SlideShare a Scribd company logo
1 of 7
Download to read offline
www.iejrd.com 1
International Engineering Journal For Research & Development
Vol.4
Issue 2
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
Vishal Dineshkumar Soni
Department of Information Technology, Campbellsville University, Campbellsville, Kentucky
---------------------------------------------------------------------------------------------------------------------------------------
ABSTRACT
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of
daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart
retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances
on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack
of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based
applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on
the users that has been performed in the present study.
Keyword: Internet of things, RFID, security issues, heterogeneous features, cryptography
INTRODUCTION
In 1999, Kevin Ashton firstly introduced the idea of the Internet of Things. The use of IoT is increased with the
advancement of Wireless Sensor Networks, Radio Frequency Identification (RFID), cloud computing, and
mobile communication as well as IoT devices can cooperate with other devices. To communicate with each
other IoT depends on wireless communication systems and cost-effective sensors. A huge variety of devices is
present in IoT such as personal computers, laptops, PDAs, smartphones, tablets, and other hand-held embedded
services. A major part of applications and devices are not designed properly to maintain security and privacy
factor, which is able to increase security and privacy issues in IoT such as authentication, access control, data
integrity, secrecy, confidentiality, etc. this paper has been described several security issues, challenges, and
considerations. Various characters of IoT are included in this paper as well as this paper also contains all kinds
of security attacks.
BACKGROUND OF IOT
The global infrastructure of interconnected networks of virtual and physical objects is identified by the internet
of things. These objects are connected with the help of wired or any wireless network system to transfer
information among various IoT devices, which help to produce novel services and applications. Along with
these digital machines, computing devices and other objects are interrelated by the Internet of Things. The
Internet of Things is involved in generating, exchanging, and consuming data with low human interventions.
IoT consists of a huge amount of opportunity as well as a broad scope of issues and challenges are also present
in IoT. Five emerging issues of IoT are most important among all issues such as interoperability, emerging
economics, privacy, security, and legal and regulatory rights. A large amount of user data is accessed with the
help of the Internet of Things. Interoperability is considered a major concern during the implementation of IoT.
Sometimes, IoT leaves a negative impact due to poor design, network resources, and internet resources. Various
legal and regulatory questions are increased due to the implementation of IoT, such as civil rights and law
E-ISSN NO:-2349-0721 Impact factor : 6.549
www.iejrd.com 2
International Engineering Journal For Research & Development
Vol.4
Issue 2
enforcing surveillance conflicts, cross border data flows, retention of data, data misuse, legal liabilities and
unintended uses, laps of privacy, and architecture related issues.
3. Essential characters of IoT
IoT is used to enhance people’s quality of life; new applications are generated by IoT that can control the all-
important activity of people. This Internet of Things is consisting of a few common characteristics, which are
described below:
(i) Large scale: Now, use of IoT devices is increasing rapidly. It is important to control these large-
scale devices, which help devices to communicate with each other. Along with this, a huge amount of
data is generated by this large scale network. Critical issues related to data interpretation and analyses
are produced by this generated data.
Figure 1: Use of internet of things
(Source:Frustaci et al. 2017, p.330)
(ii) Intelligence: IoT devices are enhancing their performance with the help of sophisticated software
algorithms and high-performing hardware. This enhancement helps IoT to make intelligent decisions in
important situations. In addition, IoT can communicate with other devices through this enhancement
process.
(iii) Complex system: Huge numbers of heterogeneous objects with various software and hardware
capabilities are involved in the IoT system.
(iv) Dynamic environment: Almost all objects of our environment are connected with IoT, without
determining the network boundaries of IoT that can make this technology dynamic in nature. Based on
changing conditions and environments, the IoT system is operated dynamically.
www.iejrd.com 3
International Engineering Journal For Research & Development
Vol.4
Issue 2
(v) Sensing: IoT can maintain changes in surrounding environments and produces data with the help of
sensors, which is a major part of IoT. A good understanding of the surrounding environment is
provided by sensors by using high-performing sensor technologies. This factor can enhance human
awareness about the physical world.
(vi) Heterogeneity: A huge number of devices with heterogeneous features are involved in IoT, these
heterogeneous features are communication protocol, operating system, platform, and others.
Management operates complex tasks to perform with the presence of heterogeneous features.
(vii) Unique identity: unique identities such as IP addresses are used in the IoT network to identify
and recognize all objects of the IoT system. IoT manufacturers are involved in providing these
identities that can take place in upgrading devices in an appropriate platform. Important and required
information is collected by users from the device with the help of proper interfaces of the device. This
information help users record their status and manage this recorded information remotely.
SECURITY ISSUES, CHALLENGES, AND CONSIDERATIONS
The rapid growth of internet-connected devices is involved in the enhancement of IoT. In addition, security
