A Survey: Security Concern in Internet of Things
Please Fill Your Details
Abstract –Among the foremost intriguing techniques aimed
at improv …
Preview text
A Survey: Security Concern in Internet of Things
Please Fill Your Details
Abstract –Among the foremost intriguing techniques aimed
at improving human health and wellbeing is the Internet of
Things (QoL). Health, automotive sectors, farming, schooling,
and numerous cross-cutting enterprise sectors all benefit from
the Internet of Things. Since the functioning processes of IoT
applications differ owing tothe diversity ofIoT settings, resolving
and assessing IoT security vulnerabilities iscritical. As aresult,
addressing IoT security concerns as well as existing and
prospective solutions are designed to help programmers and
businesses find suitable and responsive answers to particular
dangers, resulting in the finest IoT-based products imaginable.
This article examines IoT security concerns, constraints,
demands, and present and future remedies in depth. The study
uses aclassification based on the three-layer Architectures as a
starting point for identifying security attributes and objectives
for every level. The survey’s major contribution isastructural
classification ofprospective IoT security threats and issues.
Index Terms – Internet Of Things, Survey, IoT Threats, IoT
Solutions, Application Layer, Network Layer
I. INTRODUCTION
The old Internet laid the way for the development of Internet
of Things by combining the actual and digital worlds (IoT).
The Internet of Things (IoT) is envisioned as anetworking
concept that bridges the cyber and physical worlds [1]. Human
contact is minimal in an IoT environment; thus, the risks of
human mistake are minimal too though, that can aid in
enhancing efficiency in numerous applications wherein
individuals are unable to function well and machines can do
far more. IoT is now becoming abasic human requirement,
and in the near comings, this will be as necessary for
everybody as water is for respiration to take place. The
Internet of Things’ main premise is to link the ubiquitous
things surrounding, including such RFID tags, mobile devices,
detectors, and actuators, to the Internet via aconnected or
wireless connection. As aresult, the items can communicate
with one another and their neighbors to improve the system ‘s
effectiveness [1]. Itis considered that acomplete analysis of
IoT priority sectors and difficulties will offer an integrative
viewpoint of the IoT and operate as astorehouse for the
acquired information, given that the IoT is atransformative
new innovation which isalso incredibly essential [2]. Defining
the IoT layers and components to characterize the different
IoT architecture depending on the necessary applications and
attributes. For IoT contexts, various topologies have been
suggested. These structures are usually divided into three
categories.
A. APPLICATION LAYER
Despite the lack of a complete standards for the IoT
application layer, it can deliver a variety of functions in
various scenarios. Smart cities & homes [5], smart grids [6],
hospitals [7], and automated vehicles [8] are examples of IoT
applications. Because the application layer additionally can
serve as gateway [14], acommunications interface, and cloud
computers for support team, safety concerns will vary
depending on the user’s location and business. Various
elements are specified in the application-level design, as
shown in Figure 1, but every device’s actions are dependent on
the atmosphere’s applications.
B. NETWORK LAYER
Data transfer between levels isregulated at the network level.
This level also enables connectivity to the perceptual layer via
various technologies and methods such as IEEE 802.x, GPS,
and Near-Field Communication (NFC) (NFC). This level is
additionally supported by a cloud back-end architecture,
portable devices, as well as the Internet protocol [21], as seen
in Figure 2. Furthermore, depending on the application
context, the network layer could be handled in various ways.
Block-chain technologies, Intelligent Intrusion Prevention
Systems, and access control and encrypting structures are the
most popular safety mechanisms in the network level of IoT
systems.
C. EDGE LAYER
End-users (cloud-edge) IoT systems can communicate with
both the client or respective functioning realms, such as
sensors, smart meters, or the IoT edge level hosts of a
gateways that serves as the functioning domain’s coordinators.
The architectural accessibility of the edge-layer in the IoT
design makes itvulnerable to avariety of threats. Multi-factor
identification, end-point anti-malware, secured channeling,
and machine learning-based methods for intrusion detection in
cloud-edge gadgets are among the most prevalent security
mechanisms used atthis tier.
II. SECURITY CONCERNS
Within IoT contexts, the disrupting use of IoT gadgets
combined with rising computing capabilities in various
applications areas has resulted in awide spectrum of risks [9].
These flaws can result in fatal breakdowns and data loss
across multiple domains. As a result, the security of IoT
settings has become atrending topic, attracting the interest of
the scientific industry. In terms of security, there really are
various risks linked for each level of IoT architecture,
irrespective of the infrastructure of something like the IoT
settings. To avoid, identify, and mitigate for an assault, every
threat requires asuitable security solution. As aresult of the
top-down method information theft, malware dissemination,
and botnet attacks on internet services are common security
concerns in the application level. Assailants in IoT systems
can take advantage of weaknesses in standards and
frameworks atthe network layer [9]. The much more common
riskier factors in regulations and frameworks are denial of
service (DoS), account hijacking, and fraud. Malfunctioning,
lack of effective authentication and authorization, improper
data access management, cybersecurity, [10] and information
privacy invasion are all common security concerns and
weaknesses in cloud computing elements of IoT. The edge-
layer confronts avariety of dangers, such as node sabotage,
hardware failures, node detachment, asynchronous knowledge
congregating, untrue node text bribery, tiredness, Sybil,
jamming, tampering, and impact forces, due to the dependable
place of linked gadgets in an IoT ecosystem and limited
simulation assets [9].
