Uploaded by nikita98valte

IoT Security Analysis Report

advertisement
Security Analysis of IOT using Mobile
Computing
Stage 1 Report
Submitted in partial fulfillment of the requirements
For the degree of
M.Tech.
(Information Technology)
by
Nikita Mahendra Valte
Supervisor
Dr. Gautam M. Borkar
Department of Information Technology
Ramrao Adik Institute of Technology,
Sector 7, Nerul , Navi Mumbai
(Under the ambit of D. Y. Patil Deemed to be University)
September 2021
i
Ramrao Adik Institute of Technology
(Under the ambit of D. Y. Patil Deemed to be University)
Dr. D. Y. Patil Vidyanagar,Sector 7, Nerul, Navi Mumbai 400 706.
Certificate
This is to certify that, the Stage 1 report titled
“Security Analysis of IOT using Mobile Computing ”
is a bonafide work done by
Nikita Mahendra Valte
(20IF1002)
and is submitted in the partial fulfillment of the requirement for the
degree of
Masters in Technology
(Information Technology)
to the
D. Y. Patil Deemed to be University.
Examiner
Supervisor
M.Tech. Coordinator
Head of Department
i
Co-Supervisor
Principal
Acknowledgement
I declare that this written submission represents my ideas in my own words and where
others ideas or words have been included, I have adequately cited and referenced the
original sources. I declare that I have adhered to all principles of academic honesty and
integrity and have not misrepresented or fabricated or falsified any idea / data / fact
/ source in my submission. I understand that any violation of the above will be cause
for disciplinary action by the Institute and can also evoke penal action from the sources
which have thus not been properly cited or from whom proper permission has not been
taken when needed.
Date: 19 March 2022
ii
Abstract
One of the most cutting-edge technologies is the Internet of Things (IOT).Various features provided by the IOT by connecting smart objects through the internet. IOT is
refers as the connecting various devices to each other by means of internet hence there
is no human interaction. The IOT components like sensor, cloud, Bluetooth, wifi, etc.
are connected through network, it may be wired or wireless to make smart system or
smart devices. This devices are transferring the plenty amount of personal data over the
network. Due to that humans day to day life becomes an easier therefore it is necessary
to make sure that the technology should be secured as much as possible. In the IOT
environment, the data can be malfunction by various attacks and threats. Therefore the
strong security mechanism is required to deal with different types of attacks and security
challenges. Every electronic gadget will become a smart device in the future, and it will
be able to register with handheld equipment. Because the majority of IoT devices are
battery-powered and consume little power, IoT security is a serious concern. The most
critical security and protection challenges in IoT are identification and authentication.
Keywords:
IOT, Privacy, Security, Threats, Sensors, Raspberry Pi.
iii
Contents
Abstract
iii
List of Figures
v
1 Introduction
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2 Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1
2
2
2 Literature Survey
3
3 Problem Statement
3.1 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2 Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5
5
6
4 Proposed System
7
5 Till Now Approaches Towards Problem Statement
9
6 Distinguish Approach
14
6.1 Present Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
6.2 Our New Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Bibliography
16
iv
List of Figures
4.1
Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.1
5.2
5.3
5.4
5.5
5.6
5.7
rpi.PNG . . . . . . . . . . . .
IP Scanner.jpg . . . . . . . .
IP Address of IOT Device.jpg
VNC Viewer.jpg . . . . . . . .
Raspberry Pi VNC Viewer.jpg
Web Server.jpg . . . . . . . .
aircrack-ng . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
v
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
8
10
10
11
11
12
12
13
Chapter 1
Introduction
The privacy and security of the internet of things has become a very serious concern due
to the different nature of large scale devices and its vulnerabilities.The applications of IoT
are transportation,environmental monitoring, home automation,medical and healthcare
systems, teaching, etc [1]. The IoT devices are increasing rapidly and according to that
the number of devices in 2020 are 8.74 billion and it will rise nearly 11.57 billions by the
end of 2022 [2]. In 2020, the highest number of IoT devies is found in China with 3.17
billion devices. On the other side, the IoT applications are included the various domains
from smart Gird to smart City. But there are various cyber-attacks and security threats
which is big issue for the IoT devices. Lets see history and evolution in IOT Technology.