issues are considered the most important factor in IoT; these issues are now increased due to presence of
different stakeholders in the Internet of Things that can slow down the adoption of IoT. Frustaci et al. (2017)
stated that fundamental factors of an IoT system are its security aspects, which are treated as basic requirements
to enhance trust and privacy quality of a system. IoT security needs to secure the data protection, connected
devices, and network of IoT.
Products that are designed and developed by such teams quickly lose the customer’s trust. One of such example
is the Bluetooth-enabled door locks. The company faced strong criticism about the product that it was highly
insecure and hacking it was possible easily. It was one of the most damaging claims made regarding the product,
which was designed only to establish security. The failure of the Bluetooth-enabled door lock system was not
because of the actual technology, but because of its poor implementation by the manufacturers. Such kind of
damage to the name of the manufacturers can also severely affect all the other devices the company produces
other than the ones that work over the network.
In information technology, the context of security has always been a matter of concern. This concern has not
pardoned even the concept of IoT. The implementation of IoT concepts has introduced new and unique security
challenges, addressing which is the fundamental priority. Devices with inadequate security could open a
gateway for malicious users to abuse the enormous amount of data. The safety of issue arises with the
interconnected nature of IoT. Moreover, the homogeneity of devices, the ability to auto connects and fielding
devices in unsecured networks make the security concern more challenging. Hence, it is a collective obligation
of developers and users to take care of the fact that devices stay away from potential harm leading to a
collaborative approach to security.
It is important to maintain poor security behavior in both the whole system and individual behaviors. Huge
numbers of devices are connected with IoT in new locations and applications, which ensure that the complexity
of the system is increased day-by-day. Due to the design system of IoT, traditional security mechanisms cannot
be implemented in IoT technologies. Besides, a huge number of connected devices and limited power can
increase heterogeneity and scalability issues in systems. A wide range of risk is increased in this case that can
www.iejrd.com 4
International Engineering Journal For Research & Development
Vol.4
Issue 2
decrease the security and safety of the system. System elasticity is treated as a strong consideration (Khan and
Salah 2018).
Heterogeneity is an important and critical issue that can leave an impact on mechanisms, which is integrated
into IoT. Network security services that have to be used in Internet of Things are affected by heterogeneity.
Interaction between heterogeneity devices and constrained devices is conducted through gateways or directly.
Heterogeneity is unable to implement effective algorithms and protocols in all fields of IoT application, to
overcome this problem high-performing security are needed for heterogeneity. Implementation of high-quality
cryptographic algorithms can adapt lightweight security protocols and high throughput. End-to-end secure
communication is provided by this security factor.
The main problematic issue of IoT is security threats as this system is using a minimum capacity of devices.
Openness of the system and physical accessibility to sensors is considered that the device will communicate
wirelessly. Deployment of IoT security is hindered by various security concerns such as man-in-the-middle
attack, DoS/DDoS attack, heterogeneous network issue, WLAN application conflicts, and application risk of
IPv6. Besides platform management, information and user authentication are also considered as an application
security issue of IoT (Zhou et al. 2018).
Data security issues are classified into four groups such as data availability, integrity, authenticity, and
confidentiality. The employment of security measures can solve this security issue. Data confidentiality can
protect data from unauthorized users; on the other hand, correctness and accuracy of data are maintained by the
data integrity process. Information about the restraint of authorized access to network resources, applications,
and services are guaranteed by data availability (Qian et al. 2018). Along with this, authenticity ensures that
only authorized entities are able to access network resources. Therefore vulnerable data theft leaves an impact
on a large number of IoT applications and services. Advance technology is required in a few fields to mitigate
this kind of attack that can provide ultimate security towards the Internet of Things. Identification, availability,
confidentiality and integrity are involved in the security of information and network. IoT security consists of a
few important problems such as confidentiality, authentication, and data integrity (Bakhshi et al. 2018).
Connection between devices and exchange number of publics is maintained by authentication, authentication
can maintain private keys with the help of nodes to mitigate data steal. Confidentiality is able to provide
information about unauthorized objects which conceal IoT devices. Safeguarding of data is maintained by data
integrity.
IOT SECURITY ATTACKS AND THEIR IMPACT
Weak communication channels are created in the IoT system due to distributed and dynamic nature, this
communication is used by malicious objects to increase new threats regarding tracking, reporting, and
monitoring of the user's actions (Kumar and Mallick 2018). A set of security attacks is occurred due to the
increasing use of the Internet of Things in communities that need to be considered. Security attacks of IoT are
classified into four groups such as software attack, physical attack, encryption attack, and network attack. These
security attacks are described below and the summarization of all security attacks in the IoT system is provided
in figure 2.
Physical attacks: this type of attack is mainly .increased by hardware elements of Internet of Things; in this
case, to conduct the attack physical appearance of the attacker is required. Expensive substances are required in
