SlideShare a Scribd company logo
VEERAPPA NISTY ENGINEERING
COLLEGE
Technical Seminar
on
The Effect of IoT New Features on Security
and Privacy
Presented by
V. Saigireesh
(EEE dept)
Under the guidance of
Pro f . Srinivas
CONTENTS
Introduction
Methodology
Research Analysis
Advantages and Disadvantages
Applications of IoT
Conclusion
References
Introduction
IoT is a network of physical objects that are embedded with
software, electronics, network and sensors that allows these
objects to collect and exchange data.
IoT is a unique features of IoT devices, network and applications,
which are quite different with smart phones and computers.
Hardware, software and connectivity will all need to be secure for
IoT objects to work effectively.
Without security for IoT, any connected object, from refrigerators
to manufacturing bots, can be hacked.
Once hackers gain control, they can usurp the object's
functionality and steal the user's digital data.
Methodology
IoT Features
Interdependence
Constrained
Unattended
Mobile
Ubiquitous
Intimacy
Diversity
Myriad
Interdependence
As the evolution of IoT devices, the interactions between devices become
more complex and human involvement is needless.
For example, if the thermometer detects the indoor temperature exceeds
the threshold and smart plug detects the air conditioner is in the OFF state,
and then the windows will automatically open.
Fig: Attack Example of Interdependence behaviors
Constrained
With the limitation of cost and physical conditions, many IoT devices,
especially industrial sensor and implantable medical devices, have been
designed to be light weight and small.
For example, lightweight IoT devices do not have the memory management
unit (MMU), so memory isolation, address space layout randomization (ASLR)
and other memory safety measures cannot be applied to these devices.

To enhance system security for constrained IoT devices, previous studies
focus on designing system security mechanisms for lightweight devices, but
most of them still cannot satisfy both the security and application
requirements.
Unattended
Unattended bots execute tasks and interact with applications
independent of human involvement.
As increasing adoption of wireless networking prompts, these
devices are evolving into IoT devices. We describe the long-time
unattended status of IoT devices as an IoT feature named
“unattended” here.
It is hard to physically connect an external interface to verify the
state of these devices. Thus, the remote attacks targeted them are
difficult to detect.
Mobile
Many IoT devices, such as wearable devices and
smart cars are used in the mobile environment.
For example, when user drives a smart car from one
district to another, the car can automatically collect
road information for highway foundational facilities in
the new district. It will become more common in the
future.
Because mobile IoT devices usually join more
networks, attackers tend to inject the malicious code
into mobile IoT devices to accelerate its spread.
Ubiquitous
Fig: Attack Example of Insecure Configuration
Manufacturers
Operators
Researches
Intimacy
We describe the intimate relationship between users and IoT devices as an
IoT feature named “Intimacy” here.
These devices not only collect our biology information including heart rate
and blood pressure but also monitor and record our surrounding information
and daily activities like the change of indoor temperature and the locations
you have been.
The intimate relationships between users and IoT devices will certainly raise
more serious and unnoticed privacy concerns.
Driven by profit, these providers usually keep this data forever and even
share these data with other advertising agency without the user’s consent,
which increases the risk of privacy leak.
Myriad
We describe the enormous number of IoT devices and
the huge amount of IoT data as an IoT feature named
“Myriad” here.
In 2016, the attack traffic of Mirai botnet which was
composed of more than 1 million IoT devices, exceeded
1Tbps, which previous cyber-attacks have never been
achieved.
Research Analysis
Fig: The Number of Papers of Different Threat Tags in Different Application
Scenarios
Fig: The proportion of the Number of Papers in Different Application
Scenarios per Year
Advantages
Minimize human effort
Save time
Enhanced data collection
Improved security
Efficient resource utilization
Reduced use of other electronic equipment
Disadvantages
Security issues
Privacy concern
Increased unemployment
High dependency on the internet
Reduced mental and physical activity
Applications of IoT
Smart Home Applications
Health Care
Smart Cities
Agriculture
Industrial Automation
Conclusion
Finally summarized the main threats, challenges and opportunities
of each feature in previous slide having figure.
Fig : Summary Of Threats, Challenges and Opportunities of each IoT features
References
M. Hu, W. Liu, K. Peng, X. Ma, W. Cheng, J. Liu,
and B. Li, “Joint routing and scheduling for vehicle-assisted
multidrone surveillance,” IEEE Internet Things J., vol. 6, no. 2,
pp. 1781-1790, Apr. 2019.
AI-Inspired Non-Terrestrial Networks for IIoT: Review on
Enabling Technologies and Applications Emmanouel T.
Michailidis , Stelios
M. Potirakis and Athanasios G. Kanatas
Wenjing Xiao; Rui Wang; Jeungeun Song; Di Wu; Long Hu;
Min Chen,“AI-based Satellite Ground Communication System
with In- telligent Antenna Pointing”,7-11 Dec. 2020.

