a study on security and privacy in internet of things

4
International Journ Internat ISSN No: 245 @ IJTSRD | Available Online @ www A Study on Secur Muthu L Department of Computer Ap ABSTRACT In the past decade, Internet of Things (I attention of analysis. Security and priva problems for IOT applications, and st monumental challenges. So as to facilit domain, we tend to in short review progress of IoT, and listen to the p suggests that of deeply analyzing t design and options, the protection n given. On the idea of those, we tend analysis standing of key technologies cryptography mechanism, communica protective device knowledge and scient algorithms, and in brief define the challe Keyword: Internet of things; IOT thre Issues of security; Privacy; IoT challeng INTRODUCTION The Internet of things (IoT) is that t physical devices, vehicle, home ap different objects entrenched with phys sensors, actuators, and property that items to affix additionally to modify o item is unambiguously acknowledgeab embedded ADPS however is in a pos operate at intervals the present web Now days, web of things having huge the field. the web technologies sq primarily employed in all over. Internet of things is meted out of c through on web technology. web sub planned by Kevin Sir Frederick Ashto 1982. During this paper we have a focuses numerous regarding advanc communication between numerous fiel surroundings as on IOT building the device to device communication tec nal of Trend in Scientific Research and De tional Open Access Journal | www.ijtsr 56 - 6470 | Volume - 2 | Issue – 6 | Sep w.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct rity and Privacy in Internet of Lakshmi. R 1 , Mrs. T. Sathiyabama 2 1 III MCA, 2 Assistant Professor pplications, Dr. Sns Rajalakshmi College of Arts Coimbatore, Tamil Nadu, India IOT) has been acy are the key till face some tate this rising w the analysis protection. By the protection necessities are to discuss the together with ation security, tific discipline enges. eads; Security; ges. the system of ppliances and sics, software, modify these over data. each ble through its sition to inter- infrastructure. growth within quare measure communication bject was 1st on as on year a tendency to ced mode of lds for virtual conception of chnology. The wireless communication tec infrastructure for the exchan survey of the all security issu of things additionally as secu top user. The security of the w technologies and steps taken level of security problems with Internet Of Thins in a perspective, the expected pe sensors and devices into pre like the house, the car, and ingestible, even the body – pos IOT THREADS: SECURITY THREADS I Smart home services can attack because service pro security at earlier stage. TRESPASS If the smart door is unauthorized part on sm these attack password o frequently changed, authe applied. MONITORING A INFORMATION LEAKA Lot of sensors are used breaking. If these sensor encryption applied betwee DOS/DDOS Attackers may access sm send bulk messages. The codes to attack devi authentication to block an FALSIFICATION If the smart home comm attacker may changing the evelopment (IJTSRD) rd.com p – Oct 2018 2018 Page: 868 Things s & Science, chnology through web nge of knowledge, and ue taking part in the web urity issue faced by the wireless communication ning for addressing all h IOT. security and privacy ervasive introduction of esently intimate areas – d with wearable’s and ses explicit challenges. IN SMART HOME n be exposed to cyber oviders do not consider effected by codes or mart home. To prevent of smart door should entication, access control AND PERSONAL AGE for monitoring , house hacked by attacker data en gateway and sensors. mart home network by ey also send malicious ices for avoid this unauthorized access. municate with server the e packets gateway. To

Upload: ijtsrd

Post on 17-Aug-2019

5 views

Category:

Education


0 download

DESCRIPTION

In the past decade, Internet of Things IOT has been attention of analysis. Security and privacy are the key problems for IOT applications, and still face some monumental challenges. So as to facilitate this rising domain, we tend to in short review the analysis progress of IoT, and listen to the protection. By suggests that of deeply analyzing the protection design and options, the protection necessities are given. On the idea of those, we tend to discuss the analysis standing of key technologies together with cryptography mechanism, communication security, protective device knowledge and scientific discipline algorithms, and in brief define the challenges. Muthu Lakshmi. R | Mrs. T. Sathiyabama "A Study on Security and Privacy in Internet of Things" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18650.pdf Paper URL: http://www.ijtsrd.com/computer-science/other/18650/a-study-on-security-and-privacy-in-internet-of-things/muthu-lakshmi-r

TRANSCRIPT

Page 1: A Study on Security and Privacy in Internet of Things

International Journal of Trend in

International Open Access Journal

ISSN No: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

A Study on SecurityMuthu Lakshmi.

