Review of Literature
Discuss about the Security in the System.
The IoT is getting a vast attention as the future application of the technology from the industries. There are many application of IoT for the personal use and industrial use. The concept of smart cities and the smart houses can be developed with the help of IoT. This paper has discussed the various application of the IoT along with the explanation to understand the IoT in broader sense.
Introduction to IoT:
Internet of thing is an emerging technology, which is providing a path breaking way of delivering the goodness of technology1. The internet of things also referred as IoT is also called internet of Everything which allows to create an environment where the machines and different electronic devices can interact with each other automatically. The IoT is getting a vast attention as the future application of the technology from the industries. There are many application of IoT for the personal use and industrial use. The concept of smart cities and the smart houses can be developed with the help of IoT. This paper has discussed the various application of the IoT along with the explanation to understand the IoT in broader sense.
According to the paper named “Internet Of Things: Definition, Characteristics and Architecture, Enabling Technologies, Application and Future Challenges” the IoT is a kind of network, that helps to connect anything through the internet and provides mart solutions like tracing, smart positioning and the recognition process2. This paper discusses about the various application of the internet of things along with the difference between the internet of things and other technologies2. This paper also discusses about the characteristics and the future challenges of IoT.
This article discusses about the smart use of the IoT. The use of IoT enables the application of the wearable devices , home appliances and the smart device for the communication. The focus of this paper is mainly on the security issues of the IoT devices3. According to this paper, during the information sharing between the devices in the IoT environment, the large amount of data contains many confidential information which are needed to be secured. The security of the IoT system thus cannot be neglected4. The paper starts with the general discussion about then information security background of the IoT followed by providing the broader and more complex view of the challenges and the issues regarding the security in IoT.
Characteristics of IoT compared to traditional network
Characteristics of IoT compared to the traditional network:
The characteristics of the IoT is different from traditional system on the network perspective. Some of the articles have mentioned the difference between the network maintained in IoT and the traditional network system.
According to this research the comparative analysis of the IoT architecture has been discussed. Internet of things considers the flexible interaction between the human and the machine. In the traditional network, the interaction is done between the systems5. The IoT allows the devices to interact with the human as well s the other devices through the use of internet. The traditional network can be both wired and wireless, whereas, the IoT can be considered as the extension of the wireless network6. One of the major use of IoT nowadays is implementation of this technology in developing the smart home security system7. In smart home security system, the presence of the intruders can be detected by the smart sensor devices and the automated decision making software takes the actions needed to be taken based on the situation. Sometimes the owner of the house are made aware about the violation of the security of the house by the system. The use of this kind o system in maintaining the security of the house is more convenient option rather than depending on the traditional system.
Another use of the IoT is RFID technology (radio frequency identification technology) which enables the object to object communication using the radio frequency identification. RFID can be used for various reasons. It can be a good substitute of the barcode scanning10. Through the use of this technology one object can identify the other specific object in order to make communication. The real time location and the identification of the object can also be done using this technology. The flexible RFID system can be developed with the help of the IoT that allows the merging of the function of the physical devices and the network level of the communication11. The sensors can be used in this kind of system which will collect the relevant data and analyze them . this analysis can bridge the gap in the human-machine communication8. This filling of the gap cannot be achieved in the use of the traditional network communication. The RFID technology can also be used in the case of nanotechnology an minimization of the intelligent devices.
Another IoT device that is getting popular is smart detection system in the cars. The smart detection and the sensors used in the car helps to detect the traffic on the road. This device helps in the automation of the car9. The detection of the traffics in the car can be done by the sensors without the human interactions. The smart detection system in the car also provides the user of the car about the possible routes those can be taken and the possible congested roads. The use of the smart devices also helps to detect the position of the car on the road along with that this system also controls the driving speed of the car12. The use of the smart car can help to reduce the number of accidents. The reason for being controlled by the machine and the smart sensor , it also helps to reduce the traffic congestion in the road.