III. IOT SECURITY REQUIREMENTS
IoT surroundings and associated aspects pose anumber of
security concerns among IoT users. Most IoT ecosystems have
similar attributes that can be described in terms of mobility,
wireless communication, embedded use, diversity of the
components and the scalability of the devices. In terms of
mobility, it is evident that every IoT related devices are
applied followed by the mobile pattern and also are linked to
the Internet via abroader range of suppliers [8]. Nevertheless,
the IoT devices are cohesively interconnected with the Internet
through aprologue of wireless links, incorporating Bluetooth
connectivity, WiMAX, Zigbee and more. Revealing the
wireless signals within the frequency of the public-eye has
also raised significant number of security concerns in recent
times. The majority of IoT devices have asingle purpose. As a
result, [9] trend recognition in data transfer is commonly
encountered in aspecial manner and could be regarded a
possible weakness. Inside the IoT, there really are numerous
discrepancies in regards of linked device type and architecture.
Even some of the most basic gadgets must be accommodated
in security design. The quantity of connected gadgets is
rapidly increasing, and IoT customers are unable to control the
privacy of their own information as itis processed by these
sensors.
IV. IOT SECURITY AND PRIVACY
CHALLENGES
IoT presents aslew of security considerations, owing to its
features and the commercialized component of many domain
applications [10]. Every challenging issue can affect any or
even more levels of the IoT infrastructure, necessitating
regular maintenance. The variety of IoT devices in respect of
functions, for instance, can pose cyber threats [11].
Vulnerability identification is required as a continuous
surveillance in the IoT environment depending on its specified
usage due to the great variety of linked gadgets and its related
communication methods [12]. Customer critical information
security and confidence requires not only a data security
system to safeguard the IoT environment from the outside
intruders, but also a complete system to defend the IoT
platform from within dangers. Sicari et al. [13] offered
researching issues and solutions in IoT security centered on
eight categories of primary security considerations. The
centralized and decentralized infrastructure isamong the most
prominent one creating obstacles in establishing the IoT
environment. As in IoT setting, Roman et al. [14] did some
research on centralized and decentralized techniques. They
presented an assailant paradigm that could be used in either
centralized and decentralized IoT systems, and itlooked at the
biggest barriers and potential answers in security mechanism
development and implementation. Existing and evolving
protocols constantly price their creators in terms of security.
Although such methods might provide a basic protective
measure, the majority of their fundamental processes are
poorly designed or turned off. Because IoT gadgets and
associated back-end systems are so interconnected, adversaries
have additional opportunity to distribute harmful files over the
network. Because the Internet of Things encompasses a
diverse variety of gadgets and features, from tiny embedded
processing units to big high-end cloud storage, itmust handle
security problems at multiple levels. Every application-based
(i.e., software, software, connectors, etc.), network-based (i.e.
cloud back-end, specifications, conventions, etc.), and device-
based (i.e. hardware objects, cloud portals, and so on.)
elements of this architecture confront security considerations.
The security problems in the application level of IoT put the
new clients in aquandary over how or not to adopt IoT
services in their workplaces. Luckily, numerous studies have
been conducted to address the most frequent security concerns
in this layer.
V. IOT VULNERABILITIES
Whilst fundamental IoT levels are the source of the issues,
vulnerabilities are sometimes not linked to them. When
considering IoT threats, there are numerous more factors to
consider. With comprehensive research and polls, the Open
Web Application Security Project (OWASP) has determined
the top ten weaknesses of IoT [3]. The following paragraph
delves into them.
A) Insecure Web Interface -Because not every client of
aweb -based system istechnologically minded, they
want agraphical user interface that allows users to
easily control and alter instructions to their
satisfaction. Today, everyone uses smart gadgets,
necessitating the adoption of simple layouts. As a
result, practically all intelligent technologies, along
with all IoT devices, have them. However, online
interface privacy has long been asource of worry, as
the tech sector continues to strive to assure web
interface security.
B) Insufficient Authentication or Authorization –
Authentication is a feature that all smart gadgets
possess in order to guarantee authorized access.
However, inadequate or insufficient identification
passwords endanger these gadgets as well as their
users. People tend to use passwords that are easy to
remember, such as 123456, qwerty, passwords, and
so on. [15] [16], respectively. Intruders can simply
get access to their networks, exposing all of their
data. This might jeopardize both the computer and
the user profiles, preventing additional entry.
Individuals and identities can be infiltrated, as well as
their information being taken and used in forgeries,
from abusiness standpoint.
C) Privacy Concerns -IoT devices often request or want
information that isn’t strictly necessary in need for the
gadget to function. Furthermore, the majority of the
data is not encrypted. Identification and data fraud
are on the rise in this fashion. This could lead to the
compromising of users’ personal information,
resulting in personal assaults.
