SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 721
SECURITY AND PRIVACY BIG CHALLENGES IN INTERNET OF THINGS
1Ms Priyanka D. Raut, 2Prof Sachin Vyawhare
1ME Scholer Sanmati Engineering College, Washim.
2Assistant Professor, Sanmati Engineering College Washim (MH)
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Internet of Things systems has fastly growing in
all over the world and major roles in daily life by providing
new capabilities to streamline diverse tasks. IoT provide the
new capabilities and creates opportunities for increased
productivity and societal benefits. IoT also provide the broad
area of functionality and components will result in important
challenges of privacy and security should beaddressed. Large-
scale, pervasive networks that receivethedatafromthe world.
Used new predictive technologies and algorithms that enable
IoT. Once the data collected from IoT devices and algorithms
that process this data andafterwordused fordecision-making.
IoT also presents new security and privacy challenges.
Sometimes it is more difficult todeploysecurityandprotection
schemes for IOT devices because with less functionality, less
processing power, minimum storage capacity etc. Such
deployments may need new protocols and system designsthat
are better implemented to operate in resource-limited
environments. Policy and technical approaches to show the
IoT privacy and security challenges should continue to
encourage innovation while ensuring that user trust in these
devices and systems will maintain the strong privacy and
security.
Key Words: Internet of Things, Network Security,
Privacy & Security Protocol, Predictive Technology,
Pervasive Network, etc
1. INTRODUCTION
Day by day internet technology and communications
technology are fastly growing; our life is gradually changed
into an imaginary space of virtual world. People can chat,
work, shopping, keeps pets and plants in the virtual world
provided by the network. To eliminate this impulsion,a new
technology is required to sum-up the imaginary space and
real-world on a same platform which is called as Internet of
Things (IoTs). Based on a large number of low-cost sensors
and wireless communication,thesensornetwork technology
puts forward new demands totheInternettechnology.It will
bring huge changes to the future society, change our way of
life and business models.
There are several security and privacy concerns at different
layers viz; Front end, Back end and Network. In this paper is
to present the study of security and privacy issues in
Internet of Things (IoTs) and by present some challenges.
2. LITURATURE REVIEW
J. Sathish Kumar et. al. [1] presents the Internet of Things
with architecture and design goals. They show the security
and privacy concerns at different layers in IoTs. In addition,
they identifiedseveral open issues relatedtothesecurityand
privacy that need to be addressed by research community to
make a secureand trusted platform for the delivery of future
Internet of Things. They alsodiscussedapplicationsofIoTsin
real life.
Sivarama Subramanian et. al. [2] introducing security in
the early life cycle of the IoT solution can make mitigation
design much easier. Security and privacy challenges for any
IoT solution can be addressed by following secure systems
development life cycle (SDLC) practices, secure coding
practices and periodic penetration testing activities.
Zejun Ren et. al. [3] analyze the privacy and security
challenges in the IoT and survey on the corresponding
solutions to enhance the security of IoT architecture and
protocol. They should focusmore on the securityandprivacy
on IoT and help to promote the development of IoT.
Shervin Erfani et.al. [4] analyzesdistinctIoTsecurityand
privacy features, including security requirements, threat
models, and attacks from the smart home perspective.
Further, this paper proposes an intelligent collaborative
security management model to minimize security risk. The
security challenges of the IoT for a smart home scenario are
encountered, anda comprehensiveIoTsecuritymanagement
for smart homes has been proposed.
What is IoT?
Internet of Things is the system to connect the physical
devices and operate or access through the internet. The
‘thing’ in IoT could be a person with a heart monitor with
built-in-sensors, i.e. objects that have been assigned an IP
address and have the ability to receive and transferdataover
a network without manual assistance or intervention. The
embedded technology in the objects helps them to interact
with internal states or the external environment, which in
turn affects the decisions taken..
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 722
Fig -1: IoT
3. SECURITY AND PRIVACY CHALLENGES
IoT provide novel and universal access to the devices that
make up everything from assembly lines, health and
wellness devices, and transportation systems to weather
sensors. Free access to that much data poses major security
and privacy challenges, including:
Fig -2: IoT Security challenges
Insufficient authentication/authorization: A huge
number of users and devices rely on weak and simple
passwords and authorizations. Many devices accept
passwords such as ABCD or 1234.
Lack of transport encryption: Most of the devices fail to
encrypt data that are being transferred, even when the
devices are using the Internet.
Insecure web/mobile interface: IoT-based solutions have
a web/mobile interface for device management or for
consumption of aggregated data. This web interfaceisfound
to be prone to the Open Web Application Security Project
(OWASP) Top 10 vulnerabilities, such as poor session
management, weak default credentials and cross-site
scripting vulnerabilities.
Default credentials: Most devices and sensors are
configured to use the default username/passwords.
Lack of secure code practices: Services and business logic
would be developed without adhering to secure coding
practices.
Privacy concerns: Devices used in the health care domain
receives at least one piece of personal information; the vast
majority of devices collect detailssuchasusernameanddate
