Security Issues in IoT

Authors

  • Afreen Fatima Mohammed  Department of IT Stanley College of Engineering & Technology, Hyderabad, Telangana, India

Keywords:

Malware attacks, Sniffing, Spoofing, Cross-site scripting, Botnet enslaving, Encryption, Data Leakage

Abstract

The Internet of things (IoT) is the network of various interconnected physical devices, vehicles, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to collect and exchange data. It connects devices embedded in various systems to the internet. When devices/objects can represent themselves digitally, they can be controlled or accessed from anywhere. The connectivity then helps to capture more data from more places, ensuring more ways of increasing efficiency and improving safety and IoT security. Data privacy, confidentiality, data integrity is at potential risk when these devices are connected. As more and more IoT devices are coming in the market, securing IoT systems represents a number of challenges. This paper discusses about various vulnerabilities and threats against IoT and what actions could be taken to provide a more secure IoT.

References

  1. www.networkworld.com/article/3166106/internet-of-things/4-critical-security-challenges-facing-iot.html
  2. https://heimdalsecurity.com/blog/internet-of-things-security/
  3. Muhammad Usman , Irfan Ahmed† , M. Imran Aslam† , Shujaat Khan and Usman Ali Sha ,"SIT: A Lightweight Encryption Algorithm for Secure Internet of Things",IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 1, 2017
  4. R. Want and S. Dustdar, "Activating the internet of things [guest editors’ introduction]," Computer, vol. 48, no. 9, pp. 16–20, 2015.
  5. T. Karygiannis, B. Eydt, G. Barber, L. Bunn, and T. Phillips, "Guidelines for securing radio frequency identification (rfid) systems," NIST Special publication, vol. 80, pp. 1–154, 2007.
  6. M. A. Simplicio Jr, M. V. Silva, R. C. Alves, and T. K. Shibata, "Lightweight and escrow-less authenticated key agreement for the internet of things," Computer Communications, 2016.
  7. L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
  8. F. Xie and H. Chen, "An efficient and robust data integrity verification algorithm based on context sensitive," way, vol. 10, no. 4, 2016.
  9. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of things (iot): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013.
  10. S. Wang, Z. Zhang, Z. Ye, X. Wang, X. Lin, and S. Chen, "Application of environmental internet of things on water quality management of urban scenic river," International Journal of Sustainable Development & World Ecology, vol. 20, no. 3, pp. 216–222, 2013.
  11. http://iotdesign.embedded-computing.com

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Afreen Fatima Mohammed, " Security Issues in IoT, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 8, pp.933-940, November-December-2017.