SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 868
INTERNET OF THINGS, EXAMPLES and ISSUES
Namratha Kalasannavar
Assistant Professor Department of Master of Computer Applications
Sambhram Institute of Technology, Bangalore
-----------------------------------------------------------******--------------------------------------------------------------------
Abstract: These days Internet of Thing is getting
even popular with the way technology is moving and
today’s world is almost depend upon Internet of
Things. From home facilities to traffic management in
a smart city can help to develop a nation with Internet
of Things. There are more advantages for using
Internet of Things, but with usage of Internet of Things
there is more number of frauds causes due to more
usage and due to low privacy settings. There are three
different levels of Internet of Things. To overcome of
fraud and issue to Internet of Things can secure using
the secured products.
Keywords: Internet of Thing, Examples of Internet
of Things, Issues in IOT, Levels of IOT
INTRODUCTION
These days Internet of Thing is getting even
popular with the way technology is moving and
taking its new form the internet of things
changing everything about the world we live it
from where we make purchases and even how
we get energy for our homes. In the world of
today you see people talking connecting but not
for the voices but with things things, that are
close to their heart and within arm's reach things
that are at their fingertips that measure the
inspiration and things that I've with them every
step of the way all of it is possible because the
Internet of Things has made it possible. [1]
Billions of things talking to each other providing
insight continuously. How the world's best run
businesses responding how they integrating the
core of their businesses with the edge of the
network. Simple they're connecting the business
with technology to get these things to speak the
same language gathering intelligence and
transforming their existing business, processes
and ultimately reimagining their customers’
experiences, which in the end is turning millions
of customers into millions of fun. Sophisticated
sensors and chips are embedded in the physical
things that surround us is transmitting valuable
data that lets us better understand how these
things work and work together how exactly do
these devices share such large quantities of data
and how we put that information to work.
Whether we are improving the production of a
factory giving cities and real-time updates on
where to park our monitoring a personal health
it's a common Internet of Things, platform that
brings divers information together and provides
a common language for the devices and apps to
communicate with each other. The process starts
within the device itself with security
communicates for the Internet of Things
platform/ this platform integrates the data from
many devices and applies analytics to share the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 869
most valuable data with applications that
address industry specific needs.
EXAMPLES OF IOT
Transportation system internet of thing is
intended to play an essential role for Ivy to see
its full potential there are many challenges that
need to be addressed including collecting real-
time vehicle information and on time delivery
rate optimizing dispatch and fleet arrangement.
To improve the operating performance and
reducing manpower and fuel costs. The ultimate
goal is to achieve a more efficient safe. Handheld
device can be used to track location and
movement of vehicles in real-time it not only
helps fleet drivers complete their missions on
time but also enables fleet. Managers to flexibly
dispatch orders as for taxi fleet management
wireless data recorder is a smart taxi solution
integrating hail taxi app and taxi passenger
matching service. It enables the taxi company to
quickly locate the calling customer and assign a
suitable taxi thus taxi idle time can be effectively
reduced the result is greater fleet utilization and
operation performance regarding public
Transportation. Computer comes with features
like power on/off delay and why temperature
support it also can be used to monitor vehicle
information like temperature pressure oil and
engine speed for vehicle safety control besides
this the in-vehicle. Digital signage solution
enables customized contents so that marketing
messages are aimed to target audiences. A cloud-
based device management solution to manage all
the mobile devices over-the-air it facilitates
administrative tasks like remote control real-
time tracking and app management. It also
protects corporate data with remote lock and
wipe in case of devices stolen or lost.
There are million vehicles. Every year we spend
hundreds of millions of rupees maintaining these
roads. Dealing with flooding if we need where
and when these problems might happen we
could make better plans. So we put data sensors
in our cities. the moments on our alarm posts
and collected data on traffic flow weather and
road maintenance. Then made all this
information available in one place and called it
the heart. Now we can repair roads more
efficiently clean the cities only when they need
cleaning with the right places at the right times
we are creating more efficient systems to
manage our highways to help save resources
money.
BENEFITS AND RISKS
The Internet of Things describes the ever-
growing number of intelligent objects that are
being connected to the internet and each other.
These systems are infiltrating the heart of our
critical infrastructure and are forming the basis
of current and future smart services.
Smartphones tablets wearable technology and
smart home devices are now being adopted into
our everyday and they're starting to appear on
enterprise networks. As we continue to embed
these interconnected objects and a wider variety
of wireless devices infiltrate enterprise
infrastructure's the security risks posed by the
Internet of Things is becoming more complex