of birth. However, the fact that many devices transmit
information across networks without encryptionposes even
more privacy risk. Privacy risk arises as the objects within
the IoT receive and integrate fragments of data that relate to
their service. For example, the regular purchase of different
food types may divulge the religion or health information of
the buyer.
4. MITIGATING SECURITY AND PRIVACY CHALLENGES
IoT products are manufactured only for security when
security is embedded at thetimeofproduction.Eachproduct
should undergo security parameters to detect
vulnerabilities.
Countermeasures, such as the following, can be taken to
address the security challenges:
Base device platform analysis: Weak platform
configuration might lead to compromises such as privilege
increases. Base device platform operating system and its
security properties, configurations and features should be
verified against the base-lined information security
requirements. Verification needs to be done to ensure that
any test interfaces are removed from the hardware.
Network traffic verification: Network traffic (wired or
wireless) should be analyzed for any in-disputable,
unencrypted or versatile data. There is a compromise
between performance and security when encryption is
recommended. Lightweight encryption algorithms can be
used to cater to performance requirements.
Verification of functional security requirements: To
validate the high-level functional security requirement. The
negative testing is important of software. IoT solutions can
uses the cloud services such asSoftwareasa Servicewhichis
based on identity management solutions for authorization
and authentication requirements.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 723
Trust boundary review and fault injection: All trust
boundaries across the signal path should be reviewed and
subject to fault injection using negative test cases. The trust
boundaries can be verified using manual testing techniques.
Mostly Periodic penetration testing is suggested.
Side channel attack defense verification: If side channel
defenses are implemented, either in software or hardware,
they should be verified using continuous penetrationtesting
activities. Continuous penetration testing helps to minimize
advanced persistent threats (APTs) for IoT solutions.
Secure code reviews: Early secure code reviews lead to
early mitigation techniques. Sensitive and security impact
areas such as boot process, security enforcement and
encryption modules should go through secure codereviews.
The cost of fixing a security defect is greatly reduced when
the security vulnerability is discovered during the
development cycle.
End-to-end penetration test: End-to-end penetrationtests
should be conducted across the signal path to identify any
vulnerability in the web interface,mobileinterfaceandcloud
interface of the IoT solutions. The penetration testing give
the more security of the IoT solution for each components.
Security Assessment of an IoT Solution
A US-based software company developed a Secure Travel
product using IoT technology. The product provides real-
time data about the speed of vehicles,locationofthevehicles
and people traveling on the vehicles.
The technology components involved included:
 Sensors in the vehicles
 Gateways
 Services
 Web interface
 Mobile interface
Threat modeling using the Spoofing, Tampering,
Repudiation, Information disclosure,Denial ofservice(DoS),
Elevation of privilege (STRIDE) software approach was
conducted to identify the attack scenarios and formulate
mitigation plans for each of the components.
5. CONCLUSIONS
The Internet of Thing makes large development in
everyone’s everyday life. In the IoTs term, the short-range
mobile transceivers will be implanted in variety of daily
requirements. The connections between people and
communications of people will grow and between objectsto
objects at anytime, in any location. The efficiency of
information managementandcommunicationswill arise toa
new high level. The dynamic environmentofIoTsintroduces
unseen opportunities for communication,whicharegoingto
change the perception of computing and networking. The
privacy and security refer such an evolution should be
carefully considered to the promising technology. The
protection of data and privacy of users has beenidentified as
one of the key challenges in the IoT. In this paper is to
present the study of security and privacy issues in Internet
of Things (IoTs) and by present some challenges.
REFERENCES
[1] J. Sathish Kumar, Dhiren R. Patel, "ASurveyonInternetof
Things: Security and Privacy Issues",International Journal of
Computer Applications (0975 – 8887), Volume 90 – No 11,
March 2014.
[2] Sivarama Subramanian,Varadarajan Vellore
Gopal,Marimuthu Muthusamy, "Security and Privacy
Challenges of IoT-enabled Solutions", ISACA JOURNAL
VOLUME 4, 2015.
[3] Zejun Ren, Xiangang Liu, RunguoYe,TaoZhang,"Security
and privacy on internet of things", 7th IEEE International
Conference on Electronics Information and Emergency
Communication (ICEIEC), 2017
[4] Shervin Erfani, Majid Ahmadi, Long Chen, "The Internet
of Things for smart homes: An example", 8th Annual
Industrial Automation and Electromechanical Engineering
Conference (IEMECON), 2017.
[5] Elias Tabane, Tranos Zuva, "Is there a room for security
and privacy in IoT?", International Conference on Advances
in Computing and Communication Engineering (ICACCE),
2016
[6] Snehal Deshmukh, S. S. Sonavane, "Security protocols for
Internet of Things: A survey", International Conference on
Nextgen Electronic Technologies: Silicon to Software
(ICNETS2), 2017.
BIOGRAPHIES
Miss Priyanka D. Raut completed
Bachelor of Engineering in computer
science and engineering from MGI-
COET, Shegaon and pursuing Masterof
Engineering in Computer Science and
Information Technology from Sanmati
Engineering College, Washim.
Prof. Sachin Vyawhare is working as
Asst. Professor and HOD of Computer
Department at Sanmati Engineering
College Washim (MH). He received BE
degree and ME degree from S.G.B.A.U.
Amaravati. His research interest
includesnetworking,OperatingSystem
and Image Processing.

