Uploaded by mail

Comparative Study of Security Issue and Challenges in IoT

International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
Comparative Study of Security Issue and Challenges in IoT
Sayali Vishwanath Pawar
Department of MCA, YMT College of Management, Kharghar, Navi Mumbai, Maharashtra, India
ABSTRACT
In the past few years, Internet of things (IoT) has been a focal point of
research. The Internet of Things (IoT) hold up an expansive scope of uses
including keen urban areas, waste management, auxiliary wellbeing, security,
crisis administrations, coordinations, retails, mechanical control, and
wellbeing care. Privacy and Security are the key issues for IoT applications,
and still face some colossal challenges. In late years, the Internet of Things
(IoT) has increased calculable research consideration. Now days, the IoT is
considered as eventual fate of the web. In future, IoT will assume a significant
job and will change our gauges, plan of action just as living styles. Right now
give a similar report on security issue and difficulties in iot just as a short
depiction on utilizations of iot.
How to cite this paper: Sayali Vishwanath
Pawar "Comparative Study of Security
Issue and Challenges
in IoT" Published in
International Journal
of Trend in Scientific
Research
and
Development
(ijtsrd), ISSN: 2456IJTSRD30653
6470, Volume-4 |
Issue-3, April 2020, pp.707-711, URL:
www.ijtsrd.com/papers/ijtsrd30653.pdf
KEYWORDS: Iot, Security issue and challenges, Applications of iot
Copyright © 2020 by author(s) and
International Journal of Trend in Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the
Creative
Commons Attribution
License
(CC
BY
4.0)
(http://creativecommons.org/licenses/by
/4.0)
INTRODUCTION
The expression "Web of things" was presented by Kevin
Ashton in the year 1982.Internet of Things is where every
gadget is relegate to an IP address and through that IP
address, anybody makes that gadget recognizable on web.
The Internet is an advancing element. It began as the "Web of
Computers." The Internet of Things (IoT) is an arrangement
of interrelated registering gadgets, mechanical and
computerized machines, articles, creatures or individuals
that are given one of a kind identifiers (UIDs) and the
capacity to move information over a system without
expecting human-to-human or human-to-PC association. The
4 primary principal parts in iot are Sensor/Devices,
Connectivity, Data Processing, User Interface. One of the
entrancing highlights of iot gadgets is that they are equipped
for creating gigantic measure of information. Iot is likewise
used to store information in cloud the absolute most
captivating iot cloud stages are Google clouds, azure,
Amazon web administration (aws).
With the quick increment in iot application use, some
security issue have constructed forcefully. As iot utilizes
different gadgets and gadgets are turning out to be a piece of
web system subsequently these security issue required to be
inspected. As per Study Analyzed by Hewlett Packard
uncover 70% most normally utilized iot gadget hold huge
vulnerabilities. In this paper We will talked about
comparative study of security issue and challenges in iot.
@ IJTSRD
|
Unique Paper ID – IJTSRD30653
|
Defination of Iot[1]
Applications of IoT:
Iot is widely used in many areas some of the main
applications of iot are as follows:
Volume – 4 | Issue – 3
|
March-April 2020
Page 707
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
1. Smart Home:
Smart home positioning as the highest IoT application on all
channels. Smart home is the most remarkable and precise
IoT application. Smart home uses web associated gadgets to
empower remote checking frameworks and applications.
Utilizing brilliant home application, we can deal with all our
home gadgets from one spot just as it likewise valuable for
augmenting the home security. the most utilized keen
gadgets are Smart lightning, smart smoke alarm, smart lock,
etc.
2. Wearable:
Like Smart home, Wearable is additionally one of the most
well known IoT application in todays world. Wearable
innovation is trademark ti web on things. Wearable gadgets
have movement sensor. The upside of utilizing wearable
gadgets are it empowering self-obligation, expands work
environment wellbeing, upgrade effectiveness grinding
away, etc. The most regularly utilized wearable gadgets are
smart watch, fit band, smart shoes.
