IOT SECURITY
Table of Contents
Aspects of the Internet of Things 4
Potential Ethical or Legal Issues 7
Introduction
With the advancement in information technology, there has been an expansion of intelligent applications from human beings to those things that are around people. IoT( Internet of Things) refers to an amalgamation of those networks which have sensors in it, cyberspace, communications of mobile, computation of cloud, processing of intelligent information as well as different advanced networks and technologies of information (Du et al. 2021). The concentration of IoT is basically in the service of information, amalgamating computer systems with perception, discernment, influence as well as control of the physical world through the elementary interconnection between core as well as terminal networks. Unification has been there in the physical world, automated virtual world, as well as the perception of humans. Several issues have been there which have had a huge impact on IoT security. Wrong control of access can create a hazard in IoT security.
Literature Review
Literature Review is known as the interpretative record that has been formed after analysis of literature related to notion subject matter (Aspland et al. 2021). Evaluation of literature is that part of the paper that is used for functions of education which includes know-how concerning matters of the subject alongside substantial findings which have been determined. It has been opined that Literature Review is mechanical as well as a conceptual benefaction to matters of the subject in consideration. However, it ought to be contemplated that evaluation of evaluation is not only an account of specific experimental work. It ought to be illustrative, translucent, interpretative in addition to encapsulated evaluation of related literature. An overview has been provided in this chapter of IoT security along with its aspects as well as issues that have a huge impact on IoT security. Other than that, explanations regarding software development techniques have been described. An outline of tools as well as techniques that should be utilized has been included.
Some of the aspects of IoT security have been described below:
Figure 1: Aspects of the Internet of Things
Aspects of the Internet of Things
- Connectivity
The excessive explanation has not been required further in this case. With everything afoot in IoT devices as well as hardware, in the company of sensors as well as other electronics and interconnected hardware as well as control systems, the relationship between several levels has been a requirement there (Oktian et al. 2021).
- Things
Anything which can be labeled or linked for instance it is delineated to be linked. Sensors, appliances of households as well as livestock can be tagged. Sensors can be included in devices or sensing substances can be linked to devices as well as items (Bhatt and Ragiri, 2021).
- Data
It has been considered as the glue of the Internet of Things. It is the first step against action as well as intelligence (Hughes-Lartey et al. 2021).
- Communication
Devices get interlinked by which data can be communicated as well as there will be an analysis of data. Occurrence of communication can be observed above short distances or above undiminished to very undiminished. For instance: Wi-Fi, Network Technologies of LPWA like LoRa or NB-IOT (Shi et al. 2021).
- Intelligence
Characteristics of intelligence have been observed in its capability of sensing IoT devices as well as its gathering of intelligence from analytics of big data whose other name is Artificial Intelligence (AI) (Kuzlu et al. 2021).
- Action
The aftermath of intelligence is known as its action. Action can be categorized as manual action, action on basis of debates with regards to phenomena for example within decisions in smart factories as well as automation frequently very mandatory piece (Bouras et al. 2021).
- Ecosystem
Region of Internet of Things (IoT) arising out of standpoint of different technologies, associations, aims as well as an image within which Internet of Things (IoT) apt. There has been a requirement of solid partnership, dimension of the platform as well as dimension of Internet of Everything (Chegini et al. 2021).
Method or Proposed Approach
According to Khan et al. (2021), in this section, there will be a discussion regarding the proposed methodology by which various Single Level Cell (SLCs) will be allocated to objects of IoT on basis of their capacities of hardware and measures of their executed protection which includes Intrusion Detection System (IDS), protection of side-channel as well as safeguard schemes of storage. Equipment of objects of IoT with SLC 1 or SLC 2 demonstrates those measures of protection which will be delicate in their case for instance Data Link Layer Security (DLLs) as well as restricted resources of hardware (Sharma et al. 2021). Therefore, deployment of these objects will never occur in disregarded areas as well as the connection of these devices is not direct to the Internet. These types of objects will rely heavily on those objects which have SLC 3 which acts as gateways for their protection as well as management of their connection to the Internet. On the other hand, those objects of IoT which have been linked with SLC 3 or SLC 4 or SLC 5 demonstrate those powerful mechanisms of protection will be there for instance solutions that are based on blockchain as well as strong resources of hardware. Deployment of these objects can occur within unrestrained environments as well as more essentially can be interlinked directly to the Internet as well as safeguarding themselves independently. Furthermore, a plan of communication has been stated within which distinct objects of IoT can be interlinked securely with one another or with those SLCs which are based on the Internet. There are five major stages of the proposed methodology which have been elaborated briefly below.
