Security Issues and Challenges in IOT: a Comprehensive Study

  • Authors

    • M Bhargavi
    • Dr M.Nagabhushana Rao
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15700
  • Internet of Things, Security, Challenges, Open Issues.
  • The Internet of Things (IoT) is a revolutionary model, with rising wireless sensor network technology. In IoT network devices are connected and communicated with each other or with human. IoT is extremely available to security assaults. In recent years, the internet of things has a continuous support in research. In the upcoming scenario, IoT will play an important role and changes our day-to-day life, principles as well as industry models. In this paper we provide ensuring security of data exchange, IoT architecture and IoT Security architecture, applications, drawbacks of IoT. We study about various security issues, Problems, normal and Denial of service attacks in different layers, issues and research defy in IoT are also discussed.

     

     

     

  • References

    1. [1] Evans, D. (2011). The Internet of Things:Howthe next evolution of the internet is changing everything. CISCO White Paper, 1(2011), 1–11.

      [2] Khan, R., Khan, S.U., Zaheer, R. and Khan, S. (2012) Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges. 10th International Conference on Frontiers of Information Technology, December 2012, 257-260. http://dx.doi.org/10.1109/fit.2012.53

      [2]

      [3] Tan, N. and Wang, N. (2010) Future Internet: The Internet of Things. 3rd International Conference onAdvanced Computer Theory and Engineering, August 2010.

      [4] Wu, M., Lu, T., Ling, F., Sun, J. and Du, H. (2010) Research on the Architecture of Internet of Things.3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), August 2010.

      [5] Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, Imrich Chlamtac (2012)

      [6] †Internet of things: Vision, applications and research challengesâ€, in Adhoc networks. ScienceDirect, 2012, pp 1497-1516.

      [7] Soumyalatha, Shruti G Hegde, “Study of IoT: Understanding IoT Architecture, Applications, Issues and Challengesâ€, in international journal of advanced networking and applications.

      [8] Sundmaeker, H., Guillemin, P., Friess, P., & Woelffle, S. (2010). Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commision.

      [9] Mitchell, S., Villa, N., Stewart-Weeks, M., & Lange, A. (2013). The Internet of everything for cities: connecting people, process, data and things to improve the livability of cities and communities.

      [10] Zheng, L., Zhang, H., Han, W., Zhou, X., He, J., Zhang, Z., & Wang, J. (2011). Technologies, applications,and governance in the internet of things. Internet of Things-Global technological and societal trends. From smart environments and spaces to green ICT.

      [11] S. Capkun, L. Buttyan, and J. P. Hubaux. Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1):52–64, January 2003.

      [12] M. C. Chuang and J. F. Lee. Team: Trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Systems Journal, 8(3):749–758, September 2014.

      [13] S. U. Maheswari, N. S. Usha, E. A. M. Anita, and K. R. Devi. A novel robust routing protocol raeed to avoid dos attacks in wsn. In Proc. of 2016 International Conference on Information Communication and Embedded Systems (ICICES), February 2016.

      [14] X. Yang, J. Lin, W. Yu, P. M. Moulema, X. Fu, and W. Zhao. A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. IEEE Transactions on Computers, 64(1):4–18, January 2015.

      [15] Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of internet of things. arXiv preprint arXiv:1501.02211.

      [16] Garcia-Morchon, O., Kumar, S., Struik, R., Keoh, S., & Hummen, R. (2013). Security Considerations in the IPbased Internet of Things.

      [17] Verissimo, P., & Rodrigues, L. (2001). Fundamental security concepts. InDistributed Systems for System Architects, Springer US. (pp. 377-393).

      [18] Babar, S., Stango, A., Prasad, N., Sen, J., & Prasad, R. (2011). Proposed embedded security framework for internet of things (iot). In Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on (pp. 1-5). IEEE.