According to HP analysis, many IoT devices experiences an average of 25 percent
Vulnerabilities in device. From this analysis we come know that it is necessary to provide the serious security solutions. IoT devices faces the problems like computational
processing, limited memory and low power. IoT system is consist of three components
first is sensing unit which has number of sensors, mobile terminals and actuators. This
unit detect the physical environments. Because of its simple structure, IoT is more exposed to security issues with IoT devices. Many more security risks and challenges face
IoT devices. Different authors took different approaches to these security difficulties and
challengesUsing the notions of mobile computing, we give a security analysis of IoT-based
devices. The mobile computing provide both hardware as well as software security. The
many devices can connected with the IoT devices which provide security to them like they
can be authenticated by using smart phone by QR-code authentication and smartphone
also used as controller in home automation system [2]. These paper highlight the threats,
vulnerabilities,attacks and then approaches based on mobile computing.
1.1
Motivation
The Internet of Thing is the phenomenon that will be experiencing the rapid growth in
coming years. Because of the rapid development of IoT devices, security concerns are becoming important challenges that have piqued people’s interest. The Internet of Things
has a wide range of applications in a variety of fields and application domains. There
is a significant impact of use of IoT technologies such as e-learning, internet banking,
blogs, mobile devices, IoT applications, urban technologies, teaching technologies. The
motivation comes from IoT security using mobile computing. This is becoming a future
study trend in which the security of the IoT system is assessed using mobile computing.
1.2
Objective
• To ensure the safety of IoT network topology.
• The study of IoT security challenges in real world.
• To enhance the inter connection between different devices by increasing the speed
of communication process.
• To provide secure access to the UI layer to prevent unauthorized access.
2
Chapter 2
Literature Survey
In the digital world IOT plays an very important role of the information. The IOT networks are used in various cities of smart city network. Therefore the security of the IOT
network is very big issue.E. Shaikh et al [1] perform Internet of Things (IOT): Security
and Privacy Threats which discuss two technologies which are used WSN and RFID which
creates direct communication by using Internet. B. Liao et al [2] perform security analysis
of IOT devices by using Mobile Computing which provides both hardware as well as software based solutions to provide IOT security. Towards secure authenticating of cache in
the reader for RFID-based IOT systems introduced by C.-T. Li et al [3] and a lightweight
RFID mutual authentication protocol which has cache in the reader is introduced with
named LRMAPC which achieve stronger security and privacy requirements. A smartphone based privacy-preserving security framework for IOT devices is performed by M.
Togan et al [4] which discuss about IOT authentication service by using a smart-phone
as security controller, QR codes and attribute based cryptography. Agyeman et al [5]
perform study of the advances in IOT security and focused on IOT architecture and its
different layer.
Internet of Things (IOT):Application systems and security vulnerabilities performed by
J. Ahamed et al [6] focuses on the identification of certain types of IOT applications suitable for UAE also it analyse the which are security threats associated to them and their
impacts on the applications. W. Zhu et al [7] provide a security and privacy model for
mobile rfid systems in the internet of things which discuss the privacy and security model
named AKE protocol used for mobile RFID systems. EdgeIOT: Mobile edge computing
for the Internet of Things perform by X. Sun [8] discuses the approach of mobile edge
computing. It is used in the IOT architecture and edgeIoT is used to handle the data
streams at the mobile edge. Survey on security threats of smartphones in Internet of
Things by M. H. Khan [9] discuss the interconnection of devices that used in many ways
such as improving services depend on location and co-ordinates timely. Security, Privacy
and Trust for Smart Mobile-Internet of Things (M-IoT) discussed by Vishal Sharma et al
[10] focuses upon the solutions for IoT devices which are applicable to privacy, security
and trust in connected M-IoT networks.
Adaptive Security Framework in Internet of Things (IoT) for Providing Mobile Cloud
Computing performed by F. AlShahwan [11] discusses the IOT components, security protocols between the mobile hosts and clients. M. G. Samaila et al [12] provide Challenges
of securing Internet of Things devices: A survey which discusses the security protocols
and schemes proposed for the IoT. Security analysis of mobile crowd sensing applications
discuss by N. P. Owoh et al [13] focuses on Mobile Crowd Sensing and the mobility features of mobile phones.Security risk management in IoT environment is performed by V.
Malik et al [14] which deals with the identification and mitigation of the security vulnerabilities by an intelligent. A. W. Atamli et al [15] provide Threat-based security analysis
for the internet of things which focuses on threat model which is based on use-cases of
IoT and it is used to secure system. Authentication and Authorization for Mobile IoT
Devices Using Biofeatures provide by M. A. Ferrag et al [16] focuses on threat models
and countermeasures. It is used by biometrics-based authentication schemes and used for
mobile IoT devices, data mining methods, artificial intelligence and machine learning for
secure authentication and authorization in IOT.