3. Smart city:
Smart city is made out of data and correspondence
technology. Smart city utilizes contraption, for example,
associated sensor, lights. meter to broke down and gather
information. Water supply, electricity supply and open
vehicle are the parts of Smart city.
4. IoT in Industry:
IoT is gainful in the fields where both quicker improvement,
just as the nature of items, are the basic variables for a better
yield on Investment (ROI). One of such fields is the
assembling businesses, and Industrial Internet of Things
(IIoT) Industrial Internet of Things (IIoT) is an ever
developing and quickly expanding part that represents a
large portion of the portion of IoT spending in the worldwide
market. Industrialists and makes in pretty much every part
have an enormous chance to not just screen. Yet in addition
mechanize a considerable lot of complex procedure
associated with assembling. For long time businesses and
plants have had sensors and frameworks to follow progress
yet IoT makes a stride further and gives complexities to even
the moment issues.
5. Smart Agriculture:
Measurements gauge the ever-developing total populace to
arrive at almost 10 billion constantly 2050. To take care of
such a monstrous populace one needs to wed farming to
innovation and get best outcomes. There are various
prospects right now. One of them is the Smart Greenhouse. A
greenhouse farming is a strategy improves the yield of
harvests by controlling natural parameters. Be that as it may,
manual dealing with brings about creation misfortune,
vitality misfortune, and work cost, making the procedure
less compelling. A greenhouse with inserted gadgets makes
it simpler to be observed as well as, empowers us to control
the atmosphere inside it. Sensors measure various
parameters as indicated by the plant necessity and send it to
the cloud. It, at that point, forms the information and applies
a control activity.
Literature Review:
IoT is platform where installed gadget is associated with web
so they can trade and gather information with one another
and give unique credits and capacity to move information
@ IJTSRD
|
Unique Paper ID – IJTSRD30653
|
over a system without need of a human-to-human or humanto-PC cooperation. While IoT is popular in today’s world so
they also come with some threat. The vast majority of the IoT
gadgets are associated with web so they can be hacked
simply like some other web subordinate gadget.
The term Internet of Things was first invented by Kevin
Ashton in 1999 in the context of supply chain management
[2]. In this paper we will discuss comparisons between
security issue and challenges in IoT. The meaning of the
Internet of things has advanced because of the combination
of numerous advances, constant examination, AI, product
sensors, and implanted frameworks. [3].IoT usage utilize
diverse specialized correspondences models, each with its
own attributes. Four basic interchanges models portrayed by
the Internet Architecture Board include: Device-to-Device,
Device-to-Cloud, Device-to-Gateway, and Back-End DataSharing. [4].IoT consists of a variety of objects that are
interconnected and that can communicate with each other
by sending and receiving relevant data.[5].
IoT has numerous applications which are exceptionally
valuable for the individuals people living right now in this
world [6].IoT is generally appropriate for heart checking
implants, biochip transponders on livestock, electric
shellfishes in seaside waters, vehicles with worked in
sensors, gadgets for ecological/nourishment/pathogen
observing or field activity gadgets that help firefighters in
search and salvage tasks[7]. The broad arrangement of
utilizations for IoT gadgets is frequently separated into
buyer, business, modern, and infrastructure spaces[8]. The
IoT's major huge pattern as of late is explosive development
of gadgets associated and constrained by the Internet[9]. The
IoT makes open doors for more straightforward combination
of the physical world into PC based frameworks, bringing
about effectiveness enhancements, financial advantages, and
decreased human efforts[10]. The quantity of IoT gadgets
expanded 31% year-over-year to 8.4 billion in the year 2017
and it is assessed that there will be 30 billion gadgets by
2020.The worldwide market estimation of IoT is anticipated
to reach $7.1 trillion by 2020[11].
Philip N. Howard, a teacher and writer, composes that the
Internet of things offers colossal potential for enabling
residents, making government straightforward, and
expanding data get to. Howard alerts, be that as it may, that
security dangers are tremendous, similar to the potential for
social control and political control[12]. A test for makers of
IoT applications is to clean, process and decipher the huge
measure of information which is assembled by the sensors.
