Conference On Networks And Communications – Issues And Challenges In IoT Security

IoT Technology and its Potential

Discuss About The Conference On Networks And Communications.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The technology of the Internet of Things (IoT) could be defined as the network of computers, which are interconnected with each other with the help of internet connection (Wortmann & Flüchter, 2015). The low cost of the processors and the wireless based networks have the potential to make the technology of IoT to be successful. With the implementation of the IoT based technology, it would supply an additional level of intelligence for the devices. With the intelligence gained, the IoT based devices would be able to relate and communicate with the other devices without any kind of human based interaction (Gubbi et al., 2013). The IoT based technology would be able to combine the possible gaps within the digital and the physical worlds. The IoT based technology has the ability to turn a physical object into an IoT based device, which could be controllable with the help of an internet-based connection.

The emergence of the IoT based technology and the ever increasing number of the devices, which are being connected with the help of the internet has been leading to a large number of problems within the security of the devices (Rifkin, 2014). This research paper would discuss and then focus on the several kind of issues that would arise with the escalating growth of the IoT based networks. The main area of concern within the IoT network should be in relation with the protection and the security of the interconnected devices (DEZHIGR & HOOSHMAND, 2017). The primary purpose of the security within the IoT network is to maintain the confidentiality of the information of the user and discuss about the issues that would arise within the security of the devices (Sicari et al., 2015).

The topic of the research would be able to discuss about the aspects of the security within the network of IoT. The IoT based security is an important aspect as the devices within the IoT framework might contain the important details of the user. The devices that are connected within the IoT framework make use of a number of sensors for a wide range of devices. The sensors that are enabled within the IoT based devices utilize the different type of variables, which may include the heart rate, speed, temperature and many others (Khalil et al., 2014).

With the implementation of these kind of important variables, there would be a major need for the security within the IoT environment (Sivaraman et al., 2015). The devices within the IoT have a low processing capacity, limited amount of memory and lower power of the battery. Thus, the traditional security mechanisms for the IoT based devices would sometimes be inefficient for dealing with the different situations for the security that would be arising with the ever-changing trends within the environment of IoT. The various kind of devices that are getting connected within the interconnected framework. They would be able to continue to perform their functions by using lower bandwidth (He, Yan & Da Xu, 2014).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Challenges in IoT Network Security

There is another problem that has majorly affected the IoT framework. The solutions for the security of the devices might be standardized for any of the area of the application. The IoT based environment is affected due to the extreme need for the interconnection between the devices (Botta et al., 2014).

The entire research would be based on the several forms of discussion, which could arise within the security and the privacy of the devices in the IoT framework. As the latest technical advancements within the framework of IoT are bringing major changes with the interoperability of the devices, hence it would be extremely crucial to maintain the secrecy of the private data of the user.

The IoT is a form of a wide-ranging network of the everyday objects that are in connection with each other with the help of the internet. The devices within the internet framework are accessible, addressable and are able to communicate with each other (Huang, Zhu & Zhang, 2014). Every object within the IoT framework would have their own designated ID. They have the capability to communicate with other devices, sense and would also be able to compute the basic problems. The nature of pervasiveness of the various kind of objects within IOT would enable the collection and the transmission of the data for the private and the public use (Vlacheas et al., 2013). The data integrity and the confidentiality of the data, which is transmitted should be maintained properly. The authentication of the different kind of objects is one of the major aspects of the IoT based framework. The major issues to the security of the devices within the network of IoT is authentication, identification of the devices and the data and heterogeneity of the data (Tonjes et al., 2014). There are a number of different kind of challenges, which are needed to be considered within the IoT framework that includes the mechanism of the communication in scalability, integration, ethics and the surveillance within the various models of the business.

There are many major technologies within the IoT framework. These would include the Wireless Sensor Networks (WSN), Radio Frequency Identification (RFID) and the Near Field Communication (NFC).

Wireless Sensor Networks (WSN) – This is a kind of technology for the purpose of the use in the field of remote sensing and with the collection of the information. The wireless networks are good in the power of efficiency, consume less amount of power and are cost effective. The problems within the WSN could be solved with the help of the deterministic algorithm that has the ability to cover the common regions (Turanovic, Brumen & Holbl, 2014)

Security Framework and Requirements

Radio Frequency Identification (RFID) – This is one of the major form of technology that is used. Every object that is in connection with the IoT framework would have a smart tag, which is embedded within the devices (Zou et al., 2014). This would help in the configuration of the other devices, which would be possible with the help of computers. The objects with the network of the IoT has an embedded microprocessor or a smart chip. This would provide the capability to the devices in order to sense the other devices that are also connected within the network of the internet, compute the necessary information and then would be able to communicate the results to other objects or humans (Lee & Lee, 2015).

Near Field Communication (NFC) – NFC is regarded as one of the prime technologies that are mainly used for the communication within the various kind of devices that are in close connection with each other. The NFC based technology make use of low power and require data. This technology is also capable of supporting some basic features of IoT that would include control of the accessibility, transport, smart cards and other kinds of facilities (Coskun, Ozdenizci & Ok, 2013).

