SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-1 (February 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5
26 This work is licensed under Creative Commons Attribution 4.0 International License.
Security and Privacy Issues in IoT Environment
Navod Neranjan Thilakarathne
Lecturer, Department of ICT, Faculty of Technology, University Of Colombo, SRILANKA
Corresponding Author: navod.neranjan@ict.cmb.ac.lk
ABSTRACT
Internet of Things (IoT) is becoming an emerging
trend superseding other technologies and researchers
considered it as the future of internet. As now the
connectivity to the World Wide Web is becoming highly
available cost is drastically decreasing so everyone can
afford the technology. As Internet of Things provides a
great opportunity to develop an important industrial
systems and applications with the help of various kind of
sensors that can sense out the environment using number of
devices that is connected to the internet, usage of IoT is
drastically increasing and becoming a common thing. With
this sky-rocketed usage and the demand, Communication
and storing of the information faces serious security issues
as the security of IoT devices become just an afterthought
when manufacturing most of the devices. This study tries to
summarize this IoT security issues in terms of primary
information security concepts confidentiality, integrity and
availability with regards to its architecture.
Keywords-- Internet of Things, IoT, Security, Privacy,
IoT Security, IoT Environment
I. INTRODUCION
Internet, basically started as small
interconnected network of less number of computers and
now it is become a large network which contains billions
of interconnected computers that shares and stores
information. The term IoT stands for Internet of Things
and we can describe an IoT system as one that comprise
of interconnected smart devices that embedded with
electronics ,software ,sensors and actuators and network
connectivity which enable these objects to collect and
exchange data.[1]
Following are the basic components of typical
IoT environment. [1]
Sensors: Those are electrical components that are able to
detect events or changes in the environment, such as
temperature, humidity.
Actuators: Any component of a machine responsible for
moving or controlling a mechanism or system.
Software: This can be described as compiled computer
instructions that control the sensors and actuators, thus
determining the final goals or outcomes of the system.
Some software could reside on the sensor or actuator
devices in a really less space.
Network: The channel through which the interconnected
devices are communicated.
IoT systems can also be described using a basic
three layer architecture.
Perception layer – The Perception layer is the typical
external physical layer, which includes sensors for
sensing and gathering information about the surrounding
environment such as temperature, humidity, pressure and
so on.
Gateway layer – The Gateway layer is responsible for
connecting to network devices, interconnected smart
devices and servers. Its features are also used for
transmitting and processing sensor data.
Cloud layer - The IoT Cloud Layer represents the back-
end services required to set up, manage, operate, and
extract business value from an IoT system. It will deliver
the application specific services to the user so they can
operate and monitor the devices.
Figure 1: Typical IoT Architecture
This IoT promises to advance our day to day life
and it provides contributions towards major important
industries such as agriculture, supply chain management,
location tracking, remote monitoring, and real time
analysis and so on. [2] As this is becoming a hot topic
this has received much attraction from researchers and
industrialists all around the word. Even though this
promises many benefits this also has many potential
issues and challenges. This paper deals with one of the
prominent issues that is security in IoT. Security remains
one of the supreme issue that stump the development and
applications of IoT.
The main objective of this study is to highlight
security and privacy issues surrounding IoT ecosystem. In
IoT, the things will communicate with each other as
everything is interconnected, so privacy can be hindered
So, we can say that lots of security and privacy issues will
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-1 (February 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5
27 This work is licensed under Creative Commons Attribution 4.0 International License.
arise and more attention is required from researchers in
IoT especially with regard to issues like authenticity,
confidentiality and integrity and availability of data and
services in IoT
This paper is divided in to serveral sections,
which section two describes about IoT attack vectors in
terms of its layers, section three and section four
describes privacy issues in IoT with example use case of
IoT attack. In the final two sections we are discussing
about countermeasures and the conclusion.
II. IOT ATTACK VECTORS IN
TERMS OF ITS LAYERS [6-14]
A. Perception Layer
This layer is the lowest layer in the IoT
architecture and also called as the Devices layer. Main
objective of this layer is to collection of all sorts of
information from sensing devices and sending them to the
gateway layer. Physical devices like RFID, actuators,
sensors exists in this layer.
Following table will depict the different security
threats that is arising against Perception Layer.