Areas for application of IoT
The main difference between the characteristics of IoT and the traditional network is that the functionality of the traditional network is restricted to the computational purpose and the communicating purpose. The characteristics of using IoT enables the smart communication between the human and the system. Apart from that it is able to make the decision based on the smart decision making software.
Areas for application of IoT:
The new trend of establishing the connection has gone beyond the using of Smartphone and laptops. The advancement of the technology is helping in the advancement of the life by making all the things those are necessary and important t for the human being connected in a smarter way. This is done by the application of the IoT. There are various application of the IoT such as- smart homes, using of IoT in the healthcare sector13. This article has discussed the smart home facility. In the smart home system, the use of the IoT can help to control the different electronic equipments in the house. The user can control these sitting far away from the house. The security of the house is also maintained by the smart house system. However, there are some constraints in owing a smart home14. The smart home can be expensive, as this concept is not familiar to the most of the people and the smart system used in the smart house is expensive to implement.
Another application of the IoT is wearable. Wearable is gaining the popularity and the companies like Google and Samsung are working on the improvisation of these devices. These kind of devices are attached with the devices used by the users. The main function of these devices are to collect the data about the users. Those data are processed later in order to know the insight of the users. In this way these devices help to provide the customized service to the users15. The consumers can interact with these devices easily. The main advantage of these kind of devices are- they are small in size and portable and these devices are low power consuming. The use of these kind of devices can be applicable in maintaining the fitness, providing information about the entertainment and other various fields.
IoT can also be used in the energy management. The smart sensor installed in the meter can detect the accurate power consumption. Apart from that the main advantage of the use of the IoT in the energy management is that the smart sensor can detect the high power consumption, at that moment it can automatically reduces the consumption of the power16. The use of the IoT helps to reduce the wastage of power and equal distribution of the resources.
Three current security issues in IoT:
Privacy: The main security issue present in the systems based on the IoT is maintenance of the privacy. The data and the information can be leaked to the other people if the proper security codes are not maintained in the system. One of the example that can be given in this case is privacy in the use of baby monitor. Baby monitor is the application of the IoT that allows the smart monitoring of the babies. The mothers can interact with the devices in order to monitor their children. However, the lack of security in this device can leak the monitoring activity in front of other people that can hamper the privacy and security off the children.
Unauthorized access: Another concerned issue regarding the use of the IoT driven system is the threat from the unauthorized access. The data collected by the IoT and smart sensor devices can be accessed by the unauthorized people. The collected data are confidential and sensitive in nature. In that case, the unauthorized access of those data can become a threat for the authorized users. One of the example can be described in order to understand the sensitivity off this kind of vulnerability. The data collect by the IoT system in the smart car consists of user information, the important information about the car which includes the position and the location of the car12. Accessing these information by the intruders will be a threat for the users of the smart car.
Falsification: The another major issue about the security of the smart system based on the IoT is the chances of the falsification. The use of IoT can be indulged in the use of the pattern recognition, biometric system and the iris recognization system. In these cases the falsification of the identity can happen. The smart detection technique detect the pattern matched by the authorized user. In some cases , the illegal access can be done with the illegal use of the pattern of the authorized users.
Ways to mitigate the threats in the IoT security system:
The main purpose of using the IoT in the smart device is to improvise the way of services along with the improvement of the security. Apart from the three mentioned security vulnerabilities there are oter security threats present in the IoT. In order to mitigate those security threats certain steps and actions can be followed.
Maintaining the physical security of the devices: Maintaining the physical security of the connected devices are important. The devices used in the implementation of the IoT needs to be tamper –proofing . The implementation of the remote wiping capabilities are needed to be infused in the devices. Apart from that the developers are needed to be concerned that the system will not generate the hardware malfunction and provide the access to the unauthorized users.
Coding security: The coding security of software used in the system should be advanced in nature. The algorithm used in the system should able to detect any abnormality in the system. The coding standard of the system is needed to able to pass the control of the action to the appropriate block of the execution segment after the detection of the abnormality.
