- Open Access
- Authors : Mohit Kumar Saini, Rakesh Kumar Saini
- Paper ID : IJERTCONV7IS12028
- Volume & Issue : NCRIETS – 2019 (Volume 7 – Issue 12)
- Published (First Online): 23-12-2019
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Internet of Things (IoT) Applications and Security Challenges: A Review
Mohit Kumar Saini1
1Department of Computer Application, Doon Business School, Dehradun Uttrakhand, India
Rakesh Kumar Saini2
2Department of Computer Application, DIT University, Dehradun
Abstract-The Internet of Things (IoT) revolutionized the global network comprising of people, smart devices, intelligent objects, information, and data. It is no secret that as more and more devices connect to the internet, the challenges of securing the data that they transmit and the communications that they initiate are becoming more profound. Over the years, we have seen a surge in IoT devices, broadly in 2 areas in homes and in manufacturing. With the former, we have seen an entire ecosystem built around Amazon's Echo devices using the Alexa Voice Service. Google, Microsoft, and Apple have followed suit as well. Since these are independent and closed platforms, the responsibilities of securing the devices rest with the platform providers. In this paper, we highlights cyber security in manufacturing and related industries. Industries such as manufacturing, oil & gas, refining, pharmaceuticals, food & beverage, water treatment, and many more are constantly looking to add the right layers of security, as they bring an increasing number of equipment and devices online. Device manufacturers and plant operations managers constantly face pressure to protect their physical assets from cyber threats. Moreover, for each of these industries, the nature of the data, topologies of IoT devices, and complexities of threat management and ensuring compliance vary widely.
Keywords– Internet of Things, Cyber-attack, Security threats.
The recent rapid development of the Internet of Things (IoT) and its ability to offer different types of services have made it the fastest growing technology, with huge impact on social life and business environments. Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well.
The Internet of Things (IoT) is an idea that could radically alter our relationship with technology. The promise of a world in which all of the electronic devices around us are part of a single, interconnected network was once a thing of science fiction. But IoT has not only entered the world of nonfiction; its taking the world by storm. IoT devices are no longer a niche market. They have started to move from our workspaces into our (smart) homes, where IoT devices are expected to have the most significant impact on our daily lives. Most smart home devices will be benign, everyday appliances like kettles and toasters. Even if these devices are hacked and compromised, short of ruining your
breakfast, theres not a lot a hacker can do to cause you grief. The market is currently focusing on the vertical domains of IoT since it is in relatively early phases of development. But IoT cannot be treated as a single thing, or single platform, or even a single technology. In order to achieve the expected rapid growth from IoT opportunities, more focus needs to be put on interfaces, platforms, mobile applications and common/dominant standards .
IoT in the education sector has already started to make the conventional education system more automated interactive smart classrooms are helping students learn and participate more, whilst automatic attendance and various student tracking systems could help to make schools more secure. Internet-enabled remote classrooms will be a milestone for developing countries, making deep penetration in areas where setting up a traditional school infrastructure is not possible. Internet-enabled manufacturing and industrial units are giving differentiating results, making them safer and more efficient through automated process controls. Plant and energy optimization, health and safety control and security management are now increasingly being provided by advanced sensors, networked with sophisticated microcomputers . Financial services are already leveraging the internet for many of their services. Exponential improvement in digital infrastructure and the next generation of IoT enabled products could further lead the growth of the financial sector, with innovations, such as smart wearable and smart monitoring devices, helping customers to keep better track of their money and investments. Telcos could face a surge in data usage due to IoT-enabled devices, thus raising their ARPU (average revenue per user), while on the other hand, they will also have to deal with some concerns, such as privacy and infrastructure security. While the possibilities of these new technologies are mind-boggling, they also reveal severe IoT cybersecurity challenges. During the last few years, weve seen a dramatic increase in the number and the sophistication of attacks targeting IoT devices. The interconnectivity of people, devices and organizations in todays digital world, opens up a whole new playing field of vulnerabilities access points where the cyber criminals can get in. The overall risk landscape of the organization is only a part of a potentially contradictory and opaque universe of actual and potential threats that all too often come from completely unexpected and
unforeseen threat actors, which can have an escalating effect. In this paper discussed various security challenges in IOT. The main contribution of this paper is to provide an overview of the current state of IoT security challenges .