www.iejrd.com 5
International Engineering Journal For Research & Development
Vol.4
Issue 2
this attack, which increases the difficulties of this attack. Physical attack consists of a few important factors
which describe below:
● Node tempering: sponsor nodes are targeted by attackers to damage it or replace the entire node.
● Malicious node injection: A new operating node is operating physically among communication nodes
of IoT which help attackers to enhance the access to sensitive information. Data flow between several
nodes is controlled by attackers.
● Physical damage: This process is difficult to achieve all requirements of attackers to reach an area
(Vashi et al. 2017). In this attack, attackers are trying to harm this attack directly which leaves an
impact on system availability and quality of services which is a main difference between this attack and
node tempering attack. Despite these physical attacks consist of RF interference on RFID, malicious
code injection, sleep deprivation, and social engineering.
Figure 2: Security attacks in IoT
(Source: Ge et al. 2017, p. 456)
SOFTWARE ATTACKS
Security threats are mainly conducted by software attacks. Weakness of the system is targeted by this attack
with the help of communication interfaces. Software attack consists of four types such as malicious scripts,
phishing attacks. According to Ge et al. (2017), viruses, spyware and worms, and DoS attack. Malicious script is
used by attackers to access sensitive data and disturb system availability. Virus, spyware, and worms attack is
related to a malicious code injection attack. In this attack to gain accessibility, attackers inject the system with
malicious software (Oh and Kim 2017).
www.iejrd.com 6
International Engineering Journal For Research & Development
Vol.4
Issue 2
NETWORK ATTACK AND ENCRYPTION ATTACK
The IoT system is a combination of networks, which can maintain data transfer between various IoT devices.
This attack is conducted with seven elements such as traffic analysis attack, RFID Spoofing, RFID unauthorized
access, RFID cloning, MITM attack, Routing Information Attacks, and a Sinkhole attack. On the other hand,
with the help of communication channels, the IoT system is connected with all objects (Frustaci et a. 2017). In
this case, encryption algorithms are used to protect this communication. Encryption attack is trying to reach the
encryption structure, which is used in IoT systems. This attack consists of three factors such as side-channel
attacks, MITM attack, and cryptanalysis attack.
IMPACT OF SECURITY ISSUES OF IOT ON USERS
This security issue of IoT directly has an impact on the confidence of industries. According to the latest
research report, 54 percent of consumers provide negative reports about IoT implementation. 65 % of consumers
stated that hackers monitor their IoT devices. 60 % of consumers' data is leaked. Risk of the cloud attack is
increased, due to this poor security of IoT, which increased costs related to cybercrime (Khan et al. 2018). Risk
of losing important data is increased due to poor design and security of the Internet of Things.
CONCLUSION
Use of IoT is increased due to the advancement of wireless sensor networks, radio Frequency Identification,
cloud computing, communication, and mobile communication. These factors help IoT to communicate with
other devices. Based on this paper it is concluded that IoT devices and applications are nor designed properly to
handle security and privacy-related issues in IoT networks. Various security attacks can leave an impact on this
IoT system, these security attacks are physical, network attacks, encryption attacks, and software attacks, which
is concluded in this paper. Several security issues, challenges, and considerations are also concluded in this
paper.
REFERENCES
1. Bakhshi, Z., Balador, A. and Mustafa, J., 2018, April. Industrial IoT security threats and concerns by
considering Cisco and Microsoft IoT reference models. In 2018 IEEE Wireless Communications and
Networking Conference Workshops (WCNCW) (pp. 173-178). IEEE.
2. Frustaci, M., Pace, P., Aloi, G. and Fortino, G., 2017. Evaluating critical security issues of the IoT
world: Present and future challenges. IEEE Internet of things journal, 5(4), pp.2483-2495.
3. Frustaci, M., Pace, P., Aloi, G. and Fortino, G., 2017. Evaluating critical security issues of the IoT
world: Present and future challenges. IEEE Internet of things journal, 5(4), pp.2483-2495.
4. Ge, M., Hong, J.B., Guttmann, W. and Kim, D.S., 2017. A framework for automating security analysis
of the internet of things. Journal of Network and Computer Applications, 83, pp.12-27.
5. Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open challenges.
Future Generation Computer Systems, 82, pp.395-411.
6. Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open
challenges. Future Generation Computer Systems, 82, pp.395-411.
7. Kumar, N.M. and Mallick, P.K., 2018. Blockchain technology for security issues and challenges in
IoT. Procedia Computer Science, 132, pp.1815-1823.
www.iejrd.com 7
International Engineering Journal For Research & Development
Vol.4
Issue 2
8. Lamba, A., Singh, S., Balvinder, S., Dutta, N. and Rela, S., 2018. Embedding Machine & Deep
Learning for Mitigating Security & Privacy Issues in IoT Enabled Devices & Networks. International
Journal For Technological Research In Engineering.
9. Oh, S.R. and Kim, Y.G., 2017, February. Security requirements analysis for the IoT. In 2017
International Conference on Platform Technology and Service (PlatCon) (pp. 1-6). IEEE.
10. Qian, Y., Jiang, Y., Chen, J., Zhang, Y., Song, J., Zhou, M. and Pustišek, M., 2018. Towards
decentralized IoT security enhancement: A blockchain approach. Computers & Electrical
Engineering, 72, pp.266-273.
11. Vashi, S., Ram, J., Modi, J., Verma, S. and Prakash, C., 2017, February. Internet of Things (IoT): A
vision, architectural elements, and security issues. In 2017 international conference on I-SMAC (IoT in
Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 492-496). IEEE.
12. Zhou, W., Jia, Y., Peng, A., Zhang, Y. and Liu, P., 2018. The effect of iot new features on security and
privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things
Journal, 6(2), pp.1606-1616.