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 870
and may have serious consequences. Some of
these risks are already emerging, for example
many Internet of Things devices in our homes
can be connected to a smart hub for easier setup
and use. Unfortunately some of these smart hubs
contain serious vulnerabilities that could allow
an attacker to walk up to the front door and
unlock a smartlock that is connected to a smart
hub. For specific smart hub products this is one
hundred percent certain if the attacker
successfully gains access to our home's Wi-Fi
network. Vulnerabilities in these devices may
also allow cybercriminals to search and locate
these smart locks while driving around a city
known as war driving. Attackers could then hack
into the Smart Hub. To see which devices are
attached and even monitors the home through
its security cameras. By exploiting these security
vulnerabilities hackers may become uninvited
guest to our homes. [2]
A smartphone actually a multi-purpose pocket-
computer, that stays connected at all times and
goes with me wherever I go and with this simple
device and I generate an astounding amount of
personal information, like pictures and videos.
My web browsing GPS locations financial
information and even health information. Now
here's a question what happens to all this
sensitive data. We all know our data is stored
locally on our devices but did you know they are
also recorded onto third-party cloud storage
systems. Where large businesses can learn more
about their users. not only is this unfair privacy
is also jeopardized as cloud systems have been
prone to security attacks and sensitive data leak
into the wrong hands every day and the plot is
about to get much thicker. Everyday ordinary
household items and appliances like thermostats
refrigerators alarm clocks, activity trackers and
even light bulbs are being embedded with sensor
technology. We are about to enter the age of the
Internet of Things and it is predicted in a few
years there will be millions of these devices. For
this issues we need to build a product to connect
with all your IOT devices and securely collect
back up and transfer your data within your own
network every piece of data in the product is
encrypted individually and are only accessible to
the primary users unauthorized parties would
have to try to decrypt each piece of data
individually if possible at all and for data sharing
the product allows you to create your own
circles this can be personal professional or even
medical circles. Let your physician track your
health and activity monitoring devices let your
friends track the type of music you're purchasing
set privacy restrictions on your service providers
for a change the possibilities are endless and you
will always be in control. Remember no
institution and protect the privacy of your
personal information better than you the
product with power back into your hands
SECURITY MEASURES
The Internet of Things and the exponential
growth of associated technologies have presently
reached 6 billion connected devices. Machines
connect to each other. This automatic exchange
of information with no human intervention
opens up a new world of services and products.
the range of peyote solutions as well as the
number of diverse environment within which it
is used. Conversely generates the potential for
security breaches to be established across this
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 871
heterogeneous web-connected thing. we are
facing a global scenario where security is no
longer an option but is a mandatory requirement
that we need to address. There are three basic
security premises to follow:
 Prevention: deter attacks to avoid losses
 Detection: identify attacks to enable
rapid and thorough response
 Respondents: address and mitigate the
incident as soon as possible in structured
way to minimize losses and allow return
to normal operating business.[3]
There are three security levels
Level 1) Secure Network IOT infrastructure:
security measures used within the
communication infrastructure such as virtual
private networks dedicated and secure links.
Level 2) Secure IOT enable layer:
communication related alerts and automated
responses these include the detection of
replacement devices or a change in location or
devices which shouldn't move. Such as a meat
allowed to call only the authorized telephone
numbers.
Level 3) Secure IOT business IT and devices:
these extra security levels enables end-to-end
security in our customers IT business and
manage devices. level 3 offers comprehensive
and
Innovative solutions including trusted public
infrastructure provides a unique digital identity
to IOT devices by our digital certificate SSL
allowing mutually strong authentication
between the IOT solutions this society and the
device. [4]
Thread detection: supplies and hence the
information to improve awareness and inside of
potential security exposure in the digital world
and the associated identity threats and risks.
Vulnerability management delivers a global
security view of the IOT solution through
penetration testing and the identification of
potential risks.
Security monitoring administers and protects
IOT information with real-time alert notification
and reporting.
Security incident response manages critical
security incidents and resolution by
implementing clear and agrees business
solutions and protocol. [5]
REFERENCES
[1] Md. Mahmud Hossain, Maziar Fotouhi, and
Ragib Hasan, “Towards an Analysis of Security
Issues, Challenges, and Open Problems in the
Internet of Things”
[2] Andrea Zanella, “Internet of Things for Smart
Cities”, IEEE, 2014
[3]Friedemann Mattern and Christian
Floerkemeier, “From the Internet of Computers
to the Internet of Things”
[4] Mohamed Abomhara, Geir M. Køien “Security
and Privacy in the Internet of Things:Current
Status and Open Issues”
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 872
[5] Liane Margarida Rockenbach Tarouco, Lucas
Mendes Ribeiro Arbiza “Internet of Things in
Healthcare: Interoperatibility and Security
Issues”