      [19] Shancang Li, Kewang Zhang. : Principle and application of wireless sensor network. M. Beijing: China Machine Press (2008)

      [20] Xueguang Yang, Fengjiao Li, Xiangyong Mu, etc.: Design of security and defense system for home based on Internet of things. J. computer application. 30(12):300-318 (2010)

      [21] Antonio J. Jara, Miguel A. Zamora, Antonio F. G. Skarmeta. : HWSN6 Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management. C. In:International Conference on Computational Science and Engineering, 879-884 (2009)

      [22] http://sensors-and-networks.blogspot.in/2011/08 /physical-layer-for-wireless-sensor.html

      [23] Ahmad Abed Alhameed Alkhatib, and Gurvinder Singh Baicher. "Wireless sensor network architecture." International conference on computer networks and communication systems (CNCS 2012) IPCSIT. Vol. 35. 2012, pp. 11-15.

      [24] Sunil Ghildiyal, Amit Kumar Mishra, Ashish Gupta, Neha Garg, "Analysis of Denial of Service (DoS) Attacks in Wireless Sensor Networks" IJRET: International Journal of Research in Engineering and Technology; eISSN: 2319-1163 | pISSN: 2321-7308

      [25] Al-Sakib Khan Pathan, "Denial of Service in Wireless Sensor Networks: Issues and Challenges", Advances in Communications and Media Research, Vol. 6 (Edited by Anthony V. Stavros), ISBN: 978-1-60876-576-8, Nova Science Publishers, Inc., USA, 2010.

      [26] Mukrimah Nawir , Amiza Amir , Naimah Yaakob , Ong Bi Lynn, “Internet of Things (IoT): Taxonomy of Security Attacksâ€, 2016 3rd International Conference on Electronic Design (ICED), August 11-12, 2016, Phuket, Thailand.

      [27] Mirza Abdur Razzaq, Muhammad Ali Qureshi, Sajid Habib Gill, Saleem Ullah, “Security Issues in the Internet of Things (IoT): AComprehensive Studyâ€, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 6, 2017, pp 383-389

      [28] Ning, H. Liu, and L. T. Yang, “Cyberentity security in the internet of things,†Computer, vol. 46, no. 4, pp. 46–53, 2013.

      [29] Christof paar,ndre weimerskirch,â€embedded security in a pervasive worldâ€, information security technical report,2007- Elsevier, volume 12,issue 3, 2007,pages 155-161.

      [30] Matthew eby, jan Werner,gabor karsai, akos ledeczi,â€embedded systems security co-designâ€, april 2007, SIGBED Review,volume4 issue 2, publisher: ACM

      [31] Stankovic, J.A.: Research Directions for the Internet of Things. IEEE Internet of Things Journal. 1, 3-9 (2014)

      [32] Internet of things Top Ten, https://www.owasp.org/images/7/71/Internet_of_Things_ Top_Ten_2014-OWASP.pdf

      [33] Granjal, J., Monterio, E., Silva, J. S.: Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutorials. 17, 1294-1312 (2015)

      [34] European Union Agency for Network and Information Security.: Major DDoS attacks involving IoT devices. (2016)

      [35] Sonar, K., Upadhyay, H.: A Survey: DDoS Attack on Internet of Things. Int. J. Engg. Research and Development. 10,58-63. (2014)

      [36] Qi Jing,Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, Dechao Qiu, “Security of the Internet of Things: perspectives and challengesâ€, wireless networks (2014) published:springer

      [37] Otmane El Mouaatamid, Mohammed Lahmer, Mostafa Belkasmi “Internet of Things Security: Layered classification of attacks and possible Countermeasures†e-TI – Numéro 9 – 2016 – http://www.revue-eti.net – ISSN 1114-8802

  • Downloads

  • How to Cite

    Bhargavi, M., & M.Nagabhushana Rao, D. (2018). Security Issues and Challenges in IOT: a Comprehensive Study. International Journal of Engineering & Technology, 7(2.32), 298-306. https://doi.org/10.14419/ijet.v7i2.32.15700