The survey shows that, IOT devices are not able to deal with a security challenges. These
devices required very good security mechanism which deals with the different threats and
security challenges.These techniques need to be more accurate so that it will decrease the
impacts of malware. The structure of the IOT devices are very simple as they consist
of transceivers, actuators, sensors and small processing chip so they can easily undergo
the attacks. So smart phones is a way can be used as a security for controlling the IOT
devices.
4
Chapter 3
Problem Statement
A device which can connect to any network i.e. private or public.Once this device over the
network, any device from the network can communicate with this device or vice-versa.It
means our IOT device is available for all the device. Problem of exposion, posibilies of
IOT attack, focused attack, attack explanation.
We are planning to provide a possible data security by considering discussed examples. It
may be possible, data may get leaked somewhere, so I am trying to keep data, information
safe and its analysis.
3.1
Applications
• Consumer Applications : It includes smart watches, smart TVs, smart phones and
smart homes, which controls from door locks to air conditioning and many other
devices.
• Business Applications : Nowadays IOT devices are used in many Businesses which
include smart security cameras, trackers for vehicles and goods, ships and various
sensors to capture the data of industrial machines.
• Governmental Applications : Governmental IOT applications include devices used
to monitor traffic congestion, track wildlife in different places and keep alert from
natural disaster and calamities.
3.2
Threats
• AI-based attacks
• Insecure ecosystem interfaces
• Weak passcodes
• Lack of physical hardening
• Data storage and transmission are insecure.
• Device management and visibility are both lacking
• Botnets
6
Chapter 4
Proposed System
Mobile computing is a method of securing multiple IoT devices by utilising infrastructure such as a smart phone. The smart phone might serve as a controller or it can be
utilised for security authentication. These are intelligent devices. They provide adequate
security, although they are occasionally vulnerable to various virus attacks and threats.
So, different detection techniques are used to identify the attacks. The major goal of
these strategies is to detect various malware attacks in the system and to protect it from
external intervention.
Initially our user is selecting a IOT device in the network. The user will provide a credential for successfull authentication.If the credential matches, it will access the node and
if credential does not matches, it will go to user. While authentication it will provide
security to devices and it will detect the malware.
Figure 4.1: Flowchart
8
Chapter 5
Till Now Approaches Towards
Problem Statement
• Establishing Network : Raspberry Pi as a IOT device is used in the Network.
• Identifying all nodes from Network : The advanced IP Scanner application is used
to scan IP addresses of devices in the Network.
• Establishing connection through Host : The VNC Viewer application is used for
authentication.
• Run Appache Server on Host
• Ping on Host IP from Client devices connected on same network.
• Run some packages for identifying unexpected behaviour on network such as aircrackng.
Figure 5.1: rpi.PNG
Figure 5.2: IP Scanner.jpg
10
Figure 5.3: IP Address of IOT Device.jpg
Figure 5.4: VNC Viewer.jpg
11
Figure 5.5: Raspberry Pi VNC Viewer.jpg
Figure 5.6: Web Server.jpg
12
Figure 5.7: aircrack-ng
13
Chapter 6
Distinguish Approach
• Device detection and visibility:
There are several risk factors in IOT.But I have selected device detection and visibility because whenever IOT device come in a picture that time firstly it should
connected a network. Network might be wired or wireless depending upon device
application but when IOT device is connected to network, at that instance one IP
address is provided that device from network itself. Through that IP address anyone
from network or outside network can communicate with that IOT device.There are
two cases:
1) IOT Device is talking with other device
2) Other network node is trying to communicate with IOT device.
6.1
Present Approach
In present approach there is use of SSH/SSP that is Secure Shell Protocol. It is the
method of secure remote access to one device to another device in network. There are so
many different options to provide secure authentication like CBC.Cipher Block Chaining
(CBC) encryption is enabled on the SSH server. An attacker may be able to recover the
plaintext message from the ciphertext as a result of this.
14
6.2
Our New Approach
In our new approach, we are using Token Key Based Method.Token-based authentication
is a technique that allows users to confirm their identity and receive a unique access token
in exchange.Users can then access the website or app for which the token was granted
during the token’s lifetime, rather than having to re-enter credentials each time they visit
the same webpage, app, or other resource protected by the token.Specific authentication
and encryption settings can be used per SSID here, allowing you to specify different levels
of security for different resources. The authentication/encryption method is set to none
by default; we strongly advise you to use one of the supported authentication/encryption
methods.