Table 1 Perception Layer Attack Vectors
Name of the
Threat
Description
Denial of
Service Attack
IoT sensing nodes have limited
capacity and capabilities thus
attackers can use Denial of
Service attack to stop the
service. Eventually servers and
the devices will be unable
provide its service for users.
Hardware
Jamming
Attacker can damage the node
by replacing the parts of the
node hardware.
Insertion of
Forged nodes
Attacker can insert a falsified
or malicious node between the
actual nodes of the network to
get access and get control over
the IoT network.
Brute Force
Attack
As the sensing nodes contains
weaker computational power
brute force attack can easily
compromise the access control
of the devices.
B. Gateway Layer
The second or the middle layer of the
architecture is known as Gateway Layer and main
purpose of this layer is to providing reliable
communication between Perception Layer and the Cloud
Layer. This acts as an intermediate bridge between
Gateway Layer and the Cloud Layer.
Following table will depict the different security
threats that is arising against Gateway Layer.
Table 2 Gateway Layer Attack Vectors
Name of
the Threat
Description
Denial of
Service
Attack
As this layer provide network
connectivity by following a DOS
attack, servers or devices are unable to
provide the services to the user.
Session
Hijacking
attacks
Attackers can hijack the session and
obtain the access to the network
through this kind of attack.
Man in the
middle
attacks
Attacker can intersect the
communication channel between two
sensing nodes and easily obtain
classified information if there is no
proper encryption mechanism in
place.
C. Cloud Layer
This is the topmost layer in the IoT architecture
which is responsible for providing the end user service.
Basically this provides an interface which users can
operate and monitor their devices.
Following table will depict the different security
threats that is arising against Cloud Layer.
Table 3 Cloud Layer Attack Vectors
Name of the
Threat
Description
Data security in
cloud computing
All the Data that is collected
will be processed and stored on
the cloud, Cloud service
provider will be hold the
responsibility of protecting this
data.[5]
Application layer
attacks
Most applications are hosted on
the cloud as a Software as a
Service and delivered through
web services, so the attacker
can easily manipulate the
application layer protocols and
get access to the IoT network.
An attack on
Virtual Machines
Security of cloud virtual
machines is very important
and any security breach can
cause the failure of entire IoT
environment.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-1 (February 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5
28 This work is licensed under Creative Commons Attribution 4.0 International License.
III. PRIVACY ISSUES IN IOT
As internet is becoming a part of our daily lives
everything is being shared over the internet like photos,
videos, various kind of records and many more, hence
privacy becomes a big concern when it comes to
information security. It is the right of an entity (person),
to determine the amount of information it is willing to
share with others. [4]
As in the IoT everything is connected with the
internet, privacy will become a serious issue. A lot of
earmarked information of a person can be composed
without the awareness of the person. Control on the
diffusion of all such information is impossible in current
scenario. So, the users of the IoT system need to deal
their own data. The owners should know who are using
their data and when it is used. [2]
IV. EXAMPLE USE CASE MIRAI
On October 21, 2016 many of the major
platforms and services in North America and Europe
were inaccessible due to a Distributed Denial of Service
attack (DDOS). Those affected services and platforms
were spanned across multinational industries, social
media platforms and many government services. This
outage affected by the DDOS attack which targeted
domain name service (DNS) provider that resolves
domain names for a considerable portion of the
internet.[1]
Investigated followed by the incident discovered
that this malicious DDOS traffic originated from IoT
devices around the world which had been compromised
by the malware known as Mirai. Those malware infected
devices include cameras, printers, residential gateways
and baby monitors. It was investigated that owners of
these malware infected IoT devices didn’t know a least
thing that their devices were already compromised. This
provides us a great example why you need to be cautious
about the security of the internet facing IoT devices.
V. COUNTER MEASURES
The Open Web Application Security Project, or
OWASP, has released latest vulnerabilities that will target
IoT devices. Following are the current ranked list of the
top issues and things to avoid. [3]
1. Weak, guessable, or hardcoded passwords
2. Insecure network services
3. Insecure ecosystem interfaces
4. Lack of secure update mechanism
5. Use of insecure or outdated components
6. Insufficient privacy protection
7. Insecure data transfer and storage
8. Lack of device management
9. Insecure default settings
10. Lack of physical hardening
Basic IoT system requires following to be fulfilled in
order to become a secure system.
1. Authentication
2. Authorization
3. Confidentiality
4. Integrity
5. Non Repudiation
Authentication verifies the identity of the users or a
devices in an IoT system. Authorization checks for what
