- Open Access
- Authors : Nagaraja Seshadri, Sivakumar Dhakshinamoorthy
- Paper ID : IJERTCONV8IS15043
- Volume & Issue : NCAIT – 2020 (Volume 8 – Issue 15)
- Published (First Online): 21-09-2020
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Internet of things (IoT) and Security
REVA Academy of Corporate Excellence Reva University
REVA Academy of Corporate Excellence Reva University
Abstract This paper introduces IoT (Internet of Things), that is creating a digital environment where every device is connected and is becoming more and more intelligent and increasing the efficiency of different processes. The Architecture, Technologies, Components and Applications of Internet of Things along with challenges involved are highlighted. IoT increases productivity, shortens the processes involved, creates better products and has a huge potential for innovation by integrating both digital and physical components.
This paper briefly describes the design of smart home automation architecture that utilizes a smart phone application to remotely control various appliances like door access, fans, geysers, CCTV, lights, air-conditioning, power and water supply at home. Different components with advanced technology are used to create the home automation application. The whole system which includes different appliances are preprogramed, remotely controlled, and are constantly monitored.
We will also discuss key IoT challenges and security risks, and security requirements in this paper.
Keywords – Internet of Things (IoT); Gateway; Threats; Security; Home automation; Data Privacy
Internet of Things is turning the world to more intelligent and advanced through digitization and by inter-connecting smart devices. IoT is useful in public utilities, manufacturing, transportation, agriculture, medical care, finance, emergency actions to natural disasters where it is difficult for human participation. IoT promotes digital transformation through improvement in connectivity by integrating large number of devices. This is achieved by creating value from different forms of analysis of data that is created in this automated process.
IoT based Smart city project initiatives taken by Government of India increases the city management efficiency and improves the quality of life by involving and connecting many public utilities like management of water, electricity, traffic, parking, fire protection, gas supply connections and other various services through an intelligent platform.
IoT is becoming the major driver for digital transformation which is creating more and more innovations in products, optimization and automation of data analysis, new applications, R&D investments, new business, and revenue models across all sectors. Figure 1 below shows IoT Utilities across various sectors .
Fig 1. IoT Utilities
EXPONETIAL GROWTH OF INTERNET OF THINGS Number of devices getting connected, from computers to
household devices to enterprise and industries has grown in last 6 years at an annual rate of 23.1%, touching 50.1 billion things in 2020 . Worldwide spending on IOT will cross $1 trillion in 2022 and $1.1 trillion in 2023 as per IDC report . IOT is primarily comprised of mobile devices and consumer-oriented things but lately industrial automation is
increasingly capturing larger share in IOT market.
2 IoT connected things till 2020
Figure 2 above shows the trend of IoT usage over time  .
IOT CHARACTERISTICS 
Internet has seen a phenomenal growth in the last few decades since more and more physical devices are getting connected every day and this is prompting organizations and governments to invest more on research activities surrounding IoT. This brings huge economic value when the industries are transformed digitally by intelligently
connecting to smart devices. The data collection through IoT and analysis are further developing industries globally.
Fig. 3. IoT Characteristics
IoT Characteristics are depicted in Figure 3  above. Dimension of networks and connectedness is a major part of IoT definition. IoT enables ease of use of smart devices which will be tracked, located, and monitored through efficient network functions by the consolidation of IT infrastructure and physical infrastructure.
A regular device is converted into a smart device using the underlying technologies like pervasive computing, communication technologies, embedded devices, Internet protocols, sensor networks, and applications. A thing that contains technology which gives it additional capability to "do something", such as recording sound, measuring temperature or humidity levels, sensing movement, capturing location data. The device is capable of capturing and registering these forms of actions and context and convert it into data.
Data information intelligence is the essence of IoT. The data collected from different IoT devices must be communicated and converted into useful information, knowledge, insight, and actions.
There is no IoT without ("big") data, and no matter what actions the IoT system is addressing or solving, there is no use of IoT data distribution without understanding the data. Data analytics (Big Data), artificial intelligence (AI) and cognitive computing and so on play major role here.
Depending on the context, business process automation, industrial automation, or automatic software update all these can be remotely handled and monitored using IoT.
New technologies, innovations, and new applications need to grow proportionally. Estimated growth potential of IoT depends on market demands and customer needs. New devices with compatibility protocols to interact with different devices should be developed to suit customer requirements in terms of availability anywhere and anytime.