Encryption: The encryption standard of the system should be well maintained so the communication between the system and the users can not be interpreted by the third party2. This will help to secure the system based on the IoT by maintaining the data integrity and privacy of the system. The choosing of the encryption technology can be done after the consideration of the system requirements and the working principal of the IoT devices.
Authentication and device identity: implementation of the proper identification and the device authentication system in the device will help to ensure a secured connection between the device itself and with the backend control system of the device4. This will ensure the proper and secure workings of the device based on the IoT.
Taking these steps will ensure the security of the IoT based security devices.
Conclusion
It can be concluded from the above discussion that there are various security issues in the systems based on the IoT. However, the implementation certain security codes can eliminate the threats.
References
- Hossain, Md Mahmud, Maziar Fotouhi, and Ragib Hasan. “Towards an analysis of security issues, challenges, and open problems in the internet of things.” In Services (SERVICES), 2015 IEEE World Congress on, pp. 21-28. IEEE, 2015.
- Chen, Edward T. “The Internet of Things: Opportunities, Issues, and Challenges.” In The Internet of Things in the Modern Business Environment, pp. 167-187. IGI Global, 2017.
- Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. “Security, privacy and trust in Internet of Things: The road ahead.” Computer networks76 (2015): 146-164.
- Granjal, Jorge, Edmundo Monteiro, and Jorge Sá Silva. “Security for the internet of things: a survey of existing protocols and open research issues.” IEEE Communications Surveys & Tutorials17, no. 3 (2015): 1294-1312.
- Maras, Marie-Helen. “Internet of Things: security and privacy implications.” International Data Privacy Law5, no. 2 (2015): 99.
- Arias, Orlando, Jacob Wurm, Khoa Hoang, and Yier Jin. “Privacy and security in internet of things and wearable devices.” IEEE Transactions on Multi-Scale Computing Systems1, no. 2 (2015): 99-109.
- Fernandes, Earlence, Amir Rahmati, Jaeyeon Jung, and Atul Prakash. “Security implications of permission models in smart-home application frameworks.” IEEE Security & Privacy15, no. 2 (2017): 24-30.
- Weber, Rolf H. “Internet of things: Privacy issues revisited.” Computer Law & Security Review31, no. 5 (2015): 618-627.
- Fu, Kevin, Tadayoshi Kohno, Daniel Lopresti, Elizabeth Mynatt, Klara Nahrstedt, Shwetak Patel, Debra Richardson, and Ben Zorn. Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things. Technical Report. Computing Community Consortium. https://cra. org/ccc/wp-content/uploads/sites/2/2017/02/Safety-Security-and-Privacy-Threats-in-IoT. pdf, 2017.
- Arias, Orlando, Kelvin Ly, and Yier Jin. “Security and Privacy in IoT Era.” In Smart Sensors at the IoT Frontier, pp. 351-378. Springer, Cham, 2017.
- Watt, Steve, Chris Milne, David Bradley, David Russell, Peter Hehenberger, and Jorge Azorin-Lopez. “Privacy Matters–Issues within Mechatronics.” (2016).
- Wurm, Jacob, Khoa Hoang, Orlando Arias, Ahmad-Reza Sadeghi, and Yier Jin. “Security analysis on consumer and industrial iot devices.” In Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific, pp. 519-524. IEEE, 2016.
- Abomhara, Mohamed, and Geir M. Køien. “Security and privacy in the Internet of Things: Current status and open issues.” In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on, pp. 1-8. IEEE, 2014.
- Rose, Karen, Scott Eldridge, and Lyman Chapin. “The internet of things: An overview.” The Internet Society (ISOC)(2015): 1-50.
- Bäumer, Ulrich, Sabine von Oelffen, and Miriam Keil. “Internet of Things: Legal Implications for Every Business.” In The Palgrave Handbook of Managing Continuous Business Transformation, pp. 435-458. Palgrave Macmillan, London, 2017.
- Caron, Xavier, Rachelle Bosua, Sean B. Maynard, and Atif Ahmad. “The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective.” Computer law & security review32, no. 1 (2016): 4-15.