are the privileges possess by the authorized entity to
execute on the system. In terms of confidentiality and the
data integrity it will make sure that the data is encrypted
so no one can tamper even in the storage or during the
transmission. Non repudiation assures that authenticity of
the origin source of data and integrity of data. Exploiting
an IoT system deals with compromising any of the
aforementioned security attributes which we need to take
actions before compromising.
Following table will depict what we can do to
improve the security in terms of aforementioned security
attributes.
Table 4 Countermeasures to Improve the Security
Security
attribute
Action Description
Authentication Use security
credentials
Use identity and
access
management
methods
Identification of
users and
devices need to
be done and
need to
configure strong
security
credentials for
the devices by
removing the
default
credentials.
Authorization
Confidentiality Use appropriate
encryption
mechanism as
devices may
contain less
computational
power
Data must be
encrypted so
only authorized
users can access
the data.
Data integrity Use Hashing
techniques
Non tampering
of data can be
assured by
various hashing
techniques
Non repudiation Using Digital
signatures
Origin source of
the data can be
assured by using
digital
signatures.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-10, Issue-1 (February 2020)
www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5
29 This work is licensed under Creative Commons Attribution 4.0 International License.
As IoT systems are consists of heterogonous
devices with heterogonous technologies determining
security requirement and taking pre caution is a huge
challenges as of the complexity.
VI. CONCLUSION
Internet of Things is vast field and evolving day
by day making the life better of mankind. As this is a
highly evolving technology number of researchers are
working towards betterment and the safeguard of the
technology. As everything is connected with the World
Wide Web security plays a major important role in the
IoT arena. Even though there are number of researchers
working towards the security issues of IoT there are still
lot of fields that is under development as still there are
lots of key issues which has no solution yet.
This paper outlines the issues and challenges
related to security in IoT in terms of its architecture. A
brief insight is being provided about security of IoT
environment along with various security threats prevalent
at various layers of architecture and some security
initiatives which are currently required is also highlighted
in this paper.
REFERENCES
[1] Fagbemi, D., Wheeler, D. M., & Wheeler, J. (2020).
The IoT architect's guide to attainable security and
privacy. New York: Auerbach Publications.
DOI: https://doi.org/10.1201/9780367440930
[2] Joshitta, R. Shantha. (2016). Security in IoT
environment: A survey. International Journal of
Information Technology & Mechanical Engineering, 2, 1-
8.
[3] TechWell. (2019). OWASP Releases Latest Top 10
IoT Vulnerabilities. Available at:
https://www.techwell.com/techwell-
insights/2019/01/owasp-releases-latest-top-10-iot-
vulnerabilities [Accessed 16 Dec. 2019].
[4] Vikas, B. O. (2015). Internet of Things (IoT): A
survey on privacy issues and security. International
Journal of Scientific Research in Science, Engineering
and Technology, 1(3), 168-173.
[5] Thilakarathne, N. N. & Wickramaaarachchi, D.
(2018). Improved hierarchical role based access control
model for cloud computing. International Research
Conference on Smart Computing and Systems
Engineering-SCSE 2018. Available at:
http://repository.kln.ac.lk/handle/123456789/18990
[6] Patel, Ashish. (2017). Comprehensive Survey on
Security Problems and Key Technologies of the Internet
of Things (IoT). International Conference on
Engineering and Technology. Available at:
https://www.researchgate.net/publication/321161091_Co
mprehensive_Survey_on_Security_Problems_and_Key_T
echnologies_of_the_Internet_of_Things_IoT.
[7] Pasha,M., Myhammad,S., & Pasha,U. (2016).
Security framework for IoT Systems. International
Journal of Computer Science and Information Security,
14(11), 99-104.
[8] Flauzac, Olivier, Carlos Javier Gonzalez, & Nolot,
Florent. (2015). New security architecture for IoT
network. Procedia Computer Science. 52, 1028-1033.
[9] Efe, Ahmet, Aksöz, Esra, Hanecioğlu, Neslihan, &
Yalman, Şeyma. (2018). Smart security of IOT against
ddos attacks. International Journal of Innovative
Engineering Applications, 2(2), 35-43.
[10] Zhang, Guoping & Gong, Wentao. (2011). The
research of access control based on UCON in the internet
of things. Journal of Software, 6(4), 724-731.
[11] Iqbal, A., Suryani, M. A., Saleem, R., & Suryani, M.
A. (2016). Internet of things (IoT): On-going security
challenges and risks. International Journal of Computer
Science and Information Security, 14(11), 671.
[12] Ouaddah, A., Bouij-Pasquier, I., Elkalam, A. A., &
Ouahman, A. A. (2015, Mar). Security analysis and
proposal of new access control model in the Internet of
Thing. In: 2015 International Conference on Electrical
and Information Technologies (ICEIT), pp. 30-35.
[13] Rao, T. A. & Ehsan-ul-Haq. (2018). Security
challenges facing IoT layers and its protective measures.
International Journal of Computer Applications, 179(27),
31-35.
[14] Ali, I., Sabir, S., & Ullah, Z. (2019). Internet of
things security, device authentication and access control:
A review. Available at: https://arxiv.org/abs/1901.07309.

