1 / 5

Comparative Study of Security Issue and Challenges in IoT

In the past few years, Internet of things IoT has been a focal point of research. The Internet of Things IoT hold up an expansive scope of uses including keen urban areas, waste management, auxiliary wellbeing, security, crisis administrations, coordinations, retails, mechanical control, and wellbeing care. Privacy and Security are the key issues for IoT applications, and still face some colossal challenges. In late years, the Internet of Things IoT has increased calculable research consideration. Now days, the IoT is considered as eventual fate of the web. In future, IoT will assume a significant job and will change our gauges, plan of action just as living styles. Right now give a similar report on security issue and difficulties in iot just as a short depiction on utilizations of iot. Sayali Vishwanath Pawar "Comparative Study of Security Issue and Challenges in IoT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30653.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/30653/comparative-study-of-security-issue-and-challenges-in-iot/sayali-vishwanath-pawar<br>

Download Presentation

Comparative Study of Security Issue and Challenges in IoT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 Comparative Study of Security Issue and Challenges in IoT Sayali Vishwanath Pawar Department of MCA, YMT College of Management, Kharghar, Navi Mumbai, Maharashtra, India ABSTRACT In the past few years, Internet of things (IoT) has been a focal point of research. The Internet of Things (IoT) hold up an expansive scope of uses including keen urban areas, waste management, auxiliary wellbeing, security, crisis administrations, coordinations, retails, mechanical control, and wellbeing care. Privacy and Security are the key issues for IoT applications, and still face some colossal challenges. In late years, the Internet of Things (IoT) has increased calculable research consideration. Now days, the IoT is considered as eventual fate of the web. In future, IoT will assume a significant job and will change our gauges, plan of action just as living styles. Right now give a similar report on security issue and difficulties in iot just as a short depiction on utilizations of iot. KEYWORDS: Iot, Security issue and challenges, Applications of iot How to cite this paper: Sayali Vishwanath Pawar "Comparative Study of Security Issue and Challenges in IoT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-3, April 2020, pp.707-711, URL: www.ijtsrd.com/papers/ijtsrd30653.pdf Copyright © 2020 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC (http://creativecommons.org/licenses/by /4.0) IJTSRD30653 BY 4.0) INTRODUCTION The expression "Web of things" was presented by Kevin Ashton in the year 1982.Internet of Things is where every gadget is relegate to an IP address and through that IP address, anybody makes that gadget recognizable on web. The Internet is an advancing element. It began as the "Web of Computers." The Internet of Things (IoT) is an arrangement of interrelated registering gadgets, mechanical and computerized machines, articles, creatures or individuals that are given one of a kind identifiers (UIDs) and the capacity to move information over a system without expecting human-to-human or human-to-PC association. The 4 primary principal parts in iot are Sensor/Devices, Connectivity, Data Processing, User Interface. One of the entrancing highlights of iot gadgets is that they are equipped for creating gigantic measure of information. Iot is likewise used to store information in cloud the absolute most captivating iot cloud stages are Google clouds, azure, Amazon web administration (aws). With the quick increment in iot application use, some security issue have constructed forcefully. As iot utilizes different gadgets and gadgets are turning out to be a piece of web system subsequently these security issue required to be inspected. As per Study Analyzed by Hewlett Packard uncover 70% most normally utilized iot gadget hold huge vulnerabilities. In this paper We will talked about comparative study of security issue and challenges in iot. Defination of Iot[1] Applications of IoT: Iot is widely used in many areas some of the main applications of iot are as follows: @ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 707