More Related Content

PPT
What Is Internet of Things?
PPTX
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
PPTX
What is the Internet of Things? How does it Work?
PDF
A management introduction to IoT - Myths - Pitfalls - Challenges
PPTX
Internet Of Things
PPTX
INTERNET OF THINGS
PDF
Internet of things
What Is Internet of Things?
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
What is the Internet of Things? How does it Work?
A management introduction to IoT - Myths - Pitfalls - Challenges
Internet Of Things
INTERNET OF THINGS
Internet of things

What's hot (20)

PPTX
Internet of things
PPTX
Internet of things-Introduction
PPTX
Internet of Things Connectivity for Embedded Devices
PPTX
Internet of things
PDF
IoT White Paper
PDF
Introduction to the Internet of Things
PDF
Internet of Things
DOCX
Emergingtreands class11 cs
PDF
IRJET-The Internet of Things Applications for Challenges and Related Future T...
PDF
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
DOCX
The Future of the Internet - The Next 30 Years
PPTX
Internet Of Things - Tech Talk
DOCX
Internet of things
PDF
IBM Xforce Q4 2014
PDF
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
PPTX
IOT Success depends on Integration
PDF
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
PDF
Harbor Research and Postscapes Infographic
PDF
Internet of Things- Remote Desktop & Wireless Hibernation
PDF
Current Trends in Internet of Things (IOT)
Internet of things
Internet of things-Introduction
Internet of Things Connectivity for Embedded Devices
Internet of things
IoT White Paper
Introduction to the Internet of Things
Internet of Things
Emergingtreands class11 cs
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
The Future of the Internet - The Next 30 Years
Internet Of Things - Tech Talk
Internet of things
IBM Xforce Q4 2014
Sensing as-a-Service - The New Internet of Things (IOT) Business Model
IOT Success depends on Integration
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
Harbor Research and Postscapes Infographic
Internet of Things- Remote Desktop & Wireless Hibernation
Current Trends in Internet of Things (IOT)
Ad

Similar to Internet of Things, Examples and Issues (20)

PDF
Simon Harrison RWE - Chain of Things 010616 final
PDF
Application and Usefulness of Internet of Things in Information Technology
PPTX
All The Things: Security, Privacy & Safety in a World of Connected Devices
PPTX
IOT.pptx
PPTX
Internet of Things
PPTX
Internet of Things
PPTX
The internet of things (io t)
PPTX
The internet of things (io t) : IoT academy
PPTX
IoT and the industrial Internet of Things - june 20 2019
PPTX
Internet of Things
PDF
IoT Internet of things
PPTX
Internet of Things
PDF
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
PPTX
IOT – Internet of things.pptx (A Brief Introduction)
PPTX
IOT – Internet of things.pptx A Brief Introduction
PPTX
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
PPTX
IOT presentation.pptx
PDF
Internet of Things: manage the complexity, seize the opportunity
PPTX
Future of Internet.pptx
PDF
The Internet Of Things ( Iot And The Internet
Simon Harrison RWE - Chain of Things 010616 final
Application and Usefulness of Internet of Things in Information Technology
All The Things: Security, Privacy & Safety in a World of Connected Devices
IOT.pptx
Internet of Things
Internet of Things
The internet of things (io t)
The internet of things (io t) : IoT academy
IoT and the industrial Internet of Things - june 20 2019
Internet of Things
IoT Internet of things
Internet of Things
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
IOT – Internet of things.pptx (A Brief Introduction)
IOT – Internet of things.pptx A Brief Introduction
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
IOT presentation.pptx
Internet of Things: manage the complexity, seize the opportunity
Future of Internet.pptx
The Internet Of Things ( Iot And The Internet
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPT
Project quality management in manufacturing
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
OOP with Java - Java Introduction (Basics)
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
CH1 Production IntroductoryConcepts.pptx
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Project quality management in manufacturing
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
573137875-Attendance-Management-System-original
bas. eng. economics group 4 presentation 1.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Arduino robotics embedded978-1-4302-3184-4.pdf
Digital Logic Computer Design lecture notes
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx

Internet of