IOT ARCHITECTURE 
Fig. 4. IoT Architecture
IoT architecture as shown in the Figure 4 above , has three layers, but some researchers support the four-layer and five-layer architecture. IoT applications and enhancements require a broad architecture to fulfill the challenge in IoT in terms of security and privacy. A well-designed three-layer architecture can fulfill IoT security and privacy requirements. This network of devices also generates, collects data and communicates through sensors, electronics and software.
Perception, Network and Application layers are simplified and basic versions of IoT layers as shown in Figure 4 .
Perception layer is the identification layer, it collects data and integrates with the physical world of hardware like RFID, sensors, etc. In this layer, different smart devices use sensors depending on the application requirement and can automatically sense and exchange information such as location, motion, vibration, and changes in the air among various other devices and systems.
Network layer, also called transmission layer provides basic networking support and data transfer over different networks, acts as a bridge between other two layers. This layer manages the data by aggregating, processing, transmitting, grouping of data as required. It handles the existing IT infrastructures such as fixed, wireless, mobile, etc. for transmission and energy efficiency, QoS requirements.
The deployment of various applications in IoT is defined in application layer. Applications are depending on the customer service request. Few examples of application layer are smart buildings, smart homes, smart transportation systems with intelligent traffic control, smart and efficient automation in manufacturing industries and smart healthcare.
The four-layer architecture includes support layer to take careof security by way of authentication method.
The five-layer architecture approach includes processing layer to overcome security and storage and business layer to manage and control applications, users privacy, business, and profits models of IoT
MAJOR COMPONENTS OF IOT
Fig. 4. IoT Major Components
Major Components of IoT are shown in Figure 4 
They are connected together to collect and share data over the internet to perform a specific application.
IoT devices include wireless sensors, actuators, software, and other computer devices. Industrial components, environmental sensors, medical devices, mobile devices, will have this type of devices fixed in it. The embedded technology in these objects transfers data by interacting with the external environment through internet to accept and take decisions. For example, a pacemaker which is an IoT device communicates with other systems to save life through rhythmic breathing patterns.
Internet of Things (IoT) gateway enables communication between the devices and the cloud. It is a device or program that connects the sensors, controllers, intelligent devices to the cloud. It manages the data flow between different networks and protocols. As an intelligent gateway, it provides security for the IoT network. The security is offered with higher order encryption techniques to protect the system from malicious attacks and unauthorized access. IoT Gateway features include Data caching, buffering, and streaming, Data pre-processing, filtering and optimization, data visualization and basic data analytics via IoT Gateway applications and System diagnostics.
An IoT cloud platform provides the capabilities of IoT and cloud computing together to add value for consumer and business applications. It provides appropriate, convenient, safe, and complete IoT enablement service.
IoT cloud solution includes an IoT platform where it enables provisioning, management, and automation of smart objects within a given IoT infrastructure and cloud computing where the consumer and business applications are moved to the web, thus enabling IT performance and costs optimization. On-site IT infrastructure to store data and to run applications can be saved. Advantages of IoT system in cloud is scalability, data mobility, security, less time to implement and cost effectiveness.
IoT technology requires intelligent analytics to manage and improve the overall performance of the system and its operations. Analytics involve the process of converting
analog data which is collected from smart devices and sensors through a detailed analysis for further interpretation. Real Time smart analytics solutions reduces irregularities in the collected data and act fast to prevent any undesired scenarios. This data utilization provides and helps organizations in their future business opportunities and to plan for market demands.
The data collected through the IoT ecosystem helps to derive important business initiatives, visions, and decisions.
User interfaces are the perceptible part of an IoT system as this is the one seen and accessed by the user. A well- designed user interface like new multicolor touch panels with interactive design, modern technology, common wireless standards are required to make it user friendly. To encourage users to buy the smart devices or gadgets for more interactions, a well-designed user-friendly interface required. Attractive interface with minimum effort and compatible device standards.
IOT COMMUNICATION TECHNOLOGIES 
In IoT, multiple devices and diverse communication technologies are used to create a seamless connectivity and operation. Design requirements include low power consumption, seamless communication, controlled resources, scalable, modular, and interoperable among various things which are to be connected.
IoT, a fast-developing concept, comprises smart devices networked worldwide as Internet. Wireless communication technologies like Bluetooth, ZigBee, Lora WAN, 6LoWPAN- IPv6, Z-Wave, Wi-Fi, and RF Link are used depending on the requirement of speed, security, power utilization, data transfer rate and overall efficiency in range, latency rate and throughput.