There is an answer proposed for the investigation of the data
alluded to as Wireless Sensor Networks [13]. Security is the
greatest worry in receiving Internet of things technology,
with worries that fast improvement is going on without
proper thought of the significant security challenges
involved and the administrative changes that may be
fundamental[14]. Inadequately made sure about Internetopen IoT gadgets can likewise be subverted to assault others.
In 2016, a dispersed forswearing of administration assault
controlled by Internet of things gadgets running the Mirai
malware brought down a DNS supplier and significant
sites[15].
In this paper we will discuss about security issue and
challenges in iot and how to overcome that challenges.
Volume – 4 | Issue – 3
|
March-April 2020
Page 708
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Research Methadology:
A. How IoT Works:
An IoT framework comprises of sensors/gadgets which
"talk" to the cloud through a network. When the information
finds a workable pace, programming forms it and afterward
may choose to play out an activity, for example, sending a
caution or naturally modifying the sensors/gadgets without
the requirement for the client. Be that as it may, if the client
input is required or if the client just needs to monitor the
framework, a UI permits them to do as such. Any alterations
or activities that the client makes are then sent the other
way through the framework: from the UI, to the cloud, and
back to the sensors/gadgets to make a change.
[16] IoT Work
B. Security Issue and challenges in IoT:
A. Security Issue:
1. Botnet:
"Botnet" is a mix of the words "robot" and "network". A
botnet is a system that joins different frameworks together
to remotely assume responsibility for a casualty's
framework and circulate malware. Cyber lawbreakers use
botnets to actuate botnet assaults, which incorporate
malignant exercises, for example, certifications releases,
unapproved get to, information robbery and DDoS attacks.
Linux.Aidra, Bashlite, Mirai, Linux/I RCTelnet are a few kinds
of iot botnet attacks. Botnet assault utilizing customer server
model engineering just as shared connection.
Botnet[21]
2. Denial Of Service (DOS) Attack/DDOS:
In processing, a denial of service attack (DoS assault) is a
digital assault wherein the culprit tries to make a machine or
system asset inaccessible to its expected clients by
incidentally or uncertainly upsetting administrations of a
host associated with the Internet. The Internet of Things
offers a wide assortment of brilliant gadgets – all of which
face the trouble of making sure about generally protection.
As the gadgets are for the most part so extraordinary their
heterogenic nature is frequently blamed by makes and
proprietors the same to skirt adequate security controls.
Attackers may get to the savvy applications arrange and
send bulk message to keen gadgets, for example, clear to
send and demand to send They can likewise assault focused
on gadget by utilizing malevolent codes so as to performDoS
assaults on different gadgets that are associated in a brilliant
applications. Thus, brilliant gadgets can't perform
appropriate functionalities in view of depleting assets
because of such assaults. For shirking from this assault, it is
imperative to apply confirmation to square and recognize
unapproved get to.
To construct a botnet, botmasters need the same number of
contaminated online gadgets or "bots" under their order as
could be allowed. The more bots associated, the greater the
botnet. The greater the botnet, the greater the effect. So size
matters. Botnets aren't normally made to bargain only one
individual PC; they're intended to contaminate a huge
number of gadgets. Bot herders regularly convey botnets
onto PCs through a trojan pony infection.
Progressively intricate botnets can even self-proliferate,
finding and tainting gadgets automatically. Botnets are hard
to recognize. They utilize just limited quantities of
processing capacity to abstain from disturbing ordinary
gadget capacities and alarming the client. Botnets set aside
some effort to develop. Botnets can contaminate practically
any gadget associated straightforwardly or remotely to the
web. PCs, PCs, cell phones, DVR's, smart watches,
surveillance cameras, and brilliant kitchen machines would
all be able to fall inside the trap of a botnet.
@ IJTSRD
|
Unique Paper ID – IJTSRD30653
|
Denial of Service Attack [22]
3. Man in the Middle attack:
A man-in-the-middle assault is a sort of cyberattack. The
man-in-the-center idea is the place an assailant or
programmer catches a correspondence between two
frameworks. It is a risky assault since it is one where the
assailant acts like the first sender. A man-in-the-center
assault permits a pernicious on-screen character to catch,
send and get information implied for another person, or not
intended to be sent by any means, without either outside
gathering knowing until it is past the point of no return.
