Example: confidence

Internet of Things (IoT) Security: Issues, Challenges and ...

International Journal of Scientific & Engineering Research Volume 12, Issue 6, June-2021 52. ISSN 2229-5518. Internet of Things (IoT) Security: Issues, Challenges and solutions . *. Saira Afzal1, Abdullah Faisal1,2, Imran Siddique2 ,Mariam Afzal3. 1. Department of Information Technology, Lahore Leads University, Lahore (Pakistan). 2. Department of Computer Science, Afro Asian Institute, Lahore (Pakistan). 3 University of Narowal, Punjab, (Pakistan). *Corresponding Author: only in its early stages, both consumers and suppliers are looking for the best options.

Challenges and Solutions. *Saira Afzal1, Abdullah Faisal1,2, Imran Siddique2,Mariam Afzal3 1 Department of Information Technology, Lahore Leads University, Lahore (Pakistan). 2 Department of Computer Science, Afro Asian Institute, Lahore (Pakistan). 3 University of Narowal, Punjab, (Pakistan). *Corresponding Author: [email protected]

Tags:

  Challenges, Solutions, Challenges and solutions

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Internet of Things (IoT) Security: Issues, Challenges and ...

1 International Journal of Scientific & Engineering Research Volume 12, Issue 6, June-2021 52. ISSN 2229-5518. Internet of Things (IoT) Security: Issues, Challenges and solutions . *. Saira Afzal1, Abdullah Faisal1,2, Imran Siddique2 ,Mariam Afzal3. 1. Department of Information Technology, Lahore Leads University, Lahore (Pakistan). 2. Department of Computer Science, Afro Asian Institute, Lahore (Pakistan). 3 University of Narowal, Punjab, (Pakistan). *Corresponding Author: only in its early stages, both consumers and suppliers are looking for the best options.

2 Abstract--The Internet of Things Malware threats and system hijacking, poor (IoT) paradigm envisions a world in which consumer knowledge due to a lack billions of interconnected objects are of understanding, a lack of official patches, equipped with artificial intelligence, Internet IJSER. access, and sensing and actuation capabilities. Instead of a small number of powerful computing devices in our lives, the and rogue IoT applications are all examples theory assumes that we should have a large of Internet of Things security issues. number of devices that are comparatively Keeping the IoT network apart from the less powerful.

3 In other words, providing others, for example, is one step users should computational and Internet capability in just take to mitigate the effects of poor about every mundane entity we have. protection. By avoiding plug-and play An earlier buzzword for roughly the functionality, you can save time and same definition was ubiquitous money. Not using cloud computing computing . The Internet of Things has just Passwords for IoT devices should be special improved the idea of Internet convergence. and complicated. The problem of IoT protection is extremely Index Term Internet of Things , Security, complicated.

4 Integrity violations may come Issues, Encryption, Cloud Computing. from a variety of outlets, none of which are mutually exclusive. Since this technology is I. INTRODUCTION. IJSER 2021. International Journal of Scientific & Engineering Research Volume 12, Issue 6, June-2021 53. ISSN 2229-5518. Rather than relying on a technology's ostensibly beneficial advantages, I have always made it a point to go through the shortcomings first. There are now " Things ". that communicate with the Internet without our involvement, in addition to humans and our machines.

5 These " Things " are constantly interacting with the Internet , whether it's a refrigerator sending an alert on the food inside or our car sending messages to the mechanic on its oil levels. In many ways, the IoT security concerns are unavoidable, but Internet of Things is fantastic. However, they do not deter you from designing IoT. technology has not yet evolved, and it is not apps. completely secure. The Internet of Things : IoT Architecture (IoT) has gotten a lot of press because of its wide use potential. Many observers II. IOT SECURITY ISSUES.

6 IJSER. predicted that 2015 will be an existential Protection and testing mechanisms are year for IoT at the start of the year. We have critical in the implementation of any IoT. program. We've highlighted the top security issues you can consider to help you build more stable and attack-proof Internet of Things connected devices and applications. Fig. 2: Azure IoT Security Architecture A. IoT Security-Data encryption The Internet of Things (IoT) apps accumulate a large amount of data. Data storage and processing are essential components of the IoT ecosystem.

7 The most stated that this year would be the year of the of this information is personal and must be IoT Enterprise segment. Sluggish growth encrypted. Wherever the data is present and progress as a result of IoT protection online, one can use Secure Sockets Layer also raised concerns. The media was protocol, or SSL, to fix this IoT security relentless in demonstrating the shortcomings problem. SSL certification is now used for and loopholes in linking anything with the websites to encrypt and secure consumer Internet . The security problems posed by the data on the Internet .

8 This is just half of the Internet of Things are true, and they must be equation; the other half involves tackled first. However, it has been proved safeguarding the wireless protocol. time and time again that any new technology Encryption is often needed when data is faces its fair share of obstacles and criticism. transmitted wirelessly. Sensitive IJSER 2021. International Journal of Scientific & Engineering Research Volume 12, Issue 6, June-2021 54. ISSN 2229-5518. information, such as locations, can only be although an uncommon one at the moment.

9 Accessible to the person in question. As a However, in the underground hacker world, result, be sure to use a wireless protocol that this is becoming more common. It's a includes encryption. frightening idea to see a house that's been locked up or a smart car that won't operate B. IoT Security Data Authentication until the ransom is paid. Attacks like Also after good data encryption, there is Ransom-ware have the potential to lock always a risk that the system will be users out of IoT computers and associated compromised. Protection is jeopardized if platforms, as well as uninstall devices and there is no way to verify the accuracy of steal data.

10 Because of the rapid growth in data sent to and from an IoT computer. the number of IoT devices around the world, Assume one built a temperature sensor for this particular IoT protection problem would smart homes. Even if the data is encrypted, be volatile in terms of potential if there is no way to verify the source of the permutations. However, since most IoT data data, someone can make up false data and is saved in the cloud, this ransom-ware does send it to the sensor, telling it to cool the not have any sensitive data to lock. IJSER. room even though it is cold, or vice versa.


Related search queries