More Related Content

What's hot

Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsBHAVANA KONERU
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforcePriyanka Aash
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research DirectionsRavindra Dastikop
 
Introduction to internet of things
Introduction to internet of thingsIntroduction to internet of things
Introduction to internet of thingsBhargavi Padmaraju
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of ThingsDesign World
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Dr. Michael Agbaje
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1Syed Mustafa
 

What's hot (20)

Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Internet of Things.
Internet of Things.Internet of Things.
Internet of Things.
 
IoT
IoTIoT
IoT
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research Directions
 
Introduction to internet of things
Introduction to internet of thingsIntroduction to internet of things
Introduction to internet of things
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of Things
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1
 

Similar to Security and privacy issues in IoT environments

Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...RSIS International
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...RSIS International
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxdorishigh
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTDaniel Wachtel
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfkanaka vardhini
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfraja118355
 

Similar to Security and privacy issues in IoT environments (20)

Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
76 s201918
76 s20191876 s201918
76 s201918
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...Comprehensive Survey on Security Problems and Key Technologies of the Interne...
Comprehensive Survey on Security Problems and Key Technologies of the Interne...
 
Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...Comprehensive survey on security problems and key technologies of the interne...
Comprehensive survey on security problems and key technologies of the interne...
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
 
iot ppt.pptx
iot ppt.pptxiot ppt.pptx
iot ppt.pptx
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 

More from Dr. Amarjeet Singh

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Dr. Amarjeet Singh
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladDr. Amarjeet Singh
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Dr. Amarjeet Singh
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Dr. Amarjeet Singh
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Dr. Amarjeet Singh
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...Dr. Amarjeet Singh
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...Dr. Amarjeet Singh
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...Dr. Amarjeet Singh
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in IndiaDr. Amarjeet Singh
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Dr. Amarjeet Singh
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidDr. Amarjeet Singh
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureDr. Amarjeet Singh
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Dr. Amarjeet Singh
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Dr. Amarjeet Singh
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Dr. Amarjeet Singh
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewDr. Amarjeet Singh
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Dr. Amarjeet Singh
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Dr. Amarjeet Singh
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryDr. Amarjeet Singh
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemDr. Amarjeet Singh
 

More from Dr. Amarjeet Singh (20)

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in India
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel Industry
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Security and privacy issues in IoT environments