The network of IoT has been able to cover a wide range of the application products. With the increasing use of the number of devices, there is a high need of the number of protocols. The different kind of protocols that are used for the use in the higher level would be assigned to specific vendors. They would provide the scope for the exact selection of the different kind of capabilities and the features (Granjal, Monteiro & Silva, 2015).

The Quick UDP Internet Connection (QUIC) is a form of protocol that makes use of the User Datagram Protocol (UDP). This protocol would be capable of supporting a merged group of several connections. The QUIC protocol owns the capability to provide security similar to the to the Transport Layer Security or with the Secured Sockets Layer. The protocol has the additional feature of the reduction of the latency of transport and the number of the connections. The QUIC protocol is designed in such a way that it would be able to estimate the bandwidth in both directions. This would help in the avoidance of the problems related with the congestion of the networks (Zanella et al., 2014).

Technologies in IoT Networks

The Datagram Transport Layer (DTLS) is another form of protocol that is primarily responsible for the supply to the privacy of the communication for the purpose of UDP. The DTLS protocol would be helpful in enabling the applications of the server/client in order to be eligible for any such issues with the interfering of the messages, imitation of the messages or eavesdropping. These are to be avoided.

The devis that are connected within the IoT framework have a restricted amount of resources. Hence the complete security suite could not be provided and used. Specially designed frameworks for the purpose of security could be designed or they could even be acquired from the existing solutions. For providing solutions based on the security, lightweight solutions have to be made for the purpose of securing the IoT network.

Requirements of the Security Framework – The impact on the privacy and the security of the data of different users would be entirely based on the architecture of IoT. The meaning of the security and the privacy would be necessary in order to secure the data of the user within the IoT environment. The privacy of any information is the individual right (Bernabe et al., 2014).

1.1 Privacy of the User – There are certain number of steps, which is needed to be persuaded so that the supplier of the information would be able to abstain from a lookup system that is in connection with the user. The most important requirement within the IoT networks is to keep a focus and thus be able to enhance the user privacy and secure the information in an efficient way.

The tagging of the data would also be needed to be put forward for the sole purpose of managing the privacy of the information within the IoT environment. This process is also meant to preserve the important data that would be able to demonstrate the privacy model.

1.2 Control of Access – The information provider should be capable of applying any kind of mechanism for the purpose of the control of access. This would mean to secure the data from any kind of potential misuses and any form of damage to the private based information.

1.3 Management of the Identity – The IoT network is mainly considered as one of the vast area of administration that deal with the identification of any type of object by using different forms of techniques within the system. This would be able to control the access by providing the rights to the users and putting some barriers to the identity that has been identified (Zhao & Ge, 2013).

QUIC and DTLS Protocols

1.4 Secure Communication of Data – The communication of the secured form of information would be considered as one of the important part in the environment of IoT. This process would include the authentication of the various objects, which would be able to communicate and thus maintain the data integrity. This would also involve the method of data protection within the objects that are communicating with each other (Jing et al., 2014). 

1.5 Resilience against Attacks – Several attackers are capable of discovering and exploiting any such kind of vulnerability within the pre-existing system in relation with the open and the IoT connected world. The IoT based systems should be capable of supporting any such kind of mechanism in order to protect themselves from any such kind of vulnerable attacks. The IoT based system should protect themselves against single point of failure and they should be able to adjust in several cases of node-based failures

1.6 Mobile Based Security – There is always a regular movement of the nodes of the mobile from one part of the cluster of networks to another part of the IoT based network. In order to allow for the privacy of the data, a protocol based on cryptography should be constantly kept in usage. The ad-hoc based protocol should be able to provide the ability for the quick supply of the several kind of protections and thus provide guard against the attacks. The attacks would include the process of eavesdropping, the tracking of the location and the replay based attack and many other kinds of attacks.

Technologies for Enhancing of the Privacy – The primary area of concern for the issues related to the privacy and the security of the data within the framework of IoT is in direct relation with the privacy of the data of the user. To enhance the private data of the user, there a number of technologies that are currently being used.

2.1 Security of the Transport Layer – The Transport Layer Security (TLS) is extremely helpful in order to increase the integrity and the confidentiality within the data within the network of IoT. The major issue within the TLS is that each of the object would have a major requirement of the connection based on the TLS and they would in search for the information.

2.2 Virtual Private Network – These are the kind of networks, which could be easily accessible from the outside based area that would be formed with the help of a close group. The VPN based networks could easily access the IoT based systems. This would promise to main the user confidentiality and the maintenance of the data integrity. The VPN is not responsible for providing the information. The information would remain confined within a limited area that would help in enhancing the privacy of the information.

2.3 Encryption of the Data – The majority of the devices that are in connection with the framework of IoT are operated on the power of the battery. The technology of encryption would be able to provide constraints for low processing power based algorithms. The encryption could be performed for the purpose of data integration and the transportation of useful data.

2.4 Onion Routing – This is considered as one of the technique for enhancing the data privacy, which would be able to encrypt and thus merge the traffic of internet for several kind of sources. The technology of onion routing could affect the matching of the different packets of data from a particular source.