More Related Content

What's hot

IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
Internet of things
Internet of thingsInternet of things
Internet of thingsvarungoyal98
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
FTC Internet of Things Article
FTC Internet of Things ArticleFTC Internet of Things Article
FTC Internet of Things ArticleKimberly Verska
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadJatin Akar
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
 

What's hot (20)

IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
FTC Internet of Things Article
FTC Internet of Things ArticleFTC Internet of Things Article
FTC Internet of Things Article
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
188
188188
188
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 

Similar to SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT

A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsIRJET Journal
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxjmindy
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfJPLoft Solutions
 
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...ijtsrd
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTijtsrd
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 

Similar to SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT (20)

A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
iot ppt.pptx
iot ppt.pptxiot ppt.pptx
iot ppt.pptx
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
sample assignment
sample assignmentsample assignment
sample assignment
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
 
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
New Threats, Existing Remedies, and Unresolved Issues Related to the Effect o...
 
Comparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoTComparative Study of Security Issue and Challenges in IoT
Comparative Study of Security Issue and Challenges in IoT
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 

More from vishal dineshkumar soni

An IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring SystemAn IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring Systemvishal dineshkumar soni
 
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKINGROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKINGvishal dineshkumar soni
 
Emerging Roles of Artificial Intelligence in ecommerce
Emerging Roles of Artificial Intelligence in ecommerceEmerging Roles of Artificial Intelligence in ecommerce
Emerging Roles of Artificial Intelligence in ecommercevishal dineshkumar soni
 
