Вы находитесь на странице: 1из 4

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal | www.ijtsrd.com

ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep – Oct 2018

A Study on Security and Privacy in Internet off Things


Muthu Lakshmi. R1, Mrs. T. Sathiyabama2
1
III MCA, 2Assistant Professor
Department of Computer Applications, Dr. Sns Rajalakshmi College of Arts & Science,
Coimbatore, Tamil Nadu, India

ABSTRACT
In the past decade, Internet of Things (IOT) has been wireless communication technology through web
attention of analysis. Security and privacy are the key infrastructure for the exchange of knowledge, and
problems for IOT applications, and still face some survey of the all security issue taking part in the web
monumental challenges. So as to facilitate this rising of things additionally as security issue faced by the
domain, we tend to in short review the analysis top user. The security of the wireless communication
progress of IoT, and listen to the protection. By technologies and steps takening
taken for addressing all
suggests that of deeply analyzing the protection level of security problems with IOT.
design and options, the protection necessities are
given. On the idea of those, we tend to discuss the Internet Of Thins in a security and privacy
analysis standing of key technologies together with perspective, the expected pervasive introduction of
cryptography mechanism, communication security, sensors and devices into presently intimate areas –
protective device knowledge and scientific discipline like the house, the car, and with wearable’s and
algorithms, and in brief define the challenges. ingestible, even the body – poses explicit challenges.

Keyword: Internet of things; IOT threads; Security; IOT THREADS:


Issues of security; Privacy; IoT challenges.  SECURITY THREADS IN SMART HOME
Smart home services can be exposed to cyber
INTRODUCTION attack because service providers do not consider
The Internet of things (IoT) is that the system of security at earlier stage.
physical devices, vehicle, home appliances and  TRESPASS
different objects entrenched with physics, software, If the smart door is effected by codes or
sensors, actuators, and property that modify these unauthorized part on smart home. To prevent
items to affix additionally to modify over data. each these attack password of smart door should
item is unambiguously acknowledgeable through its frequently changed, authentication,
authentication access control
embedded ADPS however is in a position to inter- applied.
operate at intervals the present web infrastructure.  MONITORING AND PERSONAL
Now days, web of things having huge growth within INFORMATION LEAKAGE
the field. the web technologies square measure Lot of sensors are used for monitoring , house
primarily employed in all over. breaking. If these sensor hacked by attacker data
encryption applied between gateway and sensors.
Internet of things is meted out of communication  DOS/DDOS
through on web technology. web subject was 1st Attackers may access smart home network by
planned by Kevin Sir Frederick Ashton as on year send bulk messages. They also send malicious
1982. During this paper we have a tendency to codes to attack devices for avoid this
focuses numerous regarding advanced mode of authentication to block an unauthorized access.
communication between numerous fields for virtual  FALSIFICATION
surroundings as on IOT building the conception of If the smart home communicate with server the
device to device communication technology. The attacker may changing the packets gateway. To

