’re going to need OSHA-like regulations for the security of these devices, from their development to integration and use.
  • 16. Security Principals OWASP(Open web application security principals ) Principles of Security IoT systems should have capabilities to respond to compromises, hostile participants, malware, or other adverse events. Plan for the Worst New encryption, advances in protocols, new attack methods and techniques, and changing topology all necessitate that IoT systems be capable of addressing emerging security. The Long Haul Attackers will identify the weakest component and attempt to exploit it. Mobile interfaces, hidden API's, or resource constrained environments must enforce security in the same way as more robust or feature rich interfaces. Attackers Target Weakness To the extent possible limit access based on acceptable use criteria. There's no advantage in exposing a sensor interface to the entire internet if there's no good case for a remote user in a hostile country. Limit access to white lists of rules that make sense. Limit What You Can Automated systems are extremely capable of presenting misinformation in convincing formats. IoT systems should always verify data from the edge in order to prevent autonomous misinformation from tainting a system Internet of Lies Phil Richards, CISO at Ivanti “As we see IoT adoption and expand into new markets, new products and new services; security will become an increasingly larger component of these tools.”
  • 17. Future Of IOT Security Predictions Storm Of Devices By 2020, it is estimated that there will be up to 21 billion connected devices 1 More DDoS attacks Hackers will continue to use IoT devices to facilitate DDoS attacks 2 Smart Cities More cities will become "smart. Consumers won’t be the only ones using IoT devices. Cities and companies, will also start adopting “smart” technologies. 3 Artificial intelligence will really become a “thing” smart home hubs, thermostats, lighting systems and even coffee makers all collect data on your habits and patterns of usage. All of this data is collected to help facilitate what is called machine learning. 4 Routers will become more secure and “smarter” The router is essentially the entry point of the Internet into your home. While the connected devices cannot be protected by themselves, the router has the ability to provide protection at the entry point. 5 SDN With the help of software defined networking , physical networks would much easier to manage and control 6 Secure first, then connect: The future of IoT security
  • 18. Future of IOT Security IOT Security forecasts www.free-powerpoint-templates-design.com 01 An increasing use of artificial intelligence for real-time security monitoring, depending on the use case 02 Appearance of blockchain (distributed ledger technology) in IoT security and an ongoing integration of IoT and blockchain. 03 Reliance on partners and system integrators with clear SLAs for security and privacy. 04 A shift of focus to and end-to-end security approach with embedded security by design. 05 Policy Regulations and security standards will be deployed..
  • 19. CONCLUSION In short, current security services are insufficient for such contradictory technologies and communication standard. As IoT deals with interconnecting various heterogeneous things, currently there are many challenges occurring while building it. So this area has many open research issues. The future research directions mainly consists of how to deal with the challenges, may be related to security issues, faced by IoT. I hope this research will be helpful in order to allow a valuable deployment of IoT systems and in suggesting the future security research directions