Uploaded by pradyumanyadav7thd

IOT from Cyber Security Perspective

advertisement
IOT FROM CYBER SECURITY PERSPECTIVE
SUMMARY
The Internet of Things (IoT) is a big idea that's growing fast, connecting different devices to make smart
networks. By 2020, there could be 200 billion IoT devices, helping in areas like healthcare and finance. But,
these devices are vulnerable to cyberattacks because they connect wirelessly. The Mirai attack is an example
where hackers used default passwords to disrupt smart home networks. Securing IoT systems is vital for their
success and to protect everything they're connected to, like servers and applications. We need to understand
these attacks and find ways to stop them to make IoT safe. It's important for IoT to be safe so we can use it in
smart cities and other places to make life easier. We need to pay attention to security to make sure IoT can be
used everywhere without problems.
IoT systems face serious security challenges due to their distributed nature and wireless communication, making
them vulnerable to attacks. Unlike traditional systems, IoT needs advanced defense mechanisms because it's
made up of diverse objects and operates on a large scale. Designing security for IoT is complex because of
limitations like memory and battery life. Additionally, the lack of standardized technologies and protocols
complicates security efforts. Effective security solutions for IoT must detect attacks, prevent breaches, ensure
confidentiality, and maintain uninterrupted services.
IoT technology is growing fast, but security worries are holding it back and making it a target for attacks. There
are three main layers in an IoT system: the physical hardware layer (perception), the data-routing layer
(network), and the user interface layer (application). These layers use different standards and protocols for
communication. Researchers have classified attacks on each layer and assessed their risk levels using a special
model. When users respond with the requested information, attackers can use it to gain access to the accounts.
Regular encryption methods used in normal networks can't work well in IoT because IoT devices have limits
like how much power or memory they have. So, special encryption methods are needed to protect IoT data. This
data is always being created and can be targeted by snooping or malware attacks. To protect it, encryption using
special codes is necessary. Regular encryption methods used in regular networks aren't suitable for IoT because
IoT devices have limitations like power and memory. So, specific encryption methods are required to keep IoT
data safe. A firewall is a security system that manages network traffic at different levels, filtering packets from
basic network data to application protocols. There are different types of firewalls based on filtering policies and
deployment methods, including Packet filtering, Stateful Packet inspection, Application-level gateway, and
Circuit-level gateway. In an IoT setup, firewalls can be placed either directly on IoT devices or on a central node
overseeing different communication networks . Intrusion Detection Systems (IDS) identify network intrusions
and play roles in monitoring, identification, and alarms. They come in types like Signature-based and Anomalybased, each with strengths and weaknesses. While Signature-based IDS is good for known attacks, Anomalybased can catch unknown ones but might give false alarms. In IoT, designing effective IDS is tough due to
power constraints and varied computing environments.
REFERENCES:
➢
➢
➢
Gupta, H., Sharma, S., & Agrawal, S. (2023). A Survey on Deep Learning Enabled Intrusion Detection
System for Internet of Things. In Advances in Cognitive Science and Communications (pp. 571).
Wankhade, A. D., & Wagh, K. (2023). Design Secure Cloud Based IoT Network for End to End Cloud
Communication. In 2023 11th International Conference on Emerging Trends in Engineering &
Technology - Signal and Information Processing (ICETET - SIP) (pp. 1-5).
Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current status
and open issues. In 2014 International Conference on Privacy and Security in Mobile Systems
(PRISMS) (pp. 1-8). Aalborg, Denmark. doi: 10.1109/PRISMS.2014.6970594
.CITATION:
Yadav, Pradyuman . (2024). IoT from Cybersecurity Perspective. Vellore Institute Of Technology, Katpadi,
Vellore, 632014.
RegNo: 21BCT0192 , Name: PRADYUMAN YADAV
Download