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct


Oct 2018 Page: 868
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
2456
secure SSL (Secure Socket Layer) technique  Medium-level attack: If an attacker/intruder or an
applied. eavesdropper is just listening to the medium but
dont alter the integrity of data.
ATTACKS IN LAYER:  High-level attack: If an attack is carried on a net-
HARDWARE LAYER work and it alters the integrity of data or modifies
Hardware layer is the root of the com
computing system the data.
and the hardware security system is developed for  Extremely High-level
level attack: If an
mobile and desktop and cloud systems. intruder/attacker attacks on a network by gaining
unauthorized access and performing an illegal
SECURITY FOR HARDWARE: operation, making the net- net work unavailable,
The hardware Trojans are exist in a chip. The sending bulk messages, or jamming network.
hardware level Trojans malicious components or
instruction sequence that when triggered, circumvent SECURITY
security guarantees.  CRIME
The IOT will expand criminal uses of Internet by
HARDWARE FOR SECURITY: providing vastly more devices for criminals to
Two properties are hardware security techniques. exploit and multitudes of new protocols.
 A hardware root of trust.
 Hardware supported software Crime-as-a-service allows one to commit crimes
from a great distance and protected by poor
The hardware is mainly used to store cryptographic traceability.
keys.  CYBER WALFARE
This cyber physical system machines has ability to
SYSTEM SOFTWARE LAYER: manipulate the physical environment that their
In system software layer firmware OS code and controlled by embedded computer systems.
private illegal system application or program  EMERGENT BEHAVIOURS
frameworks are processed. These side effects are happened because of
feedback relationships.
The software can be mainly secured by these
techniques. SECURITY ISSUES
 Process isolation SECURITY ISSUE IN WIRELESS SENSOR
 Access control NETWORK
 Information flow control The operations that are performed in WSN are
 Software updates  Attacks on secrecy and authentication
 Authentication  Silent attacks on service integrity
 Attacks on network availability.
NETWORK LAYER:
The network layer is mainly used to communicate DOS ATTACK ON PHYSICAL LAYER
with one another. IOT network is marked by a The physical layer carried out the function of
multitude of protocols and fixed function devices. selection and generation of carrier frequency. This
layer is attached mainly through
ANALYSIS OF DIFFERENT TYPES OF  Jamming
ATTACKS AND POSSIBLE SOLUTIONS  Node tempering
The IOT facing various types of attacks including
active attacks and passive attacks. Hence the security DOS ATTACK ON LINK LAYER
constraints must applied to prevent devices from The link layer provides detection of data frame, MAC
malicious attacks. In this different types of attacks and and error control. Some of the places where DOS
levels of attacks is discussed. attack take place in this layer are,
 Low-level attack: If an attacker tries to attack a  Collision
network and his attack is not successful.  Unfairness
 Battery exhaustion

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct


Oct 2018 Page: 869
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
2456
DOS ATTACK ON THE NETWORK LAYER protecting the personal information incase device is
The main function of network layer is WSN routing. theft. This can be achieved by WSN by using multi
In network layer the DOS attack is happens in these routing random walk in wireless device.
layers,
 Hello food attack PRIVACY DURING COMMUNICATION
 Homing In this encryption technology is used to achieve
 Selective forwarding confidentiality during communication and
 Sybil pseudonyms can be replaced by encryption.
 Wormhole
PRIVACY IN STORAGE
SECURITY ISSUES IN RFID To achieve the real identity with the storage of data
RFID is used for exchanging information without any psudonymization and anonumization could be used.
manual work.
1. UNAUTHORIZED TAG DISABLING PRIVACY IN PROCESSING
Render a RFID tag to malfunction and misbehave  It is mainly processed on two things. Personal data
under the scan of a tag reader. must be rarely collected in the intended purpose.
2. UNAUTHORIZED TAG CLONING  Without the data owner knowledge personal data
The capturing of the identification information. should not be accessed by third parties.
Ones the identification information of tag is  User permission and their awareness are the
compromised then replication of the tag is requirements of data processing.
possible.
3. UNAUTHORIZED TAG TRACKING IOT CHALLENGES:
A tag can be traced through reader they can read The most important challenges are
information. . There is no confidentiality.
dentiality.  Data privacy
4. REPLAY ATTACKS  Data security
In this the attacker uses a tag’s response to rouge  Insurance concerns
readers. In replay attacks the communication  Lack of common standard
between the reader and tag is interrupted.  Technical concerns
 Security concerns
PRIVACY:
In this we discuss the privacy impacts of internet of DATA PRIVACY
things, we discuss the privacy impacts of society of Some manufacturers of smart TVs collect data about
these data streams enables by IOT and grant their customers to analyze their viewing habits so the
challenges arise from them. data collected by the smart TVs may have a challenge
 Location data for data privacy during transmission.
 Audio data
 Video data DATA SECURITY
 Digital identity Data security is also a great challenge. While
 Vehicles transmitting data seamlessly, it is important to hide
 Other personal data from observing devices on the internet.
 Ubiquitous sensing
INSURANCE CONCERNS:
PRIVACY CONCERNS OF IOT The insurance companies in- stalling IoT devices on
Privacy can be protected in the device in storage vehicles collect data about health and driving status in
during communication. The privacy of users and their order to take decisions about insurance.
data protection has been concerned by their secure
communication. LACK OF COMMON STANDARD
Since there are many standards for IoT devices and
PRIVACY IN DEVICE IoT manufacturing industries. Therefore, it is a big
The information may be leaked out in the case of challenge to distinguish between permit- ted and non-
unauthorized manipulation or handling of hardware or permitted devices connected to the internet.
software in these devices. In order to provide privacy,