Man-in-the-center assaults can be abridged from various
perspectives, including MITM, MitM, MiM or MIM. A MITM
assault abuses the ongoing handling of exchanges,
Volume – 4 | Issue – 3
|
March-April 2020
Page 709
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
discussions or move of other data. sniffing, spoofing are
some thechnique of man in the center assault.
not been altered. Block chain – as a decentralized conveyed
record for IoT information – offers a versatile and strong
methodology for guaranteeing the honesty of IoT
information
3. Technical Concerns:
Because of the expanded utilization of IoT gadgets, the traffic
created by these gadgets is too expanding. Subsequently
there is a need to expand arrange limit, subsequently, it is
additionally a test to store the colossal measure of
information for investigation and further last stockpiling.
4. Insurance Concerns:
The insurance agencies introducing IoT gadgets on vehicles
gather information about wellbeing and driving status so as
to take choices about protection
Man in the Middle Attack[23]
4. Device hijacking:
The assailant hijackers and adequately expect control of a
gadget. These assaults are very hard to distinguish on the
grounds that the assailant doesn't change the fundamental
usefulness of the gadget. Additionally, it just takes one
gadget to possibly re-taint others, for instance, brilliant
meters associated with a network. In an IoT situation, a
robber could expect control of a keen meter and utilize the
undermined gadget to dispatch ransom ware assaults
against Energy Management Systems (EMSs) or illicitly
siphon unmetered electrical cables.
5. Lack of Common Standard:
Since there are numerous principles for IoT gadgets and IoT
fabricating businesses. Consequently, it is a major test to
recognize allowed and non-allowed gadgets associated with
the web.
5. Insecure Wireless Connectivity:
Most smart application associate with cell phones or tablets
remotely, conceivably programmers simple access to gadgets
and a platform to an assault on a corporate system.
Numerous remote interchanges can't prepare for a decided,
constrained attack. sometimes beacause of unreliable
remote association we misfortune the reliability, integrity of
that application.
B. Iot Security Challenges:
1. Lack Of Encryption:
In spite of the fact that encryption is an extraordinary
method to keep programmers from getting to information, it
is likewise one of the main IoT security challenges. These
gadgets come up short on the capacity and preparing
abilities that would be found on a customary PC. The
outcome is an expansion in assaults where programmers can
without much of a stretch control the calculations that were
intended for security. Except if aventure settle this issue,
encryption won't be a security resource.
2. Ensure data privacy and integrity:
It is likewise significant that any place the information winds
up after it has been transmitted over the system, it is put
away and handled safely. Executing information security
incorporates redacting or anonymizing delicate information
before it is put away or utilizing information partition to
decouple by and by recognizable data from IoT information
payloads. Information that is not, at this point required
ought to be discarded safely, and if information is put away,
keeping up consistence with legitimate and administrative
structures is additionally a significant test. Guaranteeing
information uprightness, which may include utilizing
checksums or advanced marks to guarantee information has
@ IJTSRD
|
Unique Paper ID – IJTSRD30653
|
Comparative table of security Issue and challenges
Conclusion:
In this paper ,we conferred the understanding related to
Security issue and challenges in Smart application using iot.
Smart application using iot has many pros and cons.
However the cons directly effects the security of the data.
Security issue is caused by many factors like many active and
passive attcks, spoofing, spamming etc. Security threat
caused due to theft is more. Hence, itis vital to keep
confidential and sensitive data secret In this paper, we have
also discussed about the short information about smart
application and how iot is work on smart application,
challenges of iot as well as some suggested solution of how
security issue can be avoided successfully by using different
technique like data encryption, data confidentiality etc.