INTERNET OF THINGS (IOT)
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to- computer interaction A thing in the internet of things can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built- in sensors to alert the driver when tire pressure is low or any other natural or man-made object that can be assigned an IP address and is able to transfer data over a network.
Increasingly, organizations in a variety of industries are using IoT to operate more efficiently, better understand customers to deliver enhanced customer service, improve decision-making and increase the value of the business .
The internet of things (IoT) is a computing concept that describes the idea of everyday physical objects being connected to the internet and being able to identify themselves to other devices. The term is closely identified with RFID as the method of communication, although it also may include other sensor technologies, wireless technologies or QR codes.
CHARACTERISTICS OF INTERNET
OF THINGS (IOT)
Some most popular characteristics of Internet of things are:
IoT comes with the combination of algorithms and computation, software & hardware that makes it smart. Ambient intelligence in IoT enhances its capabilities which facilitate the things to respond in an intelligent way to a particular situation and supports them in carrying out specific tasks. In spite of all the popularity f smart technologies, intelligence in IoT is only concerned as means of interaction between devices, while user and device interaction is achieved by standard input methods and graphical user interface .
Together algorithms and compute (i.e. software & hardware) provide the intelligent spark that makes a
product experience smart. Consider Misfit Shine, a fitness tracker, compared to Nests intelligent thermostat. The Shine experience distributes compute tasks between a smartphone and the cloud. The Nest thermostat has more compute horsepower for the AI that make them smart.
Connectivity empowers Internet of Things by bringing together everyday objects. Connectivity of these objects is pivotal because simple object level interactions contribute towards collective intelligence in IoT network. It enables network accessibility and compatibility in the things. With this connectivity, new market opportunities for Internet of things can be created by the networking of smart things and applications. Connectivity in the IoT is more than slapping on a WiFi module and calling it a day. Connectivity enables network accessibility and compatibility. Accessibility is getting on a network while compatibility provides the common ability to consume and produce data. If this sounds familiar, thats because it is Metcalfes Law and it rings true for IoT .
The primary activity of Internet of Things is to collect data from its environment, this is achieved with the dynamic changes that take place around the devices. The state of these devices change dynamically, example sleeping and waking up, connected and/or disconnected as well as the context of devices including temperature, location and speed. In addition to the state of the device, the number of devices also changes dynamically with a person, place and time.
The state of devices change dynamically, e.g., sleeping and waking up, connected and/or disconnected as well as the context of devices including location and speed. Moreover, the number of devices can change dynamically .
The number of devices that need to be managed and that communicate with each other will be much larger than the devices connected to the current Internet. The management of data generated from these devices and their interpretation for application purposes becomes more critical. Gartner (2015) confirms the enormous scale of IoT in the estimated report where it stated that 5.5 million new things will get connected every day and 6.4 billion connected things will be in use worldwide in 2016, which is up by 30 percent from 2015. The report also forecasts that the number of connected devices will reach 20.8 billion by 2020.
The number of devices that need to be managed and that communicate with each other will be at least an order of magnitude larger than the devices connected to the current Internet. Even more critical will be the management of the data generated and their interpretation for application purposes. This relates to semantics of data, as well as efficient data handling.
IoT wouldnt be possible without sensors which will detect or measure any changes in the environment to generate data that can report on their status or even interact with the environment. Sensing technologies provide the means to create capabilities that reflect a true awareness of the physical world and the people in it. The sensing information is simply the analogue input from the physical world, but it can provide the rich understanding of our complex world  .
We tend to take for granted our senses and ability to understand the physical world and people around us. Sensing technologies provide us with the means to create experiences that reflect a true awareness of the physical world and the people in it. This is simply the analog input from the physical world, but it can provide rich understanding of our complex world.
Heterogeneity in Internet of Things as one of the key characteristics. Devices in IoT are based on different hardware platforms and networks and can interact with other devices or service platforms through different networks. IoT architecture should support direct network connectivity between heterogeneous networks. The key design requirements for heterogeneous things and their environments in IoT are scalabilities, modularity, extensibility and interoperability. The devices in the IoT are heterogeneous as based on different hardware platforms and networks. They can interact with other devices or service platforms through different networks .
IoT devices are naturally vulnerable to security threats. As we gain efficiencies, novel experiences, and other benefits from the IoT, it would be a mistake to forget about security concerns associated with it. There is a high level of transparency and privacy issues with IoT. It is important to secure the endpoints, the networks, and the data that is transferred across all of it means creating a security paradigm.