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct


Oct 2018 Page: 870
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
2456
A GRANT CHALLENGES OF IOT REFERENCES
 A SCIENTIFIC OR TECHNICAL 1. N. Papernot, “Towards the Sci- ence of Security
CHALLENGES and Privacy in Machine Learning,” Com- puting
The main challenges is calculate of data Research Repository, vol. abs/1611.03814, 2016;
transmission rates predict significant engineering. arxiv.org /abs/1611.03814.
The general estimation science to approximate
2. J. S. Kumar and D. R. Patel, “A survey on internet
how difficult is to identify an individual form of of things: Security and privacy issues,”
data.
International Journal of Computer Applications,
vol. 90, no. 11, 2014.
The common criteria have defined set of privacy
qualities for privacy preserving identity 3. M. Abomhara and G. M. Køien, “Security and
management. privacy in the internet of things: Current status
 ANONIMITY and open issues,” in Privacy and Security in
An individual use of resource without disclosing Mobile Systems (PRISMS), International
identity. Conference on. IEEE, 2014, pp. 1–8.
 PSEUDONYMITY 4. Sunil Ghildiyal, Amit Kumar Mishra, Ashish
An individual use resource without identity but Gupta, Neha Garg, "Analysis of Denial of Service
remain accountable for use. (DoS) Attacks in Wireless Sensor Networks"
 UNLINK ABILITY IJRET: International Journal of Research in
An individual make multiple user of resource Engineering and Technology;
without others being able to link these together.
 UNOBSERVABILITY 5. Burmester, Mike, and Breno De Medeiros. "RFID
An individual may use a resource without others, security: attacks, countermeasures and
especially third parties able to observe that the challenges." The 5th RFID Academic
resource being used. Convocation, the RFID Journal Conference. 2007.
6. J. Sen, “A Survey on Wireless Sensor network
CONCLUSION Security”, International Journal of
IoT is a scheme of connected physical objects that Communications Network and Information
square measure accessible through the web. Security, vol. 1, no. 2, (2009) August, pp. 59-82.

This paper is focus on security vulnerabilities and 7. N. Davies et al., “Privacy Mediators: Helping IoT
therefore the challenges featured in IOT. the safety Cross the Chasm,” Proc. 17th Int’l Workshop Hot
necessities are mentioned during this paper. take into Topics in Mobile Computing (Hot Mobile 16),
account the importance of IOT security. Its important 2016, pp. 39–44.
to put in security mechanism in IOT devices and 8. A. Cardenas et al., “Challenges for Securing
communication networks. Finally, during this paper Cyber Physical Systems,” Proc. Workshop Future
chiefly focus regarding security problems and their Directions in Cyber-Physical
Physical Systems Security,
challenges and conjointly secure IOT devices by Dept. Homeland Security, 2009;
victimization security necessities. This paper chess.eecs.berkeley.edu/pubs/601.html.
chess.eecs.berkeley.edu/pubs/601
mentioned regarding a way to secure the IOT layers
9. Mirza Abdur Razzaq “Security Issues in the
like hardware, Software, Network,, Application
Internet of Things (IoT): A Comprehensive
Layers. Consistent with this paper security
Study” Department of Computer Science Shah
mechanism for these layers’s doing seem to be
Abdul Latif University Khairpur, Pakistan.
developed and in future the safety for these systems
ought to developed. During this paper the author 10. J. Sathish Kumar “A Survey on Internet of
focuss regarding the privacy of data in IOT, the Things: Security and Privacy Issues “Department
economical info management and their method. The of Computer Engineering, SVNIT.
most issue of web of issue is security.

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct


Oct 2018 Page: 871