More Related Content

Similar to iot ppt.pptx

76 s201918
76 s20191876 s201918
76 s201918
IJRAT
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
jmindy
 
The Connected Future.pptx
The Connected Future.pptxThe Connected Future.pptx
The Connected Future.pptx
khushi456483
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
ijtsrd
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
Usman Anjum
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
vrickens
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoT
ijtsrd
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptx
rupasharma39
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
Cigniti Technologies Ltd
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
Dr. Amarjeet Singh
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
SKS
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
IJECEIAES
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IJSRED
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
Jayanth Vinay
 

Similar to iot ppt.pptx (20)

76 s201918
76 s20191876 s201918
76 s201918
 
Future of Internet.pptx
Future of Internet.pptxFuture of Internet.pptx
Future of Internet.pptx
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
 
The Connected Future.pptx
The Connected Future.pptxThe Connected Future.pptx
The Connected Future.pptx
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoT
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptx
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacksSIEM-based detection and mitigation of IoT-botnet DDoS attacks
SIEM-based detection and mitigation of IoT-botnet DDoS attacks
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
 

More from prashantkumarchinama

MATLAB Workshop yugjjnhhasfhlhhlllhl.pptx
MATLAB Workshop yugjjnhhasfhlhhlllhl.pptxMATLAB Workshop yugjjnhhasfhlhhlllhl.pptx
MATLAB Workshop yugjjnhhasfhlhhlllhl.pptx
prashantkumarchinama
 
types of circuit breaker ...............................
types of circuit breaker ...............................types of circuit breaker ...............................
types of circuit breaker ...............................
prashantkumarchinama
 
PES-Webinar-4-PPTs-Sreekumar-New_Challenges_in_Electricity_Distribution--22-M...
PES-Webinar-4-PPTs-Sreekumar-New_Challenges_in_Electricity_Distribution--22-M...PES-Webinar-4-PPTs-Sreekumar-New_Challenges_in_Electricity_Distribution--22-M...
PES-Webinar-4-PPTs-Sreekumar-New_Challenges_in_Electricity_Distribution--22-M...
prashantkumarchinama
 

More from prashantkumarchinama (10)

MATLAB Workshop yugjjnhhasfhlhhlllhl.pptx
MATLAB Workshop yugjjnhhasfhlhhlllhl.pptxMATLAB Workshop yugjjnhhasfhlhhlllhl.pptx
MATLAB Workshop yugjjnhhasfhlhhlllhl.pptx
 
types of circuit breaker ...............................
types of circuit breaker ...............................types of circuit breaker ...............................
types of circuit breaker ...............................
 
2433476.ppt
2433476.ppt2433476.ppt
2433476.ppt
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
 
10319264.ppt
10319264.ppt10319264.ppt
10319264.ppt
 
9134111.ppt
9134111.ppt9134111.ppt
9134111.ppt
 
4186720.ppt
4186720.ppt4186720.ppt
4186720.ppt
 
2465716.ppt
2465716.ppt2465716.ppt
2465716.ppt
 
DC-machines.ppt
DC-machines.pptDC-machines.ppt
DC-machines.ppt
 
PES-Webinar-4-PPTs-Sreekumar-New_Challenges_in_Electricity_Distribution--22-M...
PES-Webinar-4-PPTs-Sreekumar-New_Challenges_in_Electricity_Distribution--22-M...PES-Webinar-4-PPTs-Sreekumar-New_Challenges_in_Electricity_Distribution--22-M...
PES-Webinar-4-PPTs-Sreekumar-New_Challenges_in_Electricity_Distribution--22-M...
 