  2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 1.Smart Home: Smart home positioning as the highest IoT application on all channels. Smart home is the most remarkable and precise IoT application. Smart home uses web associated gadgets to empower remote checking frameworks and applications. Utilizing brilliant home application, we can deal with all our home gadgets from one spot just as it likewise valuable for augmenting the home security. the most utilized keen gadgets are Smart lightning, smart smoke alarm, smart lock, etc. 2.Wearable: Like Smart home, Wearable is additionally one of the most well known IoT application in todays world. Wearable innovation is trademark ti web on things. Wearable gadgets have movement sensor. The upside of utilizing wearable gadgets are it empowering self-obligation, expands work environment wellbeing, upgrade effectiveness grinding away, etc. The most regularly utilized wearable gadgets are smart watch, fit band, smart shoes. 3.Smart city: Smart city is made out of data and correspondence technology. Smart city utilizes contraption, for example, associated sensor, lights. meter to broke down and gather information. Water supply, electricity supply and open vehicle are the parts of Smart city. 4.IoT in Industry: IoT is gainful in the fields where both quicker improvement, just as the nature of items, are the basic variables for a better yield on Investment (ROI). One of such fields is the assembling businesses, and Industrial Internet of Things (IIoT) Industrial Internet of Things (IIoT) is an ever developing and quickly expanding part that represents a large portion of the portion of IoT spending in the worldwide market. Industrialists and makes in pretty much every part have an enormous chance to not just screen. Yet in addition mechanize a considerable lot of complex procedure associated with assembling. For long time businesses and plants have had sensors and frameworks to follow progress yet IoT makes a stride further and gives complexities to even the moment issues. 5.Smart Agriculture: Measurements gauge the ever-developing total populace to arrive at almost 10 billion constantly 2050. To take care of such a monstrous populace one needs to wed farming to innovation and get best outcomes. There are various prospects right now. One of them is the Smart Greenhouse. A greenhouse farming is a strategy improves the yield of harvests by controlling natural parameters. Be that as it may, manual dealing with brings about creation misfortune, vitality misfortune, and work cost, making the procedure less compelling. A greenhouse with inserted gadgets makes it simpler to be observed as well as, empowers us to control the atmosphere inside it. Sensors measure various parameters as indicated by the plant necessity and send it to the cloud. It, at that point, forms the information and applies a control activity. Literature Review: IoT is platform where installed gadget is associated with web so they can trade and gather information with one another and give unique credits and capacity to move information over a system without need of a human-to-human or human- to-PC cooperation. While IoT is popular in today’s world so they also come with some threat. The vast majority of the IoT gadgets are associated with web so they can be hacked simply like some other web subordinate gadget. The term Internet of Things was first invented by Kevin Ashton in 1999 in the context of supply chain management [2]. In this paper we will discuss comparisons between security issue and challenges in IoT. The meaning of the Internet of things has advanced because of the combination of numerous advances, constant examination, AI, product sensors, and implanted frameworks. [3].IoT usage utilize diverse specialized correspondences models, each with its own attributes. Four basic interchanges models portrayed by the Internet Architecture Board include: Device-to-Device, Device-to-Cloud, Device-to-Gateway, and Back-End Data- Sharing. [4].IoT consists of a variety of objects that are interconnected and that can communicate with each other by sending and receiving relevant data.[5]. IoT has numerous applications which are exceptionally valuable for the individuals people living right now in this world [6].IoT is generally appropriate for heart checking implants, biochip transponders on livestock, electric shellfishes in seaside waters, vehicles with worked in sensors, gadgets for ecological/nourishment/pathogen observing or field activity gadgets that help firefighters in search and salvage tasks[7]. The broad arrangement of utilizations for IoT gadgets is frequently separated into buyer, business, modern, and infrastructure spaces[8]. The IoT's major huge pattern as of late is explosive development of gadgets associated and constrained by the Internet[9]. The IoT makes open doors for more straightforward combination of the physical world into PC based frameworks, bringing about effectiveness enhancements, financial advantages, and decreased human efforts[10]. The quantity of IoT gadgets expanded 31% year-over-year to 8.4 billion in the year 2017 and it is assessed that there will be 30 billion gadgets by 2020.The worldwide market estimation of IoT is anticipated to reach $7.1 trillion by 2020[11]. Philip N. Howard, a teacher and writer, composes that the Internet of things offers colossal potential for enabling residents, making government straightforward, and expanding data get to. Howard alerts, be that as it may, that security dangers are tremendous, similar to the potential for social control and political control[12]. A test for makers of IoT applications is to clean, process and decipher the huge measure of information which is assembled by the sensors. There is an answer proposed for the investigation of the data alluded to as Wireless Sensor Networks [13]. Security is the greatest worry in receiving Internet of things technology, with worries that fast improvement is going on without proper thought of the significant security challenges involved and the administrative changes that may be fundamental[14]. Inadequately made sure about Internet- open IoT gadgets can likewise be subverted to assault others. In 2016, a dispersed forswearing of administration assault controlled by Internet of things gadgets running the Mirai malware brought down a DNS supplier and significant sites[15]. In this paper we will discuss about security issue and challenges in iot and how to overcome that challenges. @ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 708