Department of Computer Applications,

ABSTRACT In the past decade, Internet of Things (IOT)attention of analysis. Security and privacyproblems for IOT applications, and stillmonumental challenges. So as to facilitatedomain, we tend to in short reviewprogress of IoT, and listen to the protection.suggests that of deeply analyzing thedesign and options, the protection necessitiesgiven. On the idea of those, we tend analysis standing of key technologies cryptography mechanism, communicationprotective device knowledge and scientificalgorithms, and in brief define the challenges. Keyword: Internet of things; IOT threads;Issues of security; Privacy; IoT challenges. INTRODUCTION The Internet of things (IoT) is that thephysical devices, vehicle, home appliancesdifferent objects entrenched with physics,sensors, actuators, and property that items to affix additionally to modify overitem is unambiguously acknowledgeableembedded ADPS however is in a positionoperate at intervals the present web Now days, web of things having huge the field. the web technologies squareprimarily employed in all over. Internet of things is meted out of communicationthrough on web technology. web subjectplanned by Kevin Sir Frederick Ashton1982. During this paper we have afocuses numerous regarding advancedcommunication between numerous fieldssurroundings as on IOT building the device to device communication technology.

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal | www.ijtsrd.com

ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Security and Privacy in Internet of

Lakshmi. R1, Mrs. T. Sathiyabama2 1III MCA, 2Assistant Professor

Applications, Dr. Sns Rajalakshmi College of ArtsCoimbatore, Tamil Nadu, India

(IOT) has been privacy are the key

still face some facilitate this rising

review the analysis protection. By the protection necessities are to discuss the together with

communication security, scientific discipline challenges.

threads; Security; challenges.

the system of appliances and

physics, software, modify these over data. each

acknowledgeable through its position to inter-

infrastructure. growth within

square measure

communication subject was 1st

Ashton as on year a tendency to

advanced mode of fields for virtual

conception of technology. The

wireless communication technologyinfrastructure for the exchangesurvey of the all security issueof things additionally as securitytop user. The security of the wirelesstechnologies and steps takenlevel of security problems with Internet Of Thins in a perspective, the expected pervasivesensors and devices into presentlylike the house, the car, andingestible, even the body – poses IOT THREADS: � SECURITY THREADS IN

Smart home services canattack because service providerssecurity at earlier stage.

� TRESPASS If the smart door is unauthorized part on smartthese attack password offrequently changed, authenticationapplied.

� MONITORING ANDINFORMATION LEAKAGELot of sensors are used breaking. If these sensor encryption applied between

� DOS/DDOS Attackers may access smartsend bulk messages. Theycodes to attack devicesauthentication to block an

� FALSIFICATION If the smart home communicateattacker may changing the

Research and Development (IJTSRD)

www.ijtsrd.com

6 | Sep – Oct 2018

Oct 2018 Page: 868

f Things

Arts & Science,

technology through web exchange of knowledge, and

issue taking part in the web security issue faced by the

wireless communication takening for addressing all with IOT.

security and privacy pervasive introduction of

presently intimate areas – and with wearable’s and poses explicit challenges.

IN SMART HOME can be exposed to cyber providers do not consider

effected by codes or smart home. To prevent

of smart door should authentication, access control

AND PERSONAL LEAKAGE

for monitoring , house hacked by attacker data

between gateway and sensors.

smart home network by They also send malicious

devices for avoid this unauthorized access.

communicate with server the the packets gateway. To

Page 2: A Study on Security and Privacy in Internet of Things

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

secure SSL (Secure Socket Layer)applied.

ATTACKS IN LAYER: HARDWARE LAYER Hardware layer is the root of the comand the hardware security system is mobile and desktop and cloud systems. SECURITY FOR HARDWARE: The hardware Trojans are exist in hardware level Trojans malicious componentsinstruction sequence that when triggered,security guarantees. HARDWARE FOR SECURITY: Two properties are hardware security techniques.� A hardware root of trust. � Hardware supported software The hardware is mainly used to store keys. SYSTEM SOFTWARE LAYER: In system software layer firmware OSprivate illegal system application frameworks are processed. The software can be mainly securedtechniques. � Process isolation � Access control � Information flow control � Software updates � Authentication NETWORK LAYER: The network layer is mainly used to with one another. IOT network is multitude of protocols and fixed function ANALYSIS OF DIFFERENT TYPESATTACKS AND POSSIBLE SOLUTIONSThe IOT facing various types of attacksactive attacks and passive attacks. Henceconstraints must applied to prevent malicious attacks. In this different typeslevels of attacks is discussed. � Low-level attack: If an attacker tries

network and his attack is not successful.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Layer) technique

computing system developed for

a chip. The components or

triggered, circumvent

techniques.

cryptographic

OS code and or program

secured by these

communicate marked by a

function devices.