Management Information Systems: Mastering the Discreet Planning
Management Information Systems: Mastering the Discreet PlanningManagement Information Systems: Mastering the Discreet Planning
Management Information Systems: Mastering the Discreet Planningvishal dineshkumar soni
 
Importance and Strategic Planning of Team Management
Importance and Strategic Planning of Team ManagementImportance and Strategic Planning of Team Management
Importance and Strategic Planning of Team Managementvishal dineshkumar soni
 
Art of Managing Business Ethics with Global Perspective
Art of Managing Business Ethics with Global PerspectiveArt of Managing Business Ethics with Global Perspective
Art of Managing Business Ethics with Global Perspectivevishal dineshkumar soni
 
Disaster Recovery Planning: untapped Success Factor in an Organization
Disaster Recovery Planning: untapped Success Factor in an OrganizationDisaster Recovery Planning: untapped Success Factor in an Organization
Disaster Recovery Planning: untapped Success Factor in an Organizationvishal dineshkumar soni
 
Global Impact of E-learning during COVID 19
Global Impact of E-learning during COVID 19Global Impact of E-learning during COVID 19
Global Impact of E-learning during COVID 19vishal dineshkumar soni
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAvishal dineshkumar soni
 

More from vishal dineshkumar soni (9)

An IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring SystemAn IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring System
 
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKINGROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
 
Emerging Roles of Artificial Intelligence in ecommerce
Emerging Roles of Artificial Intelligence in ecommerceEmerging Roles of Artificial Intelligence in ecommerce
Emerging Roles of Artificial Intelligence in ecommerce
 
Management Information Systems: Mastering the Discreet Planning
Management Information Systems: Mastering the Discreet PlanningManagement Information Systems: Mastering the Discreet Planning
Management Information Systems: Mastering the Discreet Planning
 
Importance and Strategic Planning of Team Management
Importance and Strategic Planning of Team ManagementImportance and Strategic Planning of Team Management
Importance and Strategic Planning of Team Management
 
Art of Managing Business Ethics with Global Perspective
Art of Managing Business Ethics with Global PerspectiveArt of Managing Business Ethics with Global Perspective
Art of Managing Business Ethics with Global Perspective
 
Disaster Recovery Planning: untapped Success Factor in an Organization
Disaster Recovery Planning: untapped Success Factor in an OrganizationDisaster Recovery Planning: untapped Success Factor in an Organization
Disaster Recovery Planning: untapped Success Factor in an Organization
 
Global Impact of E-learning during COVID 19
Global Impact of E-learning during COVID 19Global Impact of E-learning during COVID 19
Global Impact of E-learning during COVID 19
 
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USAChallenges and Solution for Artificial Intelligence in Cybersecurity of the USA
Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT

  • 1. www.iejrd.com 1 International Engineering Journal For Research & Development Vol.4 Issue 2 SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT Vishal Dineshkumar Soni Department of Information Technology, Campbellsville University, Campbellsville, Kentucky --------------------------------------------------------------------------------------------------------------------------------------- ABSTRACT With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study. Keyword: Internet of things, RFID, security issues, heterogeneous features, cryptography INTRODUCTION In 1999, Kevin Ashton firstly introduced the idea of the Internet of Things. The use of IoT is increased with the advancement of Wireless Sensor Networks, Radio Frequency Identification (RFID), cloud computing, and mobile communication as well as IoT devices can cooperate with other devices. To communicate with each other IoT depends on wireless communication systems and cost-effective sensors. A huge variety of devices is present in IoT such as personal computers, laptops, PDAs, smartphones, tablets, and other hand-held embedded services. A major part of applications and devices are not designed properly to maintain security and privacy factor, which is able to increase security and privacy issues in IoT such as authentication, access control, data integrity, secrecy, confidentiality, etc. this paper has been described several security issues, challenges, and considerations. Various characters of IoT are included in this paper as well as this paper also contains all kinds of security attacks. BACKGROUND OF IOT The global infrastructure of interconnected networks of virtual and physical objects is identified by the internet of things. These objects are connected with the help of wired or any wireless network system to transfer information among various IoT devices, which help to produce novel services and applications. Along with these digital machines, computing devices and other objects are interrelated by the Internet of Things. The Internet of Things is involved in generating, exchanging, and consuming data with low human interventions. IoT consists of a huge amount of opportunity as well as a broad scope of issues and challenges are also present in IoT. Five emerging issues of IoT are most important among all issues such as interoperability, emerging economics, privacy, security, and legal and regulatory rights. A large amount of user data is accessed with the help of the Internet of Things. Interoperability is considered a major concern during the implementation of IoT. Sometimes, IoT leaves a negative impact due to poor design, network resources, and internet resources. Various legal and regulatory questions are increased due to the implementation of IoT, such as civil rights and law E-ISSN NO:-2349-0721 Impact factor : 6.549
  • 2. www.iejrd.com 2 International Engineering Journal For Research & Development Vol.4 Issue 2 enforcing surveillance conflicts, cross border data flows, retention of data, data misuse, legal liabilities and unintended uses, laps of privacy, and architecture related issues. 3. Essential characters of IoT IoT is used to enhance people’s quality of life; new applications are generated by IoT that can control the all- important activity of people. This Internet of Things is consisting of a few common characteristics, which are described below: (i) Large scale: Now, use of IoT devices is increasing rapidly. It is important to control these large- scale devices, which help devices to communicate with each other. Along with this, a huge amount of data is generated by this large scale network. Critical issues related to data interpretation and analyses are produced by this generated data. Figure 1: Use of internet of things (Source:Frustaci et al. 2017, p.330) (ii) Intelligence: IoT devices are enhancing their performance with the help of sophisticated software algorithms and high-performing hardware. This enhancement helps IoT to make intelligent decisions in important situations. In addition, IoT can communicate with other devices through this enhancement process. (iii) Complex system: Huge numbers of heterogeneous objects with various software and hardware capabilities are involved in the IoT system. (iv) Dynamic environment: Almost all objects of our environment are connected with IoT, without determining the network boundaries of IoT that can make this technology dynamic in nature. Based on changing conditions and environments, the IoT system is operated dynamically.
  • 3. www.iejrd.com 3 International Engineering Journal For Research & Development Vol.4 Issue 2 (v) Sensing: IoT can maintain changes in surrounding environments and produces data with the help of sensors, which is a major part of IoT. A good understanding of the surrounding environment is provided by sensors by using high-performing sensor technologies. This factor can enhance human awareness about the physical world. (vi) Heterogeneity: A huge number of devices with heterogeneous features are involved in IoT, these heterogeneous features are communication protocol, operating system, platform, and others. Management operates complex tasks to perform with the presence of heterogeneous features. (vii) Unique identity: unique identities such as IP addresses are used in the IoT network to identify and recognize all objects of the IoT system. IoT manufacturers are involved in providing these identities that can take place in upgrading devices in an appropriate platform. Important and required information is collected by users from the device with the help of proper interfaces of the device. This information help users record their status and manage this recorded information remotely. SECURITY ISSUES, CHALLENGES, AND CONSIDERATIONS The rapid growth of internet-connected devices is involved in the enhancement of IoT. In addition, security issues are considered the most important factor in IoT; these issues are now increased due to presence of different stakeholders in the Internet of Things