IoT ecosystems depend on many different connectivity technologies, each of them for specific needs and requirements with advantages and limitations. Further developments in each protocol can create potential applications for its usage. In IoT applications, requirements such as range, QoS, security, power consumption and network management are to be considered when selecting the best wireless technology. Figure 5 below shows various Wireless technologies used in IoT .
Fig. 5. IoT Wireless Technologies
Wireless fidelity is called as Wi-Fi, the IEEE 802.11x standards, is used to connect devices to the Internet. Wi-Fi interfaces are available in smartphone, laptop, tablet PC and wireless router to communicate effectively and access to the Internet. The features are star topology, 54mbps band width, low power consumption, up to 20m range, 2.4GHz spectrum. The key advantage of Wi-Fi networks is easy to establish for instant connectivity.
Bluetooth is an IEEE 802.15.1 standard, short range, low cost wireless technology designed to operate with very low power consumption. The features are start topology based, 1Mbps bandwidth, up to 30m range, operates in 2.4GHz spectrum. Other name is Wireless Personal Area Network because it can create personal area network during communication with other devices without essential to be in line of sight. Bluetooth Low Energy LE uses less power to transmit data than standard Bluetooth, its usage can be seen in smart watches and fitness trackers.
ZigBee is designed specifically to be employed in M2M networks. The technology is cheap to run and doesnt need loads of power, creating it a perfect resolution for several industrial applications. The technology features a low latency and allowing products to maximize battery life.
Zigbee is based on IEEE 802.15.4 standard is suitable for application which needs lower date rate transfer and short range. The features are Mesh, star and tree-based topology, 1Mbps bandwidth, very low power consumption, up to 300 m range, 2.4GHz spectrum. Home Automation, lighting, Smart energy devices, HVAC are few applications.
Low Power Wide Area Network is used for long range applications like industrial, smart city and vast commercial buildings. It employs a centralized server unit to connect different devices with low-power consumption, higher security encryption methods and supports large networks with devices, from 0.3 kbps to 50 kbps data rate ranges.
LPWANs have both the licensed and unlicensed spectrum. Parameters such as power consumption, Quality- of-Service, standardization, performance, reliability, scalability security, and interoperability plays avital role while selection.
wave operates on the 800-900MHz radio frequency range, a mesh network wireless communication technology, with simple network protocol, low power consumption, AES- 128 symmetric encryption, lower data rates, operates using low-energy radio waves and completely interoperable.
Few Z-Wave devices are Flood Sensor, Smart Lock, Ring Door/Window Sensor, Dual In-Wall Switch, Logitech Hub Extender, Smart Lock, Bulb, Gateway, D-Link sensors, Security Hub, Lighting Control. It is used largely in design for home automation products such as lamp controllers and sensors.
Cellular networks provide reliable broadband communication applications. Next generation 5G enable real time voice, data and video applications due to its high-speed
mobility support and ultra-low latency. Its high bandwidth cellular connectivity usage is in industrial automation applications like connected cars and fleet management. This requires high power requiremnt and very high operational costs in the future.
Cellular IoT presents the following benefits: Large coverage area, open roaming capability, Connectivity choices to suit the needs, Remote management and analytics, Private networks & security options. Type Selection depends on factors like response times, cost and the amount of data being transferred.
RFID Radio Frequency Identification
RFID uses radio waves to transmit small amounts of information from an RFID tag to a reader within a really short distance. By attaching RFID tag to varied products and equipment, businesses can track inventory and assets in real- time enabling better stock and production planning with supply chain management optimisation and its usage can be seen in smart shelves, self-checkout, and smart mirrors in retail and logistics applications.
IoT Network protocols are depicted in Figure 6 below .
Fig. 6. IoT Network Protocols
IOT APPLICATION DEVELOPMENT
Designing, executing, securely functioning, managing, and maintaining IoT projects is complex within an IoT architecture. While developing an end-to-end IoT system, collaboration is required between Open source community, High-Tech government institutions and IoT provider companies .
Many applications, hardwares and ecosystems are being developed to support IoT technology to make life easier, safer, and more productive. The functionality of an IoT Architecture includes connecting devices, ensuring adaptable communication protocols, ensuring security features, data analysis and management. This also creates new business opportunities by utilizing the collected data.
Various stages of IoT application development is explained in Figure 6 below .
Fig. 6. IoT Application Devleopment Stages
IoTs application areas are manufacturing/industrial, Transportation/mobility, Smart Home, energy, Cities, buildings, retail and Trade, Agriculture, Supply chain, Health care, and much more. IoT Platform-enabled projects include other areas such as hospitality, enterprise, finance, and sports.