D) Insecure Cloud Interface -Due to its ubiquity and
affordability, cloud is regarded one of the best
solutions for IoT information management.
Nevertheless, if data transportation is not properly
protected, it might have disastrous repercussions. It
may jeopardize user information and cause aloss of
system control. Gaining control of gadgets can lead
to significant destruction of management of the entire
IoT network.
VI. CONCLUSION
In recent years, IoT technology has advanced at abreakneck
pace. Nevertheless, rising protection worries, which may be
divided into privacy concerns and unlawful accessibility to
individual data in general, are holding itback. The notion of
IoT has indeed been examined in this article from various
perspectives, including merits, cons, worries, and weaknesses.
Focusing on the privacy attributes of the general IoT
ecosystem in a three-layer organizational framework, we
performed acomplete survey on IoT safety needs, problems,
and answers in this article. In contrast to outlining all
conceivable weaknesses and safety concerns associated with
IoT, the study also recommended various security and privacy
precautions. Nevertheless, at this moment, the
recommendations and proposals are provided in ahigh-level
framework and only take into account conceptual elements.
VII. REFERENCES
[1] Nauman, A., Qadri, Y.A., Amjad, M., Zikria, Y.B., Afzal,
M.K. and Kim, S.W., 2020. Multimedia Internet of Things: A
comprehensive survey. IEEE Access ,8,pp.8202-8250.
[2] Nord, J.H., Koohang, A. and Paliszkiewicz, J., 2019. The
Internet of Things: Review and theoretical framework. Expert
Systems with Applications ,133 ,pp.97-108.
[3] OWASP, Top Ten Vulnerabilities of IoT. [Online].
Available: https:
//www.owasp.org/index.php/TopIoTVulnerabilities
[4] N. Binti AKamaludeen, S. P. Lee, and R. M. Parizi,
“Guideline-based approach for iot home application
development, â€in 2019 International Conference on Internet of
Things (iThings) and IEEE Green Computing and
Communications (GreenCom) and IEEE Cyber, Physical and
Social Computing (CPSCom) and IEEE Smart Data
(SmartData), pp. 929 –936, 2019.
[5] J.Sakhnini, H. Karimipour, A. Dehghantanha, R. M.
Parizi, and G. Srivastava, “Security aspects of internet of
things aided smart grids: Abibliometric survey, â€Internet of
Things, p.100111, 2019.
[6] T. M. Behera, S. K. Mohapatra, U. C. Samal, M. S. Khan,
M. Daneshmand, and A. H. Gandomi, “Residual energy-based
cluster-head selection in wsns for iot application, â€IEEE
Internet of Things Journal, vol. 6, pp. 5132 –5139, June 2019.
[7] G. Srivastava, R. M. Parizi, A. Dehghantanha, and K.-K.
R. Choo, “Data sharing and privacy for patient iot devices
using blockchain, â€in The 7th International Conference on
Smart City and Informatization (iSCI 2019), pp. 1–15, 2019
[8] A. Paranjothi, U. Tanik, Y. Wang, and M. S. Khan,
“Hybrid-vehfog: Arobust approach for reliable dissemination
of critical messages in connected vehicles, â€Transactions on
Emerging Telecommunications Technologies, vol. 30, no. 6,
p.e3595, 2019.
[9] A. Tewari and B. Gupta, “Security, privacy and trust of
different layers in internet-of-things (iots) framework, â€Future
Generation Computer Systems, vol. 108, pp. 909 –920, 2020
[10] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog
Computing for the Internet of Things: Security and Privacy
Issues, â€IEEE Internet Computing, vol. 21, pp. 34 –42, Mar.
2017.
[11] Y. Lu and L. Da Xu, “Internet of things (iot)
cybersecurity research: Areview of current research topics, â€
IEEE Internet of Things Journal, vol. 6,no. 2,pp. 2103 –2115,
2018.
[12] W.-C. Chien, C.-F. Lai, H.-H. Cho, and H.-C. Chao, “A
SDN-SFC-Based Service-Oriented Load Balancing for the IoT
Applications, â€Journal of Network and Computer
Applications, vol. 114, pp. 88–97, July 2018.
[13] P. Gope and B. Sikdar, “Lightweight and privacy-
preserving two-factor authentication scheme for iot devices, â€
IEEE Internet of Things Journal, vol. 6,no. 1,pp. 580 –589,
2019.
[14] A. Tewari and B. Gupta, “Alightweight mutual
authentication protocol based on elliptic curve cryptography
for IoT devices, â€International Journal of Advanced
Intelligence Paradigms, vol. 9, no. 2-3, pp. 111 –121, 2017.
[15] M. A. Razzaq, S. H. Gill, M. A. Qureshi, and S. Ullah,
“Security issues in the internet of things (iot): A
comprehensive study, â€International Journal of Advanced
Computer Science and Applications, vol. 8,no. 6,2017.
[16] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “Asurvey
on security and privacy issues in internet-of-things, â€IEEE
Internet of Things Journal, vol. 4, no. 5,pp. 1250 –1258, 2017.