that can slow down the adoption of IoT. Frustaci et al. (2017) stated that fundamental factors of an IoT system are its security aspects, which are treated as basic requirements to enhance trust and privacy quality of a system. IoT security needs to secure the data protection, connected devices, and network of IoT. Products that are designed and developed by such teams quickly lose the customer’s trust. One of such example is the Bluetooth-enabled door locks. The company faced strong criticism about the product that it was highly insecure and hacking it was possible easily. It was one of the most damaging claims made regarding the product, which was designed only to establish security. The failure of the Bluetooth-enabled door lock system was not because of the actual technology, but because of its poor implementation by the manufacturers. Such kind of damage to the name of the manufacturers can also severely affect all the other devices the company produces other than the ones that work over the network. In information technology, the context of security has always been a matter of concern. This concern has not pardoned even the concept of IoT. The implementation of IoT concepts has introduced new and unique security challenges, addressing which is the fundamental priority. Devices with inadequate security could open a gateway for malicious users to abuse the enormous amount of data. The safety of issue arises with the interconnected nature of IoT. Moreover, the homogeneity of devices, the ability to auto connects and fielding devices in unsecured networks make the security concern more challenging. Hence, it is a collective obligation of developers and users to take care of the fact that devices stay away from potential harm leading to a collaborative approach to security. It is important to maintain poor security behavior in both the whole system and individual behaviors. Huge numbers of devices are connected with IoT in new locations and applications, which ensure that the complexity of the system is increased day-by-day. Due to the design system of IoT, traditional security mechanisms cannot be implemented in IoT technologies. Besides, a huge number of connected devices and limited power can increase heterogeneity and scalability issues in systems. A wide range of risk is increased in this case that can
  • 4. www.iejrd.com 4 International Engineering Journal For Research & Development Vol.4 Issue 2 decrease the security and safety of the system. System elasticity is treated as a strong consideration (Khan and Salah 2018). Heterogeneity is an important and critical issue that can leave an impact on mechanisms, which is integrated into IoT. Network security services that have to be used in Internet of Things are affected by heterogeneity. Interaction between heterogeneity devices and constrained devices is conducted through gateways or directly. Heterogeneity is unable to implement effective algorithms and protocols in all fields of IoT application, to overcome this problem high-performing security are needed for heterogeneity. Implementation of high-quality cryptographic algorithms can adapt lightweight security protocols and high throughput. End-to-end secure communication is provided by this security factor. The main problematic issue of IoT is security threats as this system is using a minimum capacity of devices. Openness of the system and physical accessibility to sensors is considered that the device will communicate wirelessly. Deployment of IoT security is hindered by various security concerns such as man-in-the-middle attack, DoS/DDoS attack, heterogeneous network issue, WLAN application conflicts, and application risk of IPv6. Besides platform management, information and user authentication are also considered as an application security issue of IoT (Zhou et al. 2018). Data security issues are classified into four groups such as data availability, integrity, authenticity, and confidentiality. The employment of security measures can solve this security issue. Data confidentiality can protect data from unauthorized users; on the other hand, correctness and accuracy of data are maintained by the data integrity process. Information about the restraint of authorized access to network resources, applications, and services are guaranteed by data availability (Qian et al. 2018). Along with this, authenticity ensures that only authorized entities are able to access network resources. Therefore vulnerable data theft leaves an impact on a large number of IoT applications and services. Advance technology is required in a few fields to mitigate this kind of attack that can provide ultimate security towards the Internet of Things. Identification, availability, confidentiality and integrity are involved in the security of information and network. IoT security consists of a few important problems such as confidentiality, authentication, and data integrity (Bakhshi et al. 2018). Connection between devices and exchange number of publics is maintained by authentication, authentication can maintain private keys with the help of nodes to mitigate data steal. Confidentiality is able to provide information about unauthorized objects which conceal IoT devices. Safeguarding of data is maintained by data integrity. IOT SECURITY ATTACKS AND THEIR IMPACT Weak communication channels are created in the IoT system due to distributed and dynamic nature, this communication is used by malicious objects to increase new threats regarding tracking, reporting, and monitoring of the user's actions (Kumar and Mallick 2018). A set of security attacks is occurred due to the increasing use of the Internet of Things in communities that need to be considered. Security attacks of IoT are classified into four groups such as software attack, physical attack, encryption attack, and network attack. These security attacks are described below and the summarization of all security attacks in the IoT system is provided in figure 2. Physical attacks: this type of attack is mainly .increased by hardware elements of Internet of Things; in this case, to conduct the attack physical appearance of the attacker is required. Expensive substances are required in