REFERENCES
[1] https://thesai.org/Downloads/Volume8
No6/Paper_50Security_Issues_in_the_Inte
rnet_of_Things.pdf
Volume – 4 | Issue – 3
|
March-April 2020
Page 710
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
[2] “Understanding the Internet of Things (IoT) “, July
2014. Gubbi, Jayavardhana,et al “Internet of Things
(IoT): A vision, architectural elements, and future
directions” Future Generation Computer Systems 29.7
(2013): 1645-1660
[3] Rouse, Margaret (2019). "internet of things (IoT)". IOT
Agenda. Retrieved 14 August 2019.
[4] https://www.internetsociety.org/resources/doc/2015
/iotoverview?gclid=Cj0KCQjw3qzzBRDnARIsAECmryrjKJU
irXuumWSs0QdY7HUidaU8mDAroKfYgw_vBduFTEkM
T7avICUaAp8OEALw_wcB.
[5] Braganza D, Tulasi B. RFID Security Issues in IoT: A
Comparative Study. Orient.J. Comp. Sci. and
Technol;10(1)
[6] M, sheik dawood. (2018). Review on Applications of
Internet of Things (IoT).
[7] Reddy, M & Student, Engineering & Professor,
Assoc&Krishnamohan, Revu. (2017). Applications of
IoT: A Study. 10.13140/RG.2.2.27960.60169.
[8] "The Enterprise Internet of Things Market". Business
Insider. 25 February 2015. Retrieved 26 June 2015
[9] Nordrum, Amy (18 August 2016). "Popular Internet of
Things Forecast of 50 Billion Devices by 2020 Is
Outdated". IEEE Spectrum
[10] Lindner, Tim (13 July 2015). "The Supply Chain:
Changing at the Speed of Technology". Connected
World. Retrieved 18 September 2015.
[11] Hsu, Chin-Lung; Lin, Judy Chuan-Chuan (2016). "An
empirical examination of consumer adoption of
Internet of Things services: Network externalities and
concern for information privacy perspectives".
Computers in Human Behavior.
[12] Howard, Philip N. (2015). Pax Technica: How the
internet of things May Set Us Free, Or Lock Us Up. New
Haven, CT: Yale University Press.
"Internet of Things (IoT): A vision, architectural
elements, and future directions".
[14] Feamster, Nick (18 February 2017). "Mitigating the
Increasing Risks of an Insecure Internet of Things".
[15] Woolf, Nicky (26 October 2016). "DDoS attack that
disrupted internet was largest of its kind in history,
experts say
[16] https://www.google.com/url?sa=i&url=https%3A%2F
%2Fwww.quora.com%2FHow-does-the-Internet-ofThingswork&psig=AOvVaw3G6kwfgINy79OC4UEYHM0t&ust
=1584766319460000&source=images&cd=vfe&ved=0
CAIQjRxqFwoTCPCM6uKgqOgCFQAAAAAdAAAA ABAa
[17] https://cdn4.vectorstock.com/i/1000x1000/70/53/s
mart-home-iot-internet-of-things-control-comfortvector-21927053.jpg
[18] https://532386f9a72d1dd857a841058da2837557ec5bfc3b00e1f6cf43.ssl.c
f5.rackcdn.com/wpcontent/uploads/2019/10/Depositphotos_1
25641106_s-2019-239x300.jpg
[19] https://image.slidesharecdn.com/wearables
netcraftacademy-slideshare-141026160827conversion-gate01/95/wearables-iot-1638.jpg?cb=1552863354
iot-
[20] https://blog.econocom.com/en/blog/how-theinternet-of-things-is-revolutionising-industry/
[21] https://data-flair.training/blogs/wpcontent/uploads/sites/2/2018/05/iot-agri-image-31.jpg
[22] https://www-res.cablelabs.com/wpcontent/uploads/2017/07/28093257/iot-basedbotnet-attack.png
[23] https://m.iotone.com/files/term/denial-of-serviceattack--dos-_6.jpg
[24] https://mest.meste.org/MEST_2_2017/10_ 03.pdf
[13] Gubbi, Jayavardhana; Buyya, Rajkumar; Marusic,
Slaven; Palaniswami, Marimuthu (1 September 2013).
@ IJTSRD
|
Unique Paper ID – IJTSRD30653
|
Volume – 4 | Issue – 3
|
March-April 2020
Page 711