APPLICATIONS OF INTERNET OF THINGS (IOT)
Some useful applications of Internet of Things (IOT) are:
Smart Supply Chain
Connected Health (Digital Health/Tele health/Telemedicine)
IoT has various applications in healthcare, which are from remote monitoring equipment to advance & smart sensors to equipment integration. It has the potential to improve how physicians deliver care and also keep patients safe and healthy. Healthcare IoT can allow patients to spend more time interacting with their doctors by which it can boost patient engagement and satisfaction. From personal fitness sensors to surgical robots, IoT in healthcare brings new tools updated with the latest technology in the ecosystem that helps in developing better healthcare. IoT helps in revolutionizing healthcare and provides pocket-friendly solutions for the patient and healthcare professional .
Figure 1: Connected Health
Connected healthcare yet remains the sleeping giant of the Internet of Things applications. The concept of connected healthcare system and smart medical devices bears enormous potential not just for companies, but also for the well-being of people in general. Research shows IoT in healthcare will be massive in coming years. IoT in healthcare is aimed at empowering people to live healthier life by wearing connected devices. The collected data will help in personalized analysis of an individuals health and provide tailor made strategies to combat illness. The video below explains how IoT can revolutionize treatment and medical help.
Smart city is another powerful application of IoT generating curiosity among worlds population. Smart surveillance, smarter energy management systems, automated transportation, water distribution, urban security and environmental monitoring all are examples of internet of things applications for smart cities. IoT will solve major problems faced by the people living in cities like pollution, traffic congestion and shortage of energy supplies etc. Products like cellular communication enabled Smart Belly trash will send alerts to municipal services when a bin needs to be emptied .
Figure 2: Smart City
By installing sensors and using web applications, citizens can find free available parking slots across the city. Also, the sensors can detect meter tampering issues, general malfunctions and any installation issues in the electricity system.
The automotive digital technology has focused on optimizing vehicles internal functions. But now, this attention is growing towards enhancing the in-car experience. A connected car is a vehicle which is able to otimize its own operation, maintenance as well as comfort of passengers using onboard sensors and internet connectivity. Most large auto makers as well as some brave startups are working on connected car solutions. Major brands like Tesla, BMW, Apple, and Google are working on bringing the next revolution in automobiles .
Figure 3: Connected Cars
Connected car technology is a vast and an extensive network of multiple sensors, antennas, embedded software, and technologies that assist in communication to navigate in our complex world. It has the responsibility of making decisions with consistency, accuracy, and speed. It also has to be reliable. These requirements will become even more critical when humans give up entirely the control of the steering wheel and brakes to the autonomous or automated
vehicles that are being successfully tested on our highways right now.
Smart Home has become the revolutionary ladder of success in the residential spaces and it is predicted Smart homes will become as common as smartphones Whenever we think of IoT systems, the most important and efficient application that stands out every time is Smart Home ranking as highest IOT application on all channels. The estimated amount of funding for Smart Home startups exceeds $2.5bn and is ever growing. Wouldnt you love if you could switch on air conditioning before reaching home or switch off lights even after you have left home? Or unlock the doors to friends for temporary access even when you are not at home. Dont be surprised with IoT taking shape companies are building products to make your life simpler and convenient .
Figure 4: Smart Home
The cost of owning a house is the biggest expense in a homeowners life. Smart Home products are promised to save time, energy and money. With Smart home companies like Nest, Ecobee, Ring and August, to name a few, will become household brands and are planning to deliver a never seen before experience .
Smart farming is an often overlooked IoT application. However, because the number of farming operations is usually remote and the large number of livestock that farmers work on, all of this can be monitored by the Internet of Things and can also revolutionize the way farmers work. But this idea is yet to reach a large-scale attention. Nevertheless, it still remains to be one of the IoT applications that should not be underestimated. Smart farming has the potential to become an important application field specifically in the agricultural-product exporting countries.
Figure 5: Smart Farming
Retailers have started adopting IoT solutions and using IoT embedded systems across a number of applications that improve store operations such as increasing purchases, reducing theft, enabling inventory management, and enhancing the consumers shopping experience. Through IoT physical retailers can compete against online challengers more strongly. They can regain their lost market share and attract consumers into the store, thus making it easier for them to buy more while saving money .