  • 1. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-1 (February 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5 26 This work is licensed under Creative Commons Attribution 4.0 International License. Security and Privacy Issues in IoT Environment Navod Neranjan Thilakarathne Lecturer, Department of ICT, Faculty of Technology, University Of Colombo, SRILANKA Corresponding Author: navod.neranjan@ict.cmb.ac.lk ABSTRACT Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically decreasing so everyone can afford the technology. As Internet of Things provides a great opportunity to develop an important industrial systems and applications with the help of various kind of sensors that can sense out the environment using number of devices that is connected to the internet, usage of IoT is drastically increasing and becoming a common thing. With this sky-rocketed usage and the demand, Communication and storing of the information faces serious security issues as the security of IoT devices become just an afterthought when manufacturing most of the devices. This study tries to summarize this IoT security issues in terms of primary information security concepts confidentiality, integrity and availability with regards to its architecture. Keywords-- Internet of Things, IoT, Security, Privacy, IoT Security, IoT Environment I. INTRODUCION Internet, basically started as small interconnected network of less number of computers and now it is become a large network which contains billions of interconnected computers that shares and stores information. The term IoT stands for Internet of Things and we can describe an IoT system as one that comprise of interconnected smart devices that embedded with electronics ,software ,sensors and actuators and network connectivity which enable these objects to collect and exchange data.[1] Following are the basic components of typical IoT environment. [1] Sensors: Those are electrical components that are able to detect events or changes in the environment, such as temperature, humidity. Actuators: Any component of a machine responsible for moving or controlling a mechanism or system. Software: This can be described as compiled computer instructions that control the sensors and actuators, thus determining the final goals or outcomes of the system. Some software could reside on the sensor or actuator devices in a really less space. Network: The channel through which the interconnected devices are communicated. IoT systems can also be described using a basic three layer architecture. Perception layer – The Perception layer is the typical external physical layer, which includes sensors for sensing and gathering information about the surrounding environment such as temperature, humidity, pressure and so on. Gateway layer – The Gateway layer is responsible for connecting to network devices, interconnected smart devices and servers. Its features are also used for transmitting and processing sensor data. Cloud layer - The IoT Cloud Layer represents the back- end services required to set up, manage, operate, and extract business value from an IoT system. It will deliver the application specific services to the user so they can operate and monitor the devices. Figure 1: Typical IoT Architecture This IoT promises to advance our day to day life and it provides contributions towards major important industries such as agriculture, supply chain management, location tracking, remote monitoring, and real time analysis and so on. [2] As this is becoming a hot topic this has received much attraction from researchers and industrialists all around the word. Even though this promises many benefits this also has many potential issues and challenges. This paper deals with one of the prominent issues that is security in IoT. Security remains one of the supreme issue that stump the development and applications of IoT. The main objective of this study is to highlight security and privacy issues surrounding IoT ecosystem. In IoT, the things will communicate with each other as everything is interconnected, so privacy can be hindered So, we can say that lots of security and privacy issues will
  • 2. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-1 (February 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5 27 This work is licensed under Creative Commons Attribution 4.0 International License. arise and more attention is required from researchers in IoT especially with regard to issues like authenticity, confidentiality and integrity and availability of data and services in IoT This paper is divided in to serveral sections, which section two describes about IoT attack vectors in terms of its layers, section three and section four describes privacy issues in IoT with example use case of IoT attack. In the final two sections we are discussing about countermeasures and the conclusion. II. IOT ATTACK VECTORS IN TERMS OF ITS LAYERS [6-14] A. Perception Layer This layer is the lowest layer in the IoT architecture and also called as the Devices layer. Main objective of this layer is to collection of all sorts of information from sensing devices and sending them to the gateway layer. Physical devices like RFID, actuators, sensors exists in this layer. Following table will depict the different security threats that is arising against Perception Layer. Table 1 Perception Layer Attack Vectors Name of the Threat Description Denial of Service Attack