  3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 Research Methadology: A.How IoT Works: An IoT framework comprises of sensors/gadgets which "talk" to the cloud through a network. When the information finds a workable pace, programming forms it and afterward may choose to play out an activity, for example, sending a caution or naturally modifying the sensors/gadgets without the requirement for the client. Be that as it may, if the client input is required or if the client just needs to monitor the framework, a UI permits them to do as such. Any alterations or activities that the client makes are then sent the other way through the framework: from the UI, to the cloud, and back to the sensors/gadgets to make a change. Botnet[21] 2.Denial Of Service (DOS) Attack/DDOS: In processing, a denial of service attack (DoS assault) is a digital assault wherein the culprit tries to make a machine or system asset inaccessible to its expected clients by incidentally or uncertainly upsetting administrations of a host associated with the Internet. The Internet of Things offers a wide assortment of brilliant gadgets – all of which face the trouble of making sure about generally protection. As the gadgets are for the most part so extraordinary their heterogenic nature is frequently blamed by makes and proprietors the same to skirt adequate security controls. Attackers may get to the savvy applications arrange and send bulk message to keen gadgets, for example, clear to send and demand to send They can likewise assault focused on gadget by utilizing malevolent codes so as to performDoS assaults on different gadgets that are associated in a brilliant applications. Thus, brilliant gadgets can't perform appropriate functionalities in view of depleting assets because of such assaults. For shirking from this assault, it is imperative to apply confirmation to square and recognize unapproved get to. [16] IoT Work B.Security Issue and challenges in IoT: A.Security Issue: 1.Botnet: "Botnet" is a mix of the words "robot" and "network". A botnet is a system that joins different frameworks together to remotely assume responsibility for a casualty's framework and circulate malware. Cyber lawbreakers use botnets to actuate botnet assaults, which incorporate malignant exercises, for example, certifications releases, unapproved get to, information robbery and DDoS attacks. Linux.Aidra, Bashlite, Mirai, Linux/I RCTelnet are a few kinds of iot botnet attacks. Botnet assault utilizing customer server model engineering just as shared connection. To construct a botnet, botmasters need the same number of contaminated online gadgets or "bots" under their order as could be allowed. The more bots associated, the greater the botnet. The greater the botnet, the greater the effect. So size matters. Botnets aren't normally made to bargain only one individual PC; they're intended to contaminate a huge number of gadgets. Bot herders regularly convey botnets onto PCs through a trojan pony infection. Progressively intricate botnets can even self-proliferate, finding and tainting gadgets automatically. Botnets are hard to recognize. They utilize just limited quantities of processing capacity to abstain from disturbing ordinary gadget capacities and alarming the client. Botnets set aside some effort to develop. Botnets can contaminate practically any gadget associated straightforwardly or remotely to the web. PCs, PCs, cell phones, DVR's, smart watches, surveillance cameras, and brilliant kitchen machines would all be able to fall inside the trap of a botnet. Denial of Service Attack [22] 3.Man in the Middle attack: A man-in-the-middle assault is a sort of cyberattack. The man-in-the-center idea is the place an assailant or programmer catches a correspondence between two frameworks. It is a risky assault since it is one where the assailant acts like the first sender. A man-in-the-center assault permits a pernicious on-screen character to catch, send and get information implied for another person, or not intended to be sent by any means, without either outside gathering knowing until it is past the point of no return. Man-in-the-center assaults can be abridged from various perspectives, including MITM, MitM, MiM or MIM. A MITM assault abuses the ongoing handling of exchanges, @ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 709

  4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 discussions or move of other data. sniffing, spoofing are some thechnique of man in the center assault. not been altered. Block chain – as a decentralized conveyed record for IoT information – offers a versatile and strong methodology for guaranteeing the honesty of IoT information 3.Technical Concerns: Because of the expanded utilization of IoT gadgets, the traffic created by these gadgets is too expanding. Subsequently there is a need to expand arrange limit, subsequently, it is additionally a test to store the colossal measure of information for investigation and further last stockpiling. 4.Insurance Concerns: The insurance agencies introducing IoT gadgets on vehicles gather information about wellbeing and driving status so as to take choices about protection 5.Lack of Common Standard: Since there are numerous principles for IoT gadgets and IoT fabricating businesses. Consequently, it is a major test to recognize allowed and non-allowed gadgets associated with the web. Man in the Middle Attack[23] 4.Device hijacking: The assailant hijackers and adequately expect control of a gadget. These assaults are very hard to distinguish on the grounds that the assailant doesn't change the fundamental usefulness of the gadget. Additionally, it just takes one gadget to possibly re-taint others, for instance, brilliant meters associated with a network. In an IoT situation, a robber could expect control of a keen meter and utilize the undermined gadget to dispatch ransom ware assaults against Energy Management Systems (EMSs) or illicitly siphon unmetered electrical cables. 5.Insecure Wireless Connectivity: Most smart application associate with cell phones or tablets remotely, conceivably programmers simple access to gadgets and a platform to an assault on a corporate system. Numerous remote interchanges can't prepare for a decided, constrained attack. sometimes beacause of unreliable remote association we misfortune the reliability, integrity of that application. B.Iot Security Challenges: 1.Lack Of Encryption: In spite of the fact that encryption is an extraordinary method to keep programmers from getting to information, it is likewise one of the main IoT security challenges. These gadgets come up short on the capacity and preparing abilities that would be found on a customary PC. The outcome is an expansion in assaults where programmers can without much of a stretch control the calculations that were intended for security. Except if aventure settle this issue, encryption won't be a security resource. 2.Ensure data privacy and integrity: It is likewise significant that any place the information winds up after it has been transmitted over the system, it is put away and handled safely. Executing information security incorporates redacting or anonymizing delicate information before it is put away or utilizing information partition to decouple by and by recognizable data from IoT information payloads. Information that is not, at this point required ought to be discarded safely, and if information is put away, keeping up consistence with legitimate and administrative structures is additionally a significant test. Guaranteeing information uprightness, which may include utilizing checksums or advanced marks to guarantee information has Comparative table of security Issue and challenges Conclusion: In this paper ,we conferred the understanding related to Security issue and challenges in Smart application using iot. Smart application using iot has many pros and cons. However the cons directly effects the security of the data. Security issue is caused by many factors like many active and passive attcks, spoofing, spamming etc. Security threat caused due to theft is more. Hence, itis vital to keep confidential and sensitive data secret In this paper, we have also discussed about the short information about smart application and how iot is work on smart application, challenges of iot as well as some suggested solution of how security issue can be avoided successfully by using different technique like data encryption, data confidentiality etc. REFERENCES [1]https://thesai.org/Downloads/Volume8 No6/Paper_50Security_Issues_in_the_Inte rnet_of_Things.pdf @ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 710