Major Issues of Security – The IoT based technology through the change of time. It has been a major change within the technical field. In order to design the IoT network in a feasible way, it is extremely important to reduce the costs and hence increase the number of devices, which would be supported by the devices. There are a major of technical issues along with the security issues that would be needed to be solved before the goals would be achieved for the purpose of wider adoption of the IoT based environment.

The major technical based issues within the framework of IoT would include the wireless communication, security of the energy and the scalability. The vital issues that are in relation with the security are:  

3.1 Identification – The identification of any kind of device that would be mainly required for the purpose of keeping a check based on the originality or any form of malicious code. There would be a need for the purpose of the reference of the manufacturer.

3.2 Authentication – The biggest issue within the environment of IoT is of authentication. The authentication of every connected device within the framework of IoT is a difficult task. There are many mechanisms for the security that had been proposed earlier and they would be based on the cryptographic based primitives of the private key.

3.3 Management of the Data – The prime problem within the environment of IoT would be based on the identification of the several kind of devices and thus would address the various kind of issues, which might arise (Abomhara & Koien, 2014).

Remediation of the Problems – Various kinds of solutions to the various issues that are in relation with the privacy and security in the IoT framework are:

4.1 Identification – The identification of the several devices could be performed by considering the physical addresses of the deployment with the help of the IPv6.

4.2 Authentication – The authentication based process of the several devices within the current timeframe could be regarded as an issue. The RFID is able to play a major role for the identification based purposes based on the several kind of objects. The process of authentication makes use of the electromagnetic induction and the propagation of the electromagnetic waves for the purpose of identification of the different objects (Xiaohui, 2013).

4.3 Management of the Data – The process of identification with the help of the bar coded image would be considered as the common methods and thus would consume less amount of power. The barcode scanner would be able to scan the barcoded image that would be able to transfer the data, which would be identifies with the help of computers (Wu et al., 2016).

Conclusion

Based on the above report, it could be concluded that in the recent times, IoT could be taken into consideration as one of the important part related to the future of the internet technology. With the ongoing developments within the IoT environment, the privacy and the security of the devices that are in connection with the internet would also be needed to be developed. To achieve the goal of the security and the privacy of the information, a proper framework design is extremely crucial. There are some major research areas in which the focus should be put such as the appropriate use of the Big Data, dependencies, openness, scaling and architecture. As there is no such standards for the IoT architecture, it is extremely crucial to have a form of architecture. This would help in the control, communication and the connectivity of the information. The need of a proper framework for the security of the devices should be taken into deep consideration. The research paper has also put a deep focus on the on the several forms of the privacy of the data of the user and the issues of the security within the IoT framework. These aspects also include the applications and the architecture of the IoT.   

References

Abomhara, M., & Køien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on (pp. 1-8). IEEE.

Bernabe, J. B., Hernández, J. L., Moreno, M. V., & Gomez, A. F. S. (2014, December). Privacy-preserving security framework for a social-aware internet of things. In International conference on ubiquitous computing and ambient intelligence(pp. 408-415). Springer, Cham.

Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2014, August). On the integration of cloud computing and internet of things. In Future internet of things and cloud (FiCloud), 2014 international conference on (pp. 23-30). IEEE.

Coskun, V., Ozdenizci, B., & Ok, K. (2013). A survey on near field communication (NFC) technology. Wireless personal communications, 71(3), 2259-2294.

DEZHGIR, H., & HOOSHMAND, H. (2017). SECURITY ON THE INTERNET OF THINGS.

Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294-1312.

Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.

He, W., Yan, G., & Da Xu, L. (2014). Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics, 10(2), 1587-1595.

Huang, H., Zhu, J., & Zhang, L. (2014). An SDN_based management framework for IoT devices.

Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8),

Khalil, N., Abid, M. R., Benhaddou, D., & Gerndt, M. (2014, April). Wireless sensors networks for Internet of Things. In Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on (pp. 1-6). IEEE.

Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.

Rifkin, J. (2014). The zero marginal cost society: The internet of things, the collaborative commons, and the eclipse of capitalism. St. Martin’s Press.

Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, 146-164.

Sivaraman, V., Gharakheili, H. H., Vishwanath, A., Boreli, R., & Mehani, O. (2015, October). Network-level security and privacy control for smart-home IoT devices. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on (pp. 163-167). IEEE.

Tönjes, R., Barnaghi, P., Ali, M., Mileo, A., Hauswirth, M., Ganz, F., … & Puiu, D. (2014). Real time iot stream processing and large-scale data analytics for smart city applications. In poster session, European Conference on Networks and Communications.

Turkanovi?, M., Brumen, B., & Hölbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks, 20, 96-112.

Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Foteinos, V., Poulios, G., … & Moessner, K. (2013). Enabling smart cities through a cognitive management framework for the internet of things. IEEE communications magazine, 51(6), 102-111.

Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information Systems Engineering, 57(3), 221-224.

Wu, D. J., Taly, A., Shankar, A., & Boneh, D. (2016, September). Privacy, discovery, and authentication for the internet of things. In European Symposium on Research in Computer Security (pp. 301-319). Springer, Cham.