TYPES OF SOLUTIONS

attacks including Hence the security

devices from types of attacks and

tries to attack a successful.

� Medium-level attack: If aneavesdropper is just listeningdont alter the integrity of data.

� High-level attack: If an attackwork and it alters the integritythe data.

� Extremely High-levelintruder/attacker attacks onunauthorized access and operation, making the netsending bulk messages, or

SECURITY � CRIME

The IOT will expand criminalproviding vastly more devicesexploit and multitudes of new Crime-as-a-service allowsfrom a great distance andtraceability.

� CYBER WALFARE This cyber physical systemmanipulate the physical controlled by embedded computer

� EMERGENT BEHAVIOURSThese side effects are feedback relationships.

SECURITY ISSUES SECURITY ISSUE IN WIRELESSNETWORK The operations that are performed� Attacks on secrecy and authentication� Silent attacks on service integrity� Attacks on network availability. DOS ATTACK ON PHYSICALThe physical layer carriedselection and generation of layer is attached mainly through� Jamming � Node tempering DOS ATTACK ON LINK LAYERThe link layer provides detectionand error control. Some of attack take place in this layer are,� Collision � Unfairness � Battery exhaustion

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 869

an attacker/intruder or an listening to the medium but

data. attack is carried on a net-

integrity of data or modifies

level attack: If an on a network by gaining performing an illegal net- work unavailable, jamming network.

criminal uses of Internet by devices for criminals to new protocols.

allows one to commit crimes and protected by poor

system machines has ability to environment that their computer systems.

BEHAVIOURS happened because of

WIRELESS SENSOR

performed in WSN are authentication integrity

availability.

PHYSICAL LAYER out the function of

carrier frequency. This through

LAYER detection of data frame, MAC

the places where DOS are,

Page 3: A Study on Security and Privacy in Internet of Things

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

DOS ATTACK ON THE NETWORKThe main function of network layer is In network layer the DOS attack is happenslayers, � Hello food attack � Homing � Selective forwarding � Sybil � Wormhole SECURITY ISSUES IN RFID RFID is used for exchanging informationmanual work. 1. UNAUTHORIZED TAG DISABLING

Render a RFID tag to malfunction andunder the scan of a tag reader.

2. UNAUTHORIZED TAG CLONINGThe capturing of the identificationOnes the identification informationcompromised then replication ofpossible.

3. UNAUTHORIZED TAG TRACKINGA tag can be traced through reader information. . There is no confidentiality.

4. REPLAY ATTACKS In this the attacker uses a tag’s responsereaders. In replay attacks the communicationbetween the reader and tag is interrupted.

PRIVACY: In this we discuss the privacy impacts things, we discuss the privacy impactsthese data streams enables by IOTchallenges arise from them. � Location data � Audio data � Video data � Digital identity � Vehicles � Other personal data � Ubiquitous sensing PRIVACY CONCERNS OF IOT Privacy can be protected in the deviceduring communication. The privacy of usersdata protection has been concerned bycommunication. PRIVACY IN DEVICE The information may be leaked out inunauthorized manipulation or handling ofsoftware in these devices. In order to provide

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

NETWORK LAYER WSN routing.

happens in these

information without any

DISABLING and misbehave

CLONING identification information.

information of tag is of the tag is

TRACKING they can read

dentiality.

response to rouge communication

interrupted.

of internet of impacts of society of

IOT and grant

device in storage users and their

by their secure

in the case of of hardware or

provide privacy,

protecting the personal informationtheft. This can be achieved byrouting random walk in wireless PRIVACY DURING COMMUNICATIONIn this encryption technologyconfidentiality during pseudonyms can be replaced by PRIVACY IN STORAGE To achieve the real identity withpsudonymization and anonumization PRIVACY IN PROCESSING� It is mainly processed on two

must be rarely collected in� Without the data owner knowledge

should not be accessed by � User permission and their

requirements of data processing. IOT CHALLENGES: The most important challenges� Data privacy � Data security � Insurance concerns � Lack of common standard � Technical concerns � Security concerns DATA PRIVACY Some manufacturers of smarttheir customers to analyze theirdata collected by the smart TVsfor data privacy during transmission. DATA SECURITY Data security is also a greattransmitting data seamlessly, from observing devices on the INSURANCE CONCERNS:The insurance companies in- vehicles collect data about healthorder to take decisions about insurance. LACK OF COMMON STANDARDSince there are many standardsIoT manufacturing industries.challenge to distinguish betweenpermitted devices connected to

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 870

information incase device is by WSN by using multi

wireless device.

COMMUNICATION technology is used to achieve

communication and by encryption.

with the storage of data anonumization could be used.