IoT sensing nodes have limited capacity and capabilities thus attackers can use Denial of Service attack to stop the service. Eventually servers and the devices will be unable provide its service for users. Hardware Jamming Attacker can damage the node by replacing the parts of the node hardware. Insertion of Forged nodes Attacker can insert a falsified or malicious node between the actual nodes of the network to get access and get control over the IoT network. Brute Force Attack As the sensing nodes contains weaker computational power brute force attack can easily compromise the access control of the devices. B. Gateway Layer The second or the middle layer of the architecture is known as Gateway Layer and main purpose of this layer is to providing reliable communication between Perception Layer and the Cloud Layer. This acts as an intermediate bridge between Gateway Layer and the Cloud Layer. Following table will depict the different security threats that is arising against Gateway Layer. Table 2 Gateway Layer Attack Vectors Name of the Threat Description Denial of Service Attack As this layer provide network connectivity by following a DOS attack, servers or devices are unable to provide the services to the user. Session Hijacking attacks Attackers can hijack the session and obtain the access to the network through this kind of attack. Man in the middle attacks Attacker can intersect the communication channel between two sensing nodes and easily obtain classified information if there is no proper encryption mechanism in place. C. Cloud Layer This is the topmost layer in the IoT architecture which is responsible for providing the end user service. Basically this provides an interface which users can operate and monitor their devices. Following table will depict the different security threats that is arising against Cloud Layer. Table 3 Cloud Layer Attack Vectors Name of the Threat Description Data security in cloud computing All the Data that is collected will be processed and stored on the cloud, Cloud service provider will be hold the responsibility of protecting this data.[5] Application layer attacks Most applications are hosted on the cloud as a Software as a Service and delivered through web services, so the attacker can easily manipulate the application layer protocols and get access to the IoT network. An attack on Virtual Machines Security of cloud virtual machines is very important and any security breach can cause the failure of entire IoT environment.
  • 3. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-1 (February 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5 28 This work is licensed under Creative Commons Attribution 4.0 International License. III. PRIVACY ISSUES IN IOT As internet is becoming a part of our daily lives everything is being shared over the internet like photos, videos, various kind of records and many more, hence privacy becomes a big concern when it comes to information security. It is the right of an entity (person), to determine the amount of information it is willing to share with others. [4] As in the IoT everything is connected with the internet, privacy will become a serious issue. A lot of earmarked information of a person can be composed without the awareness of the person. Control on the diffusion of all such information is impossible in current scenario. So, the users of the IoT system need to deal their own data. The owners should know who are using their data and when it is used. [2] IV. EXAMPLE USE CASE MIRAI On October 21, 2016 many of the major platforms and services in North America and Europe were inaccessible due to a Distributed Denial of Service attack (DDOS). Those affected services and platforms were spanned across multinational industries, social media platforms and many government services. This outage affected by the DDOS attack which targeted domain name service (DNS) provider that resolves domain names for a considerable portion of the internet.[1] Investigated followed by the incident discovered that this malicious DDOS traffic originated from IoT devices around the world which had been compromised by the malware known as Mirai. Those malware infected devices include cameras, printers, residential gateways and baby monitors. It was investigated that owners of these malware infected IoT devices didn’t know a least thing that their devices were already compromised. This provides us a great example why you need to be cautious about the security of the internet facing IoT devices. V. COUNTER MEASURES The Open Web Application Security Project, or OWASP, has released latest vulnerabilities that will target IoT devices. Following are the current ranked list of the top issues and things to avoid. [3] 1. Weak, guessable, or hardcoded passwords 2. Insecure network services 3. Insecure ecosystem interfaces 4. Lack of secure update mechanism 5. Use of insecure or outdated components 6. Insufficient privacy protection 7. Insecure data transfer and storage 8. Lack of device management 9. Insecure default settings 10. Lack of physical hardening Basic IoT system requires following to be fulfilled in order to become a secure system. 