As IoT has several complexities, the ecosystem comprises several technologies which are self-sufficient for example networking of WSN as well as IPv6 for Low Power Wireless Personal Area Networks (6LoWPAN) (Chom Thungon et al. 2021). It is mandatory to acknowledge accurate assets of IoT for gaining capacity for their protection. For contribution to comparable objectives, there have been proposals of several IoT Reference Model (RMs) in literature which consists of the three-level model, a five-level model as well as a seven-level model (Matsumoto et al. 2021). Those RMs clarify the intricacy of IoT by collapsing it into several layers. There has not been an address of those building blocks that have been required for their levels that can be utilized by developers of IoT for easy construction of systems. Original building block RM has been inaugurated for IoT in most of the works that have been conducted earlier, as well as assets of IoT, has been being categorized into four major levels or elements: (a) Layer of physical object (b) Layer of communication (c) Rest Layer having data(d) Layer of Software. A layer of the physical object comprises junctions for computation (scholars of RFID and Junctionsof sensor) as well as tags of RFID. A layer of communication includes entire protocols of IoT which shields the entire stack of IoT as well as subsisting infrastructures of networks and this includes routers as well as switches. Data remaining in other layers consists of data that has been stored in objects of IoT or on Cloud Storage Service (CSS) (Sadeeq et al. 2021). A layer of software consists of middleware of IoT, applications of IoT as well as IOT OSs.
Research Question
How will the issues related to IoT security be reduced?
Several researchers have tried to solve the issues that have been related to IoT security while conducting their research. Several measures should be taken for resolving the issues that are related to the security of IoT. Protection, as well as security of the network that connects several devices of IoT, is of utmost importance. There is some conventional endpoint security that should be utilized: Antivirus, Anti-malware, and Firewalls. Encryption of data is essential between devices of IoT at rest as well as in transit. With the utilization of algorithms of encryption, encryption of data can be performed. Suitable testing has been required for the entire lifecycle of devices of IoT. This can be evaded into laptops as well as smartphones.
Potential Ethical or Legal Issues
Several issues are a matter of serious concern in the case of IoT security. Those issues have been described below :
- Working With Children
Devices of IOT should be made by which they should not harm children while they work with it. Online games should be encrypted as well as vulgar sites should be restricted to children so that they can be able to utilize IoT devices with ease.
- An External Client
The external client who has been connected with IOT devices should be able to utilize it with his or her ease. Data should be protected in every device of IoT so that hackers will not be able to hack their systems, as well as privacy of their data, will be maintained.
Conclusion
There has been an excessively large surface of attack as well as its software has been outdated. The scarcity of encryption may prove to be a risk for IoT security. Vulnerabilities of applications may prove beneficial for hackers who require correction. Dependable implementation environments have been scarce. After searching for security vulnerabilities, there has been the determination of the security posture of the vendor. Inadequate privacy preservation has been a great issue in IoT security (Yao et al. 2021). Ignorance of intrusion has been considered as one of the major issues in IoT security. In addition to that, inadequate physical security is another problem. Interaction of users has been another great issue in the case of IoT security.
References
Aspland, E., Gartner, D. and Harper, P., 2021. Clinical pathway modeling: a literature review. Health Systems, 10(1), pp.1-23.
Aspland, E., Gartner, D. and Harper, P., 2021. Clinical pathway modeling: a literature review. Health Systems, 10(1), pp.1-23.
Bhatt, S. and Ragiri, P.R., 2021. Security trends in Internet of Things: A survey. SN Applied Sciences, 3(1), pp.1-14.
Bhatt, S. and Ragiri, P.R., 2021. Security trends in Internet of Things: A survey. SN Applied Sciences, 3(1), pp.1-14.
Bouras, M.A., Lu, Q., Dhelim, S., and Ning, H., 2021. A Lightweight Blockchain-Based IoT Identity Management Approach. Future Internet, 13(2), p.24.
Bouras, M.A., Lu, Q., Dhelim, S., and Ning, H., 2021. A Lightweight Blockchain-Based IoT Identity Management Approach. Future Internet, 13(2), p.24.
Chegini, H., Naha, R.K., Mahanti, A. and Thulasiraman, P., 2021. Process Automation in an IoT–Fog–Cloud Ecosystem: A Survey and Taxonomy. IoT, 2(1), pp.92-118.
Chegini, H., Naha, R.K., Mahanti, A. and Thulasiraman, P., 2021. Process Automation in an IoT–Fog–Cloud Ecosystem: A Survey and Taxonomy. IoT, 2(1), pp.92-118.