PROCESSING two things. Personal data

in the intended purpose. knowledge personal data third parties.

their awareness are the processing.

challenges are

smart TVs collect data about their viewing habits so the TVs may have a challenge

transmission.

great challenge. While it is important to hide

the internet.

CONCERNS: stalling IoT devices on

health and driving status in insurance.

STANDARD standards for IoT devices and

industries. Therefore, it is a big between permit- ted and non-

to the internet.

Page 4: A Study on Security and Privacy in Internet of Things

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

A GRANT CHALLENGES OF IOT � A SCIENTIFIC OR TECHNICAL

CHALLENGES The main challenges is calculatetransmission rates predict significantThe general estimation science tohow difficult is to identify an individualdata. The common criteria have defined qualities for privacy preservingmanagement.

� ANONIMITY An individual use of resource withoutidentity.

� PSEUDONYMITY An individual use resource withoutremain accountable for use.

� UNLINK ABILITY An individual make multiple userwithout others being able to link these

� UNOBSERVABILITY An individual may use a resource withoutespecially third parties able to observeresource being used.

CONCLUSION IoT is a scheme of connected physicalsquare measure accessible through the web. This paper is focus on security vulnerabilitiestherefore the challenges featured in IOT.necessities are mentioned during this paper.account the importance of IOT security.to put in security mechanism in IOTcommunication networks. Finally, duringchiefly focus regarding security problemschallenges and conjointly secure IOTvictimization security necessities. mentioned regarding a way to secure thelike hardware, Software, Network,Layers. Consistent with this papermechanism for these layers’s doing developed and in future the safety for ought to developed. During this paperfocuss regarding the privacy of dataeconomical info management and theirmost issue of web of issue is security.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

TECHNICAL

calculate of data significant engineering.

to approximate individual form of

set of privacy preserving identity

without disclosing

without identity but

user of resource these together.

without others, observe that the

physical objects that web.

vulnerabilities and IOT. the safety paper. take into

security. Its important IOT devices and during this paper

problems and their IOT devices by This paper the IOT layers , Application

paper security seem to be these systems

paper the author data in IOT, the their method. The

REFERENCES 1. N. Papernot, “Towards the

and Privacy in Machine Learning,”Research Repository, vol.arxiv.org /abs/1611.03814.

2. J. S. Kumar and D. R. Patel,of things: Security andInternational Journal of Computervol. 90, no. 11, 2014.

3. M. Abomhara and G. M.privacy in the internet ofand open issues,” in PrivacyMobile Systems (PRISMS),Conference on. IEEE, 2014,

4. Sunil Ghildiyal, Amit KumarGupta, Neha Garg, "Analysis(DoS) Attacks in WirelessIJRET: International JournalEngineering and Technology;

5. Burmester, Mike, and Brenosecurity: attacks, countermeasureschallenges." The 5thConvocation, the RFID Journal

6. J. Sen, “A Survey on WirelessSecurity”, InternationalCommunications NetworkSecurity, vol. 1, no. 2, (2009)

7. N. Davies et al., “Privacy Cross the Chasm,” Proc. 17thTopics in Mobile Computing2016, pp. 39–44.

8. A. Cardenas et al., “ChallengesCyber Physical Systems,” Directions in Cyber-PhysicalDept. Homeland chess.eecs.berkeley.edu/pubs/601

9. Mirza Abdur Razzaq “SecurityInternet of Things (IoT):Study” Department of ComputerAbdul Latif University Khairpur,

10. J. Sathish Kumar “A SurveyThings: Security and Privacyof Computer Engineering,

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 871

the Sci- ence of Security Learning,” Com- puting

vol. abs/1611.03814, 2016; /abs/1611.03814.

Patel, “A survey on internet and privacy issues,” Computer Applications,

M. Køien, “Security and of things: Current status Privacy and Security in

(PRISMS), International 2014, pp. 1–8.

Kumar Mishra, Ashish "Analysis of Denial of Service Wireless Sensor Networks"

Journal of Research in Technology;

Breno De Medeiros. "RFID countermeasures and

5th RFID Academic Journal Conference. 2007.

Wireless Sensor network International Journal of

Network and Information (2009) August, pp. 59-82.

Mediators: Helping IoT 17th Int’l Workshop Hot

Computing (Hot Mobile 16),

“Challenges for Securing Proc. Workshop Future

Physical Systems Security, Security, 2009;

chess.eecs.berkeley.edu/pubs/601.html.

“Security Issues in the (IoT): A Comprehensive

Computer Science Shah Khairpur, Pakistan.

Survey on Internet of Privacy Issues “Department

SVNIT.