More Related Content

What's hot

Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iotramesh209
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
76 s201917
76 s20191776 s201917
76 s201917IJRAT
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 

What's hot (20)

Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
76 s201917
76 s20191776 s201917
76 s201917
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 

Similar to Security and Privacy Big Challenges in Internet of things

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
General Overview of IOT Empower Technology
General Overview of IOT Empower TechnologyGeneral Overview of IOT Empower Technology
General Overview of IOT Empower TechnologyIRJET Journal
 
Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesIRJET Journal
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 

Similar to Security and Privacy Big Challenges in Internet of things (20)

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
sample assignment
sample assignmentsample assignment
sample assignment
 
General Overview of IOT Empower Technology
General Overview of IOT Empower TechnologyGeneral Overview of IOT Empower Technology
General Overview of IOT Empower Technology
 
Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) Devices
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
76 s201918
76 s20191876 s201918
76 s201918
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Security and Privacy Big Challenges in Internet of things

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 721 SECURITY AND PRIVACY BIG CHALLENGES IN INTERNET OF THINGS 1Ms Priyanka D. Raut, 2Prof Sachin Vyawhare 1ME Scholer Sanmati Engineering College, Washim. 2Assistant Professor, Sanmati Engineering College Washim (MH) ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Internet of Things systems has fastly growing in all over the world and major roles in daily life by providing new capabilities to streamline diverse tasks. IoT provide the new capabilities and creates opportunities for increased productivity and societal benefits. IoT also provide the broad area of functionality and components will result in important challenges of privacy and security should beaddressed. Large- scale, pervasive networks that receivethedatafromthe world. Used new predictive technologies and algorithms that enable IoT. Once the data collected from IoT devices and algorithms that process this data andafterwordused fordecision-making. IoT also presents new security and privacy challenges. Sometimes it is more difficult todeploysecurityandprotection schemes for IOT devices because with less functionality, less processing power, minimum storage capacity etc. Such deployments may need new protocols and system designsthat are better implemented to operate in resource-limited environments. Policy and technical approaches to show the IoT privacy and security challenges should continue to encourage innovation while ensuring that user trust in these devices and systems will maintain the strong privacy and security. Key Words: Internet of Things, Network Security, Privacy & Security Protocol, Predictive Technology, Pervasive Network, etc 1. INTRODUCTION Day by day internet technology and communications technology are fastly growing; our life is gradually changed into an imaginary space of virtual world. People can chat, work, shopping, keeps pets and plants in the virtual world provided by the network. To eliminate this impulsion,a new technology is required to sum-up the imaginary space and real-world on a same platform which is called as Internet of Things (IoTs). Based on a large number of low-cost sensors and wireless communication,thesensornetwork technology puts forward new demands totheInternettechnology.It will bring huge changes to the future society, change our way of life and business models. There are several security and privacy concerns at different layers viz; Front end, Back end and Network. In this paper is to present the study of security and privacy issues in Internet of Things (IoTs) and by present some challenges. 