  5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 [2]“Understanding the Internet of Things (IoT) “, July 2014. Gubbi, Jayavardhana,et al “Internet of Things (IoT): A vision, architectural elements, and future directions” Future Generation Computer Systems 29.7 (2013): 1645-1660 "Internet of Things (IoT): A vision, architectural elements, and future directions". [14]Feamster, Nick (18 February 2017). "Mitigating the Increasing Risks of an Insecure Internet of Things". [15]Woolf, Nicky (26 October 2016). "DDoS attack that disrupted internet was largest of its kind in history, experts say [3]Rouse, Margaret (2019). "internet of things (IoT)". IOT Agenda. Retrieved 14 August 2019. [4]https://www.internetsociety.org/resources/doc/2015 /iot- overview?gclid=Cj0KCQjw3qzzBRDnARIsAECmryrjKJU irXuumWSs0QdY7HUidaU8mDAroKfYgw_vBduFTEkM T7avICUaAp8OEALw_wcB. [16]https://www.google.com/url?sa=i&url=https%3A%2F %2Fwww.quora.com%2FHow-does-the-Internet-of- Things- work&psig=AOvVaw3G6kwfgINy79OC4UEYHM0t&ust =1584766319460000&source=images&cd=vfe&ved=0 CAIQjRxqFwoTCPCM6uKgqOgCFQAAAAAdAAAA ABAa [5]Braganza D, Tulasi B. RFID Security Issues in IoT: A Comparative Study. Orient.J. Technol;10(1) Comp. Sci. and [17]https://cdn4.vectorstock.com/i/1000x1000/70/53/s mart-home-iot-internet-of-things-control-comfort- vector-21927053.jpg [6]M, sheik dawood. (2018). Review on Applications of Internet of Things (IoT). [18]https://532386f9a72d1dd857a8- 41058da2837557ec5bfc3b00e1f6cf43.ssl.c f5.rackcdn.com/wp- content/uploads/2019/10/Depositphotos_1 25641106_s-2019-239x300.jpg [7]Reddy, M & Student, Engineering & Professor, Assoc&Krishnamohan, Revu. (2017). Applications of IoT: A Study. 10.13140/RG.2.2.27960.60169. [8]"The Enterprise Internet of Things Market". Business Insider. 25 February 2015. Retrieved 26 June 2015 [19]https://image.slidesharecdn.com/wearables netcraftacademy-slideshare-141026160827- conversion-gate01/95/wearables-iot-1- 638.jpg?cb=1552863354 iot- [9]Nordrum, Amy (18 August 2016). "Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated". IEEE Spectrum [20]https://blog.econocom.com/en/blog/how-the- internet-of-things-is-revolutionising-industry/ [10]Lindner, Tim (13 July 2015). "The Supply Chain: Changing at the Speed of Technology". Connected World. Retrieved 18 September 2015. [21]https://data-flair.training/blogs/wp- content/uploads/sites/2/2018/05/iot-agri-image-3- 1.jpg [11]Hsu, Chin-Lung; Lin, Judy Chuan-Chuan (2016). "An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives". Computers in Human Behavior. [22]https://www-res.cablelabs.com/wp- content/uploads/2017/07/28093257/iot-based- botnet-attack.png [12]Howard, Philip N. (2015). Pax Technica: How the internet of things May Set Us Free, Or Lock Us Up. New Haven, CT: Yale University Press. [23]https://m.iotone.com/files/term/denial-of-service- attack--dos-_6.jpg [24]https://mest.meste.org/MEST_2_2017/10_ 03.pdf [13]Gubbi, Jayavardhana; Buyya, Rajkumar; Marusic, Slaven; Palaniswami, Marimuthu (1 September 2013). @ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 711

More Related