Recently uploaded

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 

Recently uploaded (20)

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 

iot ppt.pptx

  • 1.
  • 2. VEERAPPA NISTY ENGINEERING COLLEGE Technical Seminar on The Effect of IoT New Features on Security and Privacy Presented by V. Saigireesh (EEE dept) Under the guidance of Pro f . Srinivas
  • 3. CONTENTS Introduction Methodology Research Analysis Advantages and Disadvantages Applications of IoT Conclusion References
  • 4. Introduction IoT is a network of physical objects that are embedded with software, electronics, network and sensors that allows these objects to collect and exchange data. IoT is a unique features of IoT devices, network and applications, which are quite different with smart phones and computers. Hardware, software and connectivity will all need to be secure for IoT objects to work effectively. Without security for IoT, any connected object, from refrigerators to manufacturing bots, can be hacked. Once hackers gain control, they can usurp the object's functionality and steal the user's digital data.
  • 6. Interdependence As the evolution of IoT devices, the interactions between devices become more complex and human involvement is needless. For example, if the thermometer detects the indoor temperature exceeds the threshold and smart plug detects the air conditioner is in the OFF state, and then the windows will automatically open. Fig: Attack Example of Interdependence behaviors
  • 7. Constrained With the limitation of cost and physical conditions, many IoT devices, especially industrial sensor and implantable medical devices, have been designed to be light weight and small. For example, lightweight IoT devices do not have the memory management unit (MMU), so memory isolation, address space layout randomization (ASLR) and other memory safety measures cannot be applied to these devices.  To enhance system security for constrained IoT devices, previous studies focus on designing system security mechanisms for lightweight devices, but most of them still cannot satisfy both the security and application requirements.
  • 8. Unattended Unattended bots execute tasks and interact with applications independent of human involvement. As increasing adoption of wireless networking prompts, these devices are evolving into IoT devices. We describe the long-time unattended status of IoT devices as an IoT feature named “unattended” here. It is hard to physically connect an external interface to verify the state of these devices. Thus, the remote attacks targeted them are difficult to detect.
  • 9. Mobile Many IoT devices, such as wearable devices and smart cars are used in the mobile environment. For example, when user drives a smart car from one district to another, the car can automatically collect road information for highway foundational facilities in the new district. It will become more common in the future. Because mobile IoT devices usually join more networks, attackers tend to inject the malicious code into mobile IoT devices to accelerate its spread.
  • 10. Ubiquitous Fig: Attack Example of Insecure Configuration Manufacturers Operators Researches
  • 11. Intimacy We describe the intimate relationship between users and IoT devices as an IoT feature named “Intimacy” here. These devices not only collect our biology information including heart rate and blood pressure but also monitor and record our surrounding information and daily activities like the change of indoor temperature and the locations you have been. The intimate relationships between users and IoT devices will certainly raise more serious and unnoticed privacy concerns. Driven by profit, these providers usually keep this data forever and even share these data with other advertising agency without the user’s consent, which increases the risk of privacy leak.
  • 12. Myriad We describe the enormous number of IoT devices and the huge amount of IoT data as an IoT feature named “Myriad” here. In 2016, the attack traffic of Mirai botnet which was composed of more than 1 million IoT devices, exceeded 1Tbps, which previous cyber-attacks have never been achieved.
  • 13. Research Analysis Fig: The Number of Papers of Different Threat Tags in Different Application Scenarios
  • 14. Fig: The proportion of the Number of Papers in Different Application Scenarios per Year
  • 15. Advantages Minimize human effort Save time Enhanced data collection Improved security Efficient resource utilization Reduced use of other electronic equipment Disadvantages Security issues Privacy concern Increased unemployment High dependency on the internet Reduced mental and physical activity
  • 16. Applications of IoT Smart Home Applications Health Care Smart Cities Agriculture Industrial Automation
  • 17. Conclusion Finally summarized the main threats, challenges and opportunities of each feature in previous slide having figure. Fig : Summary Of Threats, Challenges and Opportunities of each IoT features
  • 18. References M. Hu, W. Liu, K. Peng, X. Ma, W. Cheng, J. Liu, and B. Li, “Joint routing and scheduling for vehicle-assisted multidrone surveillance,” IEEE Internet Things J., vol. 6, no. 2, pp. 1781-1790, Apr. 2019. AI-Inspired Non-Terrestrial Networks for IIoT: Review on Enabling Technologies and Applications Emmanouel T. Michailidis , Stelios M. Potirakis and Athanasios G. Kanatas Wenjing Xiao; Rui Wang; Jeungeun Song; Di Wu; Long Hu; Min Chen,“AI-based Satellite Ground Communication System with In- telligent Antenna Pointing”,7-11 Dec. 2020.