2. LITURATURE REVIEW J. Sathish Kumar et. al. [1] presents the Internet of Things with architecture and design goals. They show the security and privacy concerns at different layers in IoTs. In addition, they identifiedseveral open issues relatedtothesecurityand privacy that need to be addressed by research community to make a secureand trusted platform for the delivery of future Internet of Things. They alsodiscussedapplicationsofIoTsin real life. Sivarama Subramanian et. al. [2] introducing security in the early life cycle of the IoT solution can make mitigation design much easier. Security and privacy challenges for any IoT solution can be addressed by following secure systems development life cycle (SDLC) practices, secure coding practices and periodic penetration testing activities. Zejun Ren et. al. [3] analyze the privacy and security challenges in the IoT and survey on the corresponding solutions to enhance the security of IoT architecture and protocol. They should focusmore on the securityandprivacy on IoT and help to promote the development of IoT. Shervin Erfani et.al. [4] analyzesdistinctIoTsecurityand privacy features, including security requirements, threat models, and attacks from the smart home perspective. Further, this paper proposes an intelligent collaborative security management model to minimize security risk. The security challenges of the IoT for a smart home scenario are encountered, anda comprehensiveIoTsecuritymanagement for smart homes has been proposed. What is IoT? Internet of Things is the system to connect the physical devices and operate or access through the internet. The ‘thing’ in IoT could be a person with a heart monitor with built-in-sensors, i.e. objects that have been assigned an IP address and have the ability to receive and transferdataover a network without manual assistance or intervention. The embedded technology in the objects helps them to interact with internal states or the external environment, which in turn affects the decisions taken..
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 722 Fig -1: IoT 3. SECURITY AND PRIVACY CHALLENGES IoT provide novel and universal access to the devices that make up everything from assembly lines, health and wellness devices, and transportation systems to weather sensors. Free access to that much data poses major security and privacy challenges, including: Fig -2: IoT Security challenges Insufficient authentication/authorization: A huge number of users and devices rely on weak and simple passwords and authorizations. Many devices accept passwords such as ABCD or 1234. Lack of transport encryption: Most of the devices fail to encrypt data that are being transferred, even when the devices are using the Internet. Insecure web/mobile interface: IoT-based solutions have a web/mobile interface for device management or for consumption of aggregated data. This web interfaceisfound to be prone to the Open Web Application Security Project (OWASP) Top 10 vulnerabilities, such as poor session management, weak default credentials and cross-site scripting vulnerabilities. Default credentials: Most devices and sensors are configured to use the default username/passwords. Lack of secure code practices: Services and business logic would be developed without adhering to secure coding practices. Privacy concerns: Devices used in the health care domain receives at least one piece of personal information; the vast majority of devices collect detailssuchasusernameanddate of birth. However, the fact that many devices transmit information across networks without encryptionposes even more privacy risk. Privacy risk arises as the objects within the IoT receive and integrate fragments of data that relate to their service. For example, the regular purchase of different food types may divulge the religion or health information of the buyer. 4. MITIGATING SECURITY AND PRIVACY CHALLENGES IoT products are manufactured only for security when security is embedded at thetimeofproduction.Eachproduct should undergo security parameters to detect vulnerabilities. Countermeasures, such as the following, can be taken to address the security challenges: Base device platform analysis: Weak platform configuration might lead to compromises such as privilege increases. Base device platform operating system and its security properties, configurations and features should be verified against the base-lined information security requirements. Verification needs to be done to ensure that any test interfaces are removed from the hardware. Network traffic verification: Network traffic (wired or wireless) should be analyzed for any in-disputable, unencrypted or versatile data. There is a compromise between performance and security when encryption is recommended. Lightweight encryption algorithms can be used to cater to performance requirements. Verification of functional security requirements: To validate the high-level functional security requirement. The negative testing is important of software. IoT solutions can uses the cloud services such asSoftwareasa Servicewhichis based on identity management solutions for authorization and authentication requirements.