In this paper, the smart homes application in IoT technology will be focused.
IOT IN SMART HOME
Internet, electronic devices and machines are taking over jobs from humans. By saving time from regular housekeeping tasks like washing dishes, laundry activities, gardening, preparing meal, allows humans time and energy to create new things, rearrange their time with new schedules and to live differently.
Advantages of Home Automation Using IoT
Smart home automation system through automatic control of electronic appliances smartly, makes an individuals life easy, convenient, secure and saves time for better things.
Automatic sensor-controlled time switch enables to save energy and money.
Kitchen devices are expected to be used remotely and time adjusted. smart kitchen robot starts preparing food when required with preprogramed time.
Open garage automatically when the person reaches home using sensors.
Smart home devices are used to prepare coffee, ACs and heaters control, doors and window control.
Automatic activation of services to make payments for power, gas, water, telecommunications utilities through service providers by collecting information.
Enabling of emergency medical facilities for elders by sending a request or alarm to hospitals and clinics.
Enabling home theatre entertainment equipment are automatically and remotely controlled so as to switch on as soon as a person enter the hall.
Monitoring and activating control home security systems like CCTV using smart phone applications.
Enabling a voice assistant device to control all other connected devices handsfree or a tablet with one single interface application.
Building smart home automation using IoT devices can provide the convenience people want. Internet of Things technology with safe use will continue to make peoples lives easier and better.
Enable the development of various applications that make utilization of the tremendous amount of data produced by such system to provide new services to various organizations, individuals, and other service- oriented sectors.
Home Automation includes different types of sensors for different applications, devices with different protocols and technologies put together to make it an efficient design of a reliable system.
The concept of a smart home applications and connected homes are being developed to create a smart city.
Fig. 7. Smart home
A typical IoT application in a smart home is shown in Figure 7 above 
IOT SECURITY RISKS AND CHALLENGES When IoT technology usage is becoming important and
growing in everyones life, security issues associated with this technology is also increasing proportionately.
Shutting down the whole city, causing vehicle accidents, putting patients life in danger can be thought of as risks when IoT enabled devices compromised. IoT increases social efficiency and ease, but it also creates an array of latest problems concerning breach of privacy and information security at the same time. Privacy of users and protection of their data is always at risk.
IoT Security Challenges 
Technology advancement in IoT with invention of more and more IoT devices with new features leads to more unique security challenges.
Fig. 8. IoT Security Challenges
Major challenges faced by IoT systems is shown in Figure 8 above .
IoT-enabled devices and programs such as sensors, actuators, OS-based firmware, application software and Wi- Fi communication, router are the components which are vulnerable to attacks on the system. These attack surfaces can become the entry point for malware introduction and system compromise.
Weak authentication and authorization in IoT applications such as poor password protection and poor encryption.
Distributed denial of service and spam attacks bringing the systems down.
Data manipulation through system compromise by malware attacks such as spyware and ransomware.
Artificial intelligence tools and automation can help hackers to detect patterns and use it to their advantage.
Leakage of Sensitive information by unauthorized manipulation by hacking into devices.
Fig. 9. IoT Attack Types
Various IoT attack types are explained in Figure 9 above .
IOT SECURITY REQUIREMENTS.
IoT security is becoming a concern because the connected devices collect personal information and store in different platforms, which can be stollen by criminals. IoT Security protects this devices and networks from cybercrime.
Security mechanisms should be implemented throughout the life cycle of IoT ecosystem which includes Security risk assessment and risk mitigation. Digital security must be designed by ensuring the integrity and confidentiality of IoT solutions and data by preventing vulnerabilities while mitigating cybersecurity risks.
Fig. 10. IoT Security
Important IoT security features are shown in Figure 10 above .
IoT security features :
Trust Establishment in Integration, Transactions, Platforms
Embedded security Measures, obtain digital certificates
Brute Force Protection: Enable strong credentials for all devices in networks
Network Security: secured Firmwares, antivirus security softwares, and regular updates.
Secured Application programming interfaces (API)
Use secure end to end communication with encryption
Security of managed IoT Cloud Solutions fr integration with cloud computing.
Secured VPN for data transmission through Wi-Fi
Regular scanning and auditing to check attacks logs.
IoT devices provide the ease that everyone wants in life. Government has taken many initiatives such as the adoption of IoT in smart cities development, traffic management, and healthcare services. Many industries and businesses are developing advanced solutions utilizing this fast growing IoT technology for process automation and efficiency. During the implementation process of this technology, the privacy and security risks should be carefully measured and assessed.