Figure 6: Smart Farming
The potential of IoT in the retail sector is enormous. IoT provides an opportunity to retailers to connect with the customers to enhance the in-store experience. Smartphones will be the way for retailers to remain connected with their consumers even out of store. Interacting through Smartphones and using Beacon technology can help retailers serve their consumers better. They can also track consumers path through a store and improve store layout and place premium products in high traffic areas .
Smart Supply Chain
Supply chains have already been getting smarter for a couple of years. Offering solutions to problems like tracking of goods while they are on the road or in transit, or helping suppliers exchange inventory information are some of the popular offerings. With an IoT enabled system,
factory equipment that contains embedded sensors communicate data about different parameters such as pressure, temperature, and utilization of the machine. The IoT system can also process workflow and change equipment settings to optimize performance .
Figure 7: Smart Supply Chain
SECURITY CHALLENGES FACING IOT
IoT security is the protection of Internet of Things devices from attack. While many business owners are aware that they need to protect computers and phones with antivirus, the security risks related to IoT devices are less well known and their protection is too often neglected.
Internet of Things devices are everywhere. From cars and fridges to monitoring devices on assembly lines, objects around us are increasingly being connected to the internet. The speed at which the IoT market is growing is staggering
– Juniper research estimates that the number of IoT sensors and devices is set to exceed 50 billion by 2022.While consumer IoT devices allow lifestyle benefits, businesses are quickly adopting IoT devices due to high potential for savings. For example, after Harley-Davidson turned their York, Pennsylvania plant to a smart factory using IoT devices in every step of the production process, they reduced costs by 7% and increased net margin by 19%.
Billions of devices come under the umbrella of an interlinked ecosystem that is connected through IoT. Manipulating even a single data point will result in manipulation of the entire data which is exchanged and shared back and forth from the sensor to the main server. Decentralized distributed ledger and digital signatures should be implemented in order to ensure integrity .
Data encryption and decryption is a continuous process. The IoT networks sensors still lack the capability to process. The brute force attempts can be prevented by firewalls and segregating the devices into separate networks.
IoT is all about the exchange of data among various platforms, devices, and consumers. The smart devices gather data for a number of reasons, like, improving efficiency and experience, decision making, providing better service, etc.; thus, the end point of data shall be completely secured and safeguarded.
There is an absence of a common framework and so all the manufacturers have to manage the security and retain the privacy on their own. Once a common standardized framework is implemented, the individual efforts will then collectively be utilized in an expandable manner and so reusability of code can be achieved .
The IoT framework is vulnerable to attacks at each layer. Therefore, there are many security threats and requirements that need to be dispatched. Current state of research in IoT is mainly concentrated on authentication and access control protocols, but with the rapid growth of technology it is essential to consolidate new networking protocols like IPv6 and 5G to achieve the progressive mash up of IoT topology The main emphasis of this chapter was to highlight major security issues of IoT particularly, focusing the security attacks and their countermeasures. Due to lack of security mechanism in IoT devices, many IoT devices become soft targets and even this is not in the victims knowledge of being infected. In this chapter, the security requirements are discussed such as confidentiality, integrity, and authentication, etc. In this paper, different applications of IOT are discussed. We hope this paper will be useful to researchers in the security field by helping identify the major issues in IoT security and providing better understanding of the threats and their attributes originating from various intruders like organizations and intelligence agencies.
This Research paper is original and not published in any conferences or in any journal.
Figure 8: Security Challenges Facng IoT
Eventually, enterprises will have to deal with more and more number of IoT devices. This enormous amount of user data can be difficult to manage. The fact cannot be denied that it requires a single error or trespassing a single algorithm to bring down the entire infrastructure of the data .
Managing the update of millions of devices needs to be adhered to, respectively. Not all the devices support over the air update and hence it requires manually updating the devices. One will need to keep a track of the available updates and apply the same to all the varied devices. This process becomes time-consuming and complicated and if any mistake happens in the process than this shall lead to loopholes in the security later. Security Investment in securing infrastructure and network should be the first priority, which is not the case now. IoT involves the use of millions of data points and each point should be secured. Indeed, the need is for the multi-layer security, i.e., security at each and every level. From end-point devices, cloud platforms, embedded software to web and mobile applications that leverage IoT (Internet of Things), each layer should be security intact. With the set of heterogeneous devices, security becomes complex.