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 723 Trust boundary review and fault injection: All trust boundaries across the signal path should be reviewed and subject to fault injection using negative test cases. The trust boundaries can be verified using manual testing techniques. Mostly Periodic penetration testing is suggested. Side channel attack defense verification: If side channel defenses are implemented, either in software or hardware, they should be verified using continuous penetrationtesting activities. Continuous penetration testing helps to minimize advanced persistent threats (APTs) for IoT solutions. Secure code reviews: Early secure code reviews lead to early mitigation techniques. Sensitive and security impact areas such as boot process, security enforcement and encryption modules should go through secure codereviews. The cost of fixing a security defect is greatly reduced when the security vulnerability is discovered during the development cycle. End-to-end penetration test: End-to-end penetrationtests should be conducted across the signal path to identify any vulnerability in the web interface,mobileinterfaceandcloud interface of the IoT solutions. The penetration testing give the more security of the IoT solution for each components. Security Assessment of an IoT Solution A US-based software company developed a Secure Travel product using IoT technology. The product provides real- time data about the speed of vehicles,locationofthevehicles and people traveling on the vehicles. The technology components involved included:  Sensors in the vehicles  Gateways  Services  Web interface  Mobile interface Threat modeling using the Spoofing, Tampering, Repudiation, Information disclosure,Denial ofservice(DoS), Elevation of privilege (STRIDE) software approach was conducted to identify the attack scenarios and formulate mitigation plans for each of the components. 5. CONCLUSIONS The Internet of Thing makes large development in everyone’s everyday life. In the IoTs term, the short-range mobile transceivers will be implanted in variety of daily requirements. The connections between people and communications of people will grow and between objectsto objects at anytime, in any location. The efficiency of information managementandcommunicationswill arise toa new high level. The dynamic environmentofIoTsintroduces unseen opportunities for communication,whicharegoingto change the perception of computing and networking. The privacy and security refer such an evolution should be carefully considered to the promising technology. The protection of data and privacy of users has beenidentified as one of the key challenges in the IoT. In this paper is to present the study of security and privacy issues in Internet of Things (IoTs) and by present some challenges. REFERENCES [1] J. Sathish Kumar, Dhiren R. Patel, "ASurveyonInternetof Things: Security and Privacy Issues",International Journal of Computer Applications (0975 – 8887), Volume 90 – No 11, March 2014. [2] Sivarama Subramanian,Varadarajan Vellore Gopal,Marimuthu Muthusamy, "Security and Privacy Challenges of IoT-enabled Solutions", ISACA JOURNAL VOLUME 4, 2015. [3] Zejun Ren, Xiangang Liu, RunguoYe,TaoZhang,"Security and privacy on internet of things", 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), 2017 [4] Shervin Erfani, Majid Ahmadi, Long Chen, "The Internet of Things for smart homes: An example", 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), 2017. [5] Elias Tabane, Tranos Zuva, "Is there a room for security and privacy in IoT?", International Conference on Advances in Computing and Communication Engineering (ICACCE), 2016 [6] Snehal Deshmukh, S. S. Sonavane, "Security protocols for Internet of Things: A survey", International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2), 2017. BIOGRAPHIES Miss Priyanka D. Raut completed Bachelor of Engineering in computer science and engineering from MGI- COET, Shegaon and pursuing Masterof Engineering in Computer Science and Information Technology from Sanmati Engineering College, Washim. Prof. Sachin Vyawhare is working as Asst. Professor and HOD of Computer Department at Sanmati Engineering College Washim (MH). He received BE degree and ME degree from S.G.B.A.U. Amaravati. His research interest includesnetworking,OperatingSystem and Image Processing.