In this paper, we have presented architecture and design of Internet of Things, the components and protocols used. We have also discussed IoT applications of real smart home applications and how it is helps in changing the lifestyle of humans. In addition, we have identified several security risks and challenges. Lastly discussed various security measures to overcome these challenges in IoT technology applications.
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications by Ala Al-Fuqaha, Senior Member, IEEE, Mohsen Guizani, Fellow, IEEE, Mehdi Mohammadi, Student Member, IEEE, Mohammed Aledhari, Student Member,
IEEE, and Moussa Ayyash, Senior Member, IEEE
Internet Of Things By The Numbers: What New Surveys Found by Gil PressSenior Contributor, Enterprise & Cloud – https://www.forbes.com/sites/gilpress/2016/09/02/internet-of- things-by-the-numbers-what-new-surveys-found/#1b82c1ad16a0
Internet of Things Meets the Military and Battlefield – Connecting Gear and Biometric Wearables for an IoMT and IoBT By Lori Cameron – https://www.computer.org/publications/tech- news/research/internet-of-military-battlefield-things-iomt-iobt
Internet of Everything: The IoT Market Is Projected to Expand 12x from 20172023 by Justin Baker – https://www.experfy.com/blog/internet-of-everything-the-iot- market-is-projected-to-expand-12x-from-2017-2023/
What is the IoT? – https://nordigi.no/index.php/en/blog/55-what- is-the-iot
Introduction to IoT Security Anca D. Jurcut, Pasika Ranaweera, Lina Xu School of Computer Science University College Dublin, Ireland –
What are the major components of Internet of Things by Rajiv – https://www.rfpage.com/what-are-the-major-components-of- internet-of-things/?
Top 5 wireless technologies for IoT and 5G networks by Rajiv – https://www.rfpage.com/top-wireless-technologies-iot-5g- networks/
Six types of IoT network protocols by Naveen Joshi Allerin Saturday 07, December 2019 – https://www.allerin.com/blog/six- types-of-iot-network-protocols
Internet of Things (IoT) – Part 4 (Network Protocols and Architecture) by Sukanya Mandal – https://www.c- sharpcorner.com/UploadFile/f88748/internet-of-thingsiot-part-4- network-protocols-and-arc/
Building an Open End-to-End Internet of Things Architecture by David Bericat Lacima, Red Hat – https://next.redhat.com/2017/12/19/building-an-open-end-to-end- internet-of-things-architecture/
Customary Homes to Smart Homes using Internet of Things (IoT) and Mobile Application by Vignesh Govindraj – Phanini Academy of Education, Mithileysh Sathiyanarayanan – Count on Us – R&D, Babangida Abubakar – Katsina State Institute ofTechnology & Management, Nigeria – https://www.researchgate.net/publication/325516236_Customary
_homes_to_smart_homes_using_Internet_of_Things_IoT_and_m obile_applicationhttps://www.redappletech.com/iot-home- automation/
IoT Security 2020 Trends: Solutions, Technologies, Challenges, Platform, Companies by Harshita Khangarot – https://www.brsoftech.com/blog/iot-security-solutions- technologies-challenges-platform
IoT Security Major Problems Faced by IoT System by dataflair team Â· updated Â· September 15, 2018- https://data- flair.training/blogs/iot-security/
IoT Security, Privacy, Safety and Ethics by Hany F. Atlam and Gary Wills – https://www.researchgate.net/figure/arious-security- attacks-in-the-IoT-system_fig2_332859761
Iot security: challenges, solutions & future prospects by Mikhail Gloukhovtsev, Sr. Solutions Architect, Digital Solutions, Cloud & IoT, Orange Business Services – https://education.dellemc.com/content/dam/dell- emc/documents/en-us/2018KS_Gloukhovtsev-IoT_Secu
IoT Solutions for Smart Home Solution – https://www.ecosmob.com/iot-solutions-smart-home-automation- future-technology/#2
The Internet of Things (IoT) essential IoT business guide – https://www.i-scoop.eu/internet-of-things-guide/
Internet of Things in Industries: A Survey by Li Da Xu, Senior Member,IEEE, Wu He, and Shancang Li – https://www.researchgate.net/publication/270742269_Internet_of
A Survey on Internet of Things: Security and Privacy Issues J. S Kumar, Dhiren R. Patel – http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.678.48 96&rep=rep1&type=pdf
Top 5 Benefits of Cellular IoT – https://blog.jtiot.com/top-5- benefits-of-cellular-iot