15
Bibliography
[1] E. Shaikh, I. Mohiuddin and A. Manzoor, ”Internet of Things (IoT): Security and
Privacy Threats,” 2019 2nd International Conference on Computer Applications Information Security (ICCAIS), 2019.
[2] B. Liao, Y. Ali, S. Nazir, L. He and H. U. Khan, ”Security Analysis of IoT Devices
by Using Mobile Computing: A Systematic Literature Review,” in IEEE Access, vol.
8, pp. 120331-120350, 2020.
[3] C.-T. Li, C.-C. Lee, C.-Y. Weng, and C.-M. Chen, ”Towards secure authenticating
of cache in the reader for RFID-based IoT systems,” Peer-to-Peer Networking and
Applications, vol. 11, pp. 198-208, 2018.
[4] M. Togan, B.-C. Chifor, I. Florea, and G. Gugulea, ”A smartphone based privacypreserving security framework for IoT devices,” in 2017 9th International Conference
on Electronics, Computers and Artificial Intelligence (ECAI), 2017, pp. 1-7.
[5] A. Dean and M. O. Agyeman, ”A study of the advances in IoT security,” in Proceedings
of the 2nd International Symposium on Computer Science and Intelligent Control,
2018, p. 15.
[6] J. Ahamed and A. V. Rajan, ”Internet of Things (IoT): Application systems and
security vulnerabilities,” in 2016 5th International Conference on Electronic Devices,
Systems and Applications (ICEDSA), 2016, pp. 1-5.
[7] W. Zhu, J. Yu, and T. Wang, ”A security and privacy model for mobile rfid systems in
the internet of things,” in 2012 IEEE 14th International Conference on Communication
Technology, 2012, pp. 726-732.
16
[8] X. Sun and N. Ansari, ”EdgeIoT: Mobile edge computing for the Internet of Things,”
IEEE Communications Magazine, vol. 54, pp. 22-29, 2016.
[9] M. H. Khan and M. A. Shah, ”Survey on security threats of smartphones in Internet
of Things,” in 2016 22nd International Conference on Automation and Computing
(ICAC), 2016, pp. 560-566.
[10] V. Sharma, I. You, K. Andersson, F. Palmieri, M. H. Rehmani and J. Lim, ”Security,
Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey,” in IEEE
Access, vol. 8, pp. 167123-167163, 2020.
[11] F. AlShahwan, ”Adaptive Security Framework in Internet of Things (IoT) for Providing Mobile Cloud Computing,” Mobile Computing: Technology and Applications,
p. 99, 2018.
[12] M. G. Samaila, M. Neto, D. A. Fernandes, M. M. Freire, and P. R. Inácio, ”Challenges
of securing Internet of Things devices: A survey,” Security and Privacy, vol. 1, p. e20,
2018.
[13] N. P. Owoh and M. M. Singh, ”Security analysis of mobile crowd sensing applications,” Applied Computing and Informatics, 2018.
[14] V. Malik and S. Singh, ”Security risk management in IoT environment,” Journal of
Discrete Mathematical Sciences and Cryptography, vol. 22, pp. 697-709, 2019.
[15] A. W. Atamli and A. Martin, ”Threat-based security analysis for the internet of
things,” in 2014 International Workshop on Secure Internet of Things, 2014, pp. 3543.
[16] M. A. Ferrag, L. Maglaras, and A. Derhab, ”Authentication and Authorization for
Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends,” Security
and Communication Networks, vol. 2019, 2019.
[17] E. Bertino, ”Security and Privacy in the IoT,” in International Conference on Information Security and Cryptology, 2017, pp. 3-10.
[18] M. A. El Khaddar and M. Boulmalf, ”Smartphone: the ultimate IoT and IoE device,”
Smartphones from an Applied Research Perspective, p. 137, 2017.
17
[19] B. L. Parne, S. Gupta, and N. S. Chaudhari, “Segb: Security enhanced group based
aka protocol for m2m communication in an iot enabled lte/lte-a network,” IEEE Access, vol. 6, pp. 3668–3684, 2018.
[20] C. Maple, ”Security and privacy in the internet of things,” Journal of Cyber Policy,
vol. 2, pp. 155-184, 2017.
18
Download