R.Vignesh and 2A.Samydurai ans1 Student, 2Associate Professor Security on Internet of Things (IOT) with Challenges and Countermeasures in 2017 IJEDR | Volume 5, Issue 1 | ISSN: 2321-9939.
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of computation, vol. 48, 203-209, 1987.
J.-Y. Lee, W.-C.Lin, and Y.-H. Huang, "A lightweight authentication protocol for internet of things," in Int'l Symposium on Next-Generation Electronics (ISNE), 1-2, 2014.
Y. Xie and D. Wang, "An Item-Level Access Control Framework for Inter-System Security in the Internet of Things," in Applied Mechanics and Materials, 1430-1432, 2014.
B. Anggorojati, P. N. Mahalle, N. R. Prasad, and R. Prasad, "Capability-based access control delegation model on the federated IoT network," in Int'l Symposium on Wireless Personal Multimedia Communications (WPMC), 604-608, 2012.
M. Castrucci, A. Neri, F. Caldeira, J. Aubert, D. Khadraoui, M. Aubigny, et al., "Design and implementation of a mediation system enabling secure communication among Critical Infrastructures," Int'l Journal of Critical Infrastructure Protection, vol. 5,86-97, 2012.
R. Neisse, G. Steri, and G. Baldini, "Enforcement of security policy rules for the internet of things," in Int'l Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 165-172, 2014.
Mirza Abdur Razzaq and Muhammad Ali Qureshi Security Issues in the Internet of Things (IoT): A Comprehensive Study by (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 6, 2017.
J. S. Kumar and D. R. Patel, A survey on internet of things: Security and privacy issues, International Journal of Computer Applications, vol. 90, no. 11, 2014.
M. Abomhara and G. M. KÃ¸ien, Security and privacy in the internet of things: Current status and open issues, in Privacy and Security in Mobile Systems (PRISMS), International Conference on. IEEE, 2014, pp. 18.
S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, A vision of iot: Applications, challenges, and opportunities with china
perspective,IEEE Internet of Things journal, vol. 1, no. 4, pp. 349359, 2014.
L. Atzori, A. Iera, and G. Morabito, The internet of things: A survey,Comput. Netw. vol. 54, no. 15, pp. 27872805, Oct 2010.
M. M. Hossain, M. Fotouhi, and R. Hasan, Towards an analysis of security issues, challenges, and open problems in the internet of things, in Services (SERVICES), 2015 IEEE World Congress on. IEEE, 2015, pp. 2128.
L. Da Xu, W. He, and S. Li, Internet of things in industries: A survey,IEEE Transactions on industrial informatics, vol. 10, no. 4, pp. 22332243, 2014.
L. M. R. Tarouco, L. M. Bertholdo, L. Z. Granville, L. M. R. Arbiza, F. Carbone, M. Marotta, and J. J. C. de Santana, Internet of things in healthcare: Interoperatibility and security issues, in Communications (ICC), IEEE International Conference on. IEEE, 2012, pp. 61216125.
A. Mohan, Cyber security for personal medical devices internet of things, in Distributed Computing in Sensor Systems (DCOSS), 2014 IEEE International Conference on. IEEE, 2014, pp. 372374.
Mohamed Abomhara and Geir M. KÃ¸ien Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks.
S. De, P. Barnaghi, M. Bauer, and S. Meissner, Service modelling for the internet of things, in Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on. IEEE, 2011, pp. 949955.
G. Xiao, J. Guo, L. Xu, and Z. Gong, User interoperability with heterogeneous iot devices through transformation, 2014.
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, Internet of things (iot): A vision, architectural elements, and future directions, Future Generation Computer Systems, vol. 29, no. 7, pp. 16451660, 2013.
M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, From todays intranet of things to a future internet of things: a wireless-and mobility-related view, Wireless Communications, IEEE, vol. 17, no. 6, pp. 4451,2010.
C. Hong song, F. Zhongchuan, and Z. Dongyan, Security and trust research in m2m system, in Vehicular Electronics and Safety (ICVES), 2011 IEEE International Conference on. IEEE, 2011, pp. 286290.
I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. V. Meyerstein, Trust in m2 communication, Vehicular Technology Magazine, IEEE, vol. 4,no. 3, pp. 6975, 2009.
J. Lopez, R. Roman, and C. Alcaraz, Analysis of security threats, requirements, technologies and standards in wireless sensor networks.