Chom Thungon, L., Ahmed, N., Chandra Sahana, S., and Hussain, M.I., 2021. A lightweight authentication and key exchange mechanism for IPv6 over low‐power wireless personal area networks‐based internet of things. Transactions on Emerging Telecommunications Technologies, 32(5), p.e4033.
Chom Thungon, L., Ahmed, N., Chandra Sahana, S., and Hussain, M.I., 2021. A lightweight authentication and key exchange mechanism for IPv6 over low‐power wireless personal area networks‐based internet of things. Transactions on Emerging Telecommunications Technologies, 32(5), p.e4033.
Du, Y., Wang, Z. and Leung, V., 2021. Blockchain-Enabled Edge Intelligence for IoT: Background, Emerging Trends, and Open Issues. Future Internet, 13(2), p.48.
Du, Y., Wang, Z. and Leung, V., 2021. Blockchain-Enabled Edge Intelligence for IoT: Background, Emerging Trends, and Open Issues. Future Internet, 13(2), p.48.
Hughes-Lartey, K., Li, M., Botchey, F.E. and Qin, Z., 2021. The human factor, a critical weak point in the information security of an organization’s Internet of things. Heliyon, 7(3), p.e06522.
Hughes-Lartey, K., Li, M., Botchey, F.E. and Qin, Z., 2021. The human factor, a critical weak point in the information security of an organization’s Internet of things. Heliyon, 7(3), p.e06522.
Khan, A.F. and Anandharaj, G., 2021. Ahkam: an improved class of hash-based key management mechanisms with a combined solution for the single-hop and multi-hop nodes in it. Egyptian Informatics Journal, 22(2), pp.119-124.
Khan, A.F. and Anandharaj, G., 2021. Ahkam: an improved class of hash-based key management mechanisms with a combined solution for the single-hop and multi-hop nodes in it. Egyptian Informatics Journal, 22(2), pp.119-124.
Kuzlu, M., Fair, C. and Guler, O., 2021. Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discover the Internet of Things, 1(1), pp.1-14.
Kuzlu, M., Fair, C. and Guler, O., 2021. Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discover the Internet of Things, 1(1), pp.1-14.
Matsumoto, N., Fujita, J., Endoh, H., Yamada, T., Sawada, K. and Kaneko, O., 2021. Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures. Information, 12(11), p.460.
Matsumoto, N., Fujita, J., Endoh, H., Yamada, T., Sawada, K. and Kaneko, O., 2021. Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures. Information, 12(11), p.460.
Oktian, Y.E., Witanto, E.N. and Lee, S.G., 2021. A Conceptual Architecture in Decentralizing Computing, Storage, and Networking Aspect of IoT Infrastructure. IoT, 2(2), pp.205-221.
Oktian, Y.E., Witanto, E.N. and Lee, S.G., 2021. A Conceptual Architecture in Decentralizing Computing, Storage, and Networking Aspect of IoT Infrastructure. IoT, 2(2), pp.205-221.
Sadeeq, M.M., Abdulkareem, N.M., Zeebaree, S.R., Ahmed, D.M., Sami, A.S., and Zebari, R.R., 2021. IoT and Cloud computing issues, challenges and opportunities: A review. Cuban Academic Journal, 1(2), pp.1-7.
Sadeeq, M.M., Abdulkareem, N.M., Zeebaree, S.R., Ahmed, D.M., Sami, A.S., and Zebari, R.R., 2021. IoT and Cloud computing issues, challenges and opportunities: A review. Cuban Academic Journal, 1(2), pp.1-7.
Sharma, G., Vidalis, S., Anand, N., Menon, C., and Kumar, S., 2021. A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues. Electronics, 10(19), p.2365.
Sharma, G., Vidalis, S., Anand, N., Menon, C., and Kumar, S., 2021. A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues. Electronics, 10(19), p.2365.
Shi, P., Wang, H., Yang, S., Chen, C. and Yang, W., 2021. Blockchain‐based trusted data sharing among trusted stakeholders in IoT. Software: practice and experience, 51(10),
Shi, P., Wang, H., Yang, S., Chen, C. and Yang, W., 2021. Blockchain‐based trusted data sharing among trusted stakeholders in IoT. Software: practice and experience, 51(10), pp.2051-2064.
Yao, X., Farha, F., Li, R., Psychoula, I., Chen, L., and Ning, H., 2021. Security and privacy issues of physical objects in the IoT: Challenges and opportunities. Digital Communications and Networks, 7(3), pp.373-384.