  • 5. www.iejrd.com 5 International Engineering Journal For Research & Development Vol.4 Issue 2 this attack, which increases the difficulties of this attack. Physical attack consists of a few important factors which describe below: ● Node tempering: sponsor nodes are targeted by attackers to damage it or replace the entire node. ● Malicious node injection: A new operating node is operating physically among communication nodes of IoT which help attackers to enhance the access to sensitive information. Data flow between several nodes is controlled by attackers. ● Physical damage: This process is difficult to achieve all requirements of attackers to reach an area (Vashi et al. 2017). In this attack, attackers are trying to harm this attack directly which leaves an impact on system availability and quality of services which is a main difference between this attack and node tempering attack. Despite these physical attacks consist of RF interference on RFID, malicious code injection, sleep deprivation, and social engineering. Figure 2: Security attacks in IoT (Source: Ge et al. 2017, p. 456) SOFTWARE ATTACKS Security threats are mainly conducted by software attacks. Weakness of the system is targeted by this attack with the help of communication interfaces. Software attack consists of four types such as malicious scripts, phishing attacks. According to Ge et al. (2017), viruses, spyware and worms, and DoS attack. Malicious script is used by attackers to access sensitive data and disturb system availability. Virus, spyware, and worms attack is related to a malicious code injection attack. In this attack to gain accessibility, attackers inject the system with malicious software (Oh and Kim 2017).
  • 6. www.iejrd.com 6 International Engineering Journal For Research & Development Vol.4 Issue 2 NETWORK ATTACK AND ENCRYPTION ATTACK The IoT system is a combination of networks, which can maintain data transfer between various IoT devices. This attack is conducted with seven elements such as traffic analysis attack, RFID Spoofing, RFID unauthorized access, RFID cloning, MITM attack, Routing Information Attacks, and a Sinkhole attack. On the other hand, with the help of communication channels, the IoT system is connected with all objects (Frustaci et a. 2017). In this case, encryption algorithms are used to protect this communication. Encryption attack is trying to reach the encryption structure, which is used in IoT systems. This attack consists of three factors such as side-channel attacks, MITM attack, and cryptanalysis attack. IMPACT OF SECURITY ISSUES OF IOT ON USERS This security issue of IoT directly has an impact on the confidence of industries. According to the latest research report, 54 percent of consumers provide negative reports about IoT implementation. 65 % of consumers stated that hackers monitor their IoT devices. 60 % of consumers' data is leaked. Risk of the cloud attack is increased, due to this poor security of IoT, which increased costs related to cybercrime (Khan et al. 2018). Risk of losing important data is increased due to poor design and security of the Internet of Things. CONCLUSION Use of IoT is increased due to the advancement of wireless sensor networks, radio Frequency Identification, cloud computing, communication, and mobile communication. These factors help IoT to communicate with other devices. Based on this paper it is concluded that IoT devices and applications are nor designed properly to handle security and privacy-related issues in IoT networks. Various security attacks can leave an impact on this IoT system, these security attacks are physical, network attacks, encryption attacks, and software attacks, which is concluded in this paper. Several security issues, challenges, and considerations are also concluded in this paper. REFERENCES 1. Bakhshi, Z., Balador, A. and Mustafa, J., 2018, April. Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models. In 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW) (pp. 173-178). IEEE. 2. Frustaci, M., Pace, P., Aloi, G. and Fortino, G., 2017. Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of things journal, 5(4), pp.2483-2495. 3. Frustaci, M., Pace, P., Aloi, G. and Fortino, G., 2017. Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of things journal, 5(4), pp.2483-2495. 4. Ge, M., Hong, J.B., Guttmann, W. and Kim, D.S., 2017. A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications, 83, pp.12-27. 5. Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, pp.395-411. 6. Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, pp.395-411. 7. Kumar, N.M. and Mallick, P.K., 2018. Blockchain technology for security issues and challenges in IoT. Procedia Computer Science, 132, pp.1815-1823.
  • 7. www.iejrd.com 7 International Engineering Journal For Research & Development Vol.4 Issue 2 8. Lamba, A., Singh, S., Balvinder, S., Dutta, N. and Rela, S., 2018. Embedding Machine & Deep Learning for Mitigating Security & Privacy Issues in IoT Enabled Devices & Networks. International Journal For Technological Research In Engineering. 9. Oh, S.R. and Kim, Y.G., 2017, February. Security requirements analysis for the IoT. In 2017 International Conference on Platform Technology and Service (PlatCon) (pp. 1-6). IEEE. 10. Qian, Y., Jiang, Y., Chen, J., Zhang, Y., Song, J., Zhou, M. and Pustišek, M., 2018. Towards decentralized IoT security enhancement: A blockchain approach. Computers & Electrical Engineering, 72, pp.266-273. 11. Vashi, S., Ram, J., Modi, J., Verma, S. and Prakash, C., 2017, February. Internet of Things (IoT): A vision, architectural elements, and security issues. In 2017 international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 492-496). IEEE. 12. Zhou, W., Jia, Y., Peng, A., Zhang, Y. and Liu, P., 2018. The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things Journal, 6(2), pp.1606-1616.