1. Authentication 2. Authorization 3. Confidentiality 4. Integrity 5. Non Repudiation Authentication verifies the identity of the users or a devices in an IoT system. Authorization checks for what are the privileges possess by the authorized entity to execute on the system. In terms of confidentiality and the data integrity it will make sure that the data is encrypted so no one can tamper even in the storage or during the transmission. Non repudiation assures that authenticity of the origin source of data and integrity of data. Exploiting an IoT system deals with compromising any of the aforementioned security attributes which we need to take actions before compromising. Following table will depict what we can do to improve the security in terms of aforementioned security attributes. Table 4 Countermeasures to Improve the Security Security attribute Action Description Authentication Use security credentials Use identity and access management methods Identification of users and devices need to be done and need to configure strong security credentials for the devices by removing the default credentials. Authorization Confidentiality Use appropriate encryption mechanism as devices may contain less computational power Data must be encrypted so only authorized users can access the data. Data integrity Use Hashing techniques Non tampering of data can be assured by various hashing techniques Non repudiation Using Digital signatures Origin source of the data can be assured by using digital signatures.
  • 4. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-1 (February 2020) www.ijemr.net https://doi.org/10.31033/ijemr.10.1.5 29 This work is licensed under Creative Commons Attribution 4.0 International License. As IoT systems are consists of heterogonous devices with heterogonous technologies determining security requirement and taking pre caution is a huge challenges as of the complexity. VI. CONCLUSION Internet of Things is vast field and evolving day by day making the life better of mankind. As this is a highly evolving technology number of researchers are working towards betterment and the safeguard of the technology. As everything is connected with the World Wide Web security plays a major important role in the IoT arena. Even though there are number of researchers working towards the security issues of IoT there are still lot of fields that is under development as still there are lots of key issues which has no solution yet. This paper outlines the issues and challenges related to security in IoT in terms of its architecture. A brief insight is being provided about security of IoT environment along with various security threats prevalent at various layers of architecture and some security initiatives which are currently required is also highlighted in this paper. REFERENCES [1] Fagbemi, D., Wheeler, D. M., & Wheeler, J. (2020). The IoT architect's guide to attainable security and privacy. New York: Auerbach Publications. DOI: https://doi.org/10.1201/9780367440930 [2] Joshitta, R. Shantha. (2016). Security in IoT environment: A survey. International Journal of Information Technology & Mechanical Engineering, 2, 1- 8. [3] TechWell. (2019). OWASP Releases Latest Top 10 IoT Vulnerabilities. Available at: https://www.techwell.com/techwell- insights/2019/01/owasp-releases-latest-top-10-iot- vulnerabilities [Accessed 16 Dec. 2019]. [4] Vikas, B. O. (2015). Internet of Things (IoT): A survey on privacy issues and security. International Journal of Scientific Research in Science, Engineering and Technology, 1(3), 168-173. [5] Thilakarathne, N. N. & Wickramaaarachchi, D. (2018). Improved hierarchical role based access control model for cloud computing. International Research Conference on Smart Computing and Systems Engineering-SCSE 2018. Available at: http://repository.kln.ac.lk/handle/123456789/18990 [6] Patel, Ashish. (2017). Comprehensive Survey on Security Problems and Key Technologies of the Internet of Things (IoT). International Conference on Engineering and Technology. Available at: https://www.researchgate.net/publication/321161091_Co mprehensive_Survey_on_Security_Problems_and_Key_T echnologies_of_the_Internet_of_Things_IoT. [7] Pasha,M., Myhammad,S., & Pasha,U. (2016). Security framework for IoT Systems. International Journal of Computer Science and Information Security, 14(11), 99-104. [8] Flauzac, Olivier, Carlos Javier Gonzalez, & Nolot, Florent. (2015). New security architecture for IoT network. Procedia Computer Science. 52, 1028-1033. [9] Efe, Ahmet, Aksöz, Esra, Hanecioğlu, Neslihan, & Yalman, Şeyma. (2018). Smart security of IOT against ddos attacks. International Journal of Innovative Engineering Applications, 2(2), 35-43. [10] Zhang, Guoping & Gong, Wentao. (2011). The research of access control based on UCON in the internet of things. Journal of Software, 6(4), 724-731. [11] Iqbal, A., Suryani, M. A., Saleem, R., & Suryani, M. A. (2016). Internet of things (IoT): On-going security challenges and risks. International Journal of Computer Science and Information Security, 14(11), 671. [12] Ouaddah, A., Bouij-Pasquier, I., Elkalam, A. A., & Ouahman, A. A. (2015, Mar). Security analysis and proposal of new access control model in the Internet of Thing. In: 2015 International Conference on Electrical and Information Technologies (ICEIT), pp. 30-35. [13] Rao, T. A. & Ehsan-ul-Haq. (2018). Security challenges facing IoT layers and its protective measures. International Journal of Computer Applications, 179(27), 31-35. [14] Ali, I., Sabir, S., & Ullah, Z. (2019). Internet of things security, device authentication and access control: A review. Available at: https://arxiv.org/abs/1901.07309.