Example: confidence

Internet of Things (IoT) Security: Issues, Challenges and ...

International Journal of Scientific & Engineering Research Volume 12, Issue 6, June-2021 52. ISSN 2229-5518. Internet of Things (IoT) Security: Issues, Challenges and Solutions. *. Saira Afzal1, Abdullah Faisal1,2, Imran Siddique2 ,Mariam Afzal3. 1. Department of Information Technology, Lahore Leads University, Lahore (Pakistan). 2. Department of Computer Science, Afro Asian Institute, Lahore (Pakistan). 3 University of Narowal, Punjab, (Pakistan). *Corresponding Author: only in its early stages, both consumers and suppliers are looking for the best options. Abstract--The Internet of Things Malware threats and system hijacking, poor (IoT) paradigm envisions a world in which consumer knowledge due to a lack billions of interconnected objects are of understanding, a lack of official patches, equipped with artificial intelligence, Internet IJSER.

Fig. 2: Azure IoT Security Architecture A. IoT Security-Data encryption The Internet of Things (IoT) apps accumulate a large amount of data. Data storage and processing are essential components of the IoT ecosystem. The most of this information is personal and must be encrypted. Wherever the data is present online, one can use Secure Sockets Layer

Tags:

  Architecture, Secure

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Internet of Things (IoT) Security: Issues, Challenges and ...

1 International Journal of Scientific & Engineering Research Volume 12, Issue 6, June-2021 52. ISSN 2229-5518. Internet of Things (IoT) Security: Issues, Challenges and Solutions. *. Saira Afzal1, Abdullah Faisal1,2, Imran Siddique2 ,Mariam Afzal3. 1. Department of Information Technology, Lahore Leads University, Lahore (Pakistan). 2. Department of Computer Science, Afro Asian Institute, Lahore (Pakistan). 3 University of Narowal, Punjab, (Pakistan). *Corresponding Author: only in its early stages, both consumers and suppliers are looking for the best options. Abstract--The Internet of Things Malware threats and system hijacking, poor (IoT) paradigm envisions a world in which consumer knowledge due to a lack billions of interconnected objects are of understanding, a lack of official patches, equipped with artificial intelligence, Internet IJSER.

2 Access, and sensing and actuation capabilities. Instead of a small number of powerful computing devices in our lives, the and rogue IoT applications are all examples theory assumes that we should have a large of Internet of Things security issues. number of devices that are comparatively Keeping the IoT network apart from the less powerful. In other words, providing others, for example, is one step users should computational and Internet capability in just take to mitigate the effects of poor about every mundane entity we have. protection. By avoiding plug-and play An earlier buzzword for roughly the functionality, you can save time and same definition was ubiquitous money. Not using cloud computing computing.

3 The Internet of Things has just Passwords for IoT devices should be special improved the idea of Internet convergence. and complicated. The problem of IoT protection is extremely Index Term Internet of Things , Security, complicated. Integrity violations may come Issues, Encryption, Cloud Computing. from a variety of outlets, none of which are mutually exclusive. Since this technology is I. INTRODUCTION. IJSER 2021. International Journal of Scientific & Engineering Research Volume 12, Issue 6, June-2021 53. ISSN 2229-5518. Rather than relying on a technology's ostensibly beneficial advantages, I have always made it a point to go through the shortcomings first. There are now " Things ". that communicate with the Internet without our involvement, in addition to humans and our machines.

4 These " Things " are constantly interacting with the Internet , whether it's a refrigerator sending an alert on the food inside or our car sending messages to the mechanic on its oil levels. In many ways, the IoT security concerns are unavoidable, but Internet of Things is fantastic. However, they do not deter you from designing IoT. technology has not yet evolved, and it is not apps. completely secure . The Internet of Things : IoT architecture (IoT) has gotten a lot of press because of its wide use potential. Many observers II. IOT SECURITY ISSUES. IJSER. predicted that 2015 will be an existential Protection and testing mechanisms are year for IoT at the start of the year. We have critical in the implementation of any IoT.

5 Program. We've highlighted the top security issues you can consider to help you build more stable and attack-proof Internet of Things connected devices and applications. Fig. 2: Azure IoT Security architecture A. IoT Security-Data encryption The Internet of Things (IoT) apps accumulate a large amount of data. Data storage and processing are essential components of the IoT ecosystem. The most stated that this year would be the year of the of this information is personal and must be IoT Enterprise segment. Sluggish growth encrypted. Wherever the data is present and progress as a result of IoT protection online, one can use secure Sockets Layer also raised concerns. The media was protocol, or SSL, to fix this IoT security relentless in demonstrating the shortcomings problem.

6 SSL certification is now used for and loopholes in linking anything with the websites to encrypt and secure consumer Internet . The security problems posed by the data on the Internet . This is just half of the Internet of Things are true, and they must be equation; the other half involves tackled first. However, it has been proved safeguarding the wireless protocol. time and time again that any new technology Encryption is often needed when data is faces its fair share of obstacles and criticism. transmitted wirelessly. Sensitive IJSER 2021. International Journal of Scientific & Engineering Research Volume 12, Issue 6, June-2021 54. ISSN 2229-5518. information, such as locations, can only be although an uncommon one at the moment.

7 Accessible to the person in question. As a However, in the underground hacker world, result, be sure to use a wireless protocol that this is becoming more common. It's a includes encryption. frightening idea to see a house that's been locked up or a smart car that won't operate B. IoT Security Data Authentication until the ransom is paid. Attacks like Also after good data encryption, there is Ransom-ware have the potential to lock always a risk that the system will be users out of IoT computers and associated compromised. Protection is jeopardized if platforms, as well as uninstall devices and there is no way to verify the accuracy of steal data. Because of the rapid growth in data sent to and from an IoT computer.

8 The number of IoT devices around the world, Assume one built a temperature sensor for this particular IoT protection problem would smart homes. Even if the data is encrypted, be volatile in terms of potential if there is no way to verify the source of the permutations. However, since most IoT data data, someone can make up false data and is saved in the cloud, this ransom-ware does send it to the sensor, telling it to cool the not have any sensitive data to lock. IJSER. room even though it is cold, or vice versa. Authentication problems may not be E. Lack of updates and insufficient obvious at first, but they do pose a security testing risk. One of the reliability problems with IoT. systems is that manufacturers are often too C.

9 IoT Security Side Channel Attack sloppy when it comes to rigorous monitoring Even with encryption and authentication in and timely app upgrades. place, side channel attacks are still possible. Resultantly, the Internet of Things computer Such attacks are more concerned about how running obsolete applications may be it is delivered than with the information vulnerable to a variety of ransom-ware and itself. For example, if anyone has access to hacker attacks, as well as other security data such as timing, power consumption, or flaws. Another frightening probability is that electromagnetic leak, any of this data will be when a computer transfers its data to the used in side channel attacks.

10 Cloud after an upgrade, there can be D. Hijacking of IoT Devices and downtime. If the link is not encrypted at this Ransom-ware time, the upgrade files can be left Ransom-ware, a virus that encrypts and vulnerable, allowing hacker's access. prevents access to users' confidential data, For preventing IoT security problems, can attack IoT devices with poor measures regular automatic updates are important. It is of security. The real trouble starts when a the responsibility of the vendor to their hacker who compromised the computer with software that will help to discover the bugs ransom-ware requests ransom money in and some ransom-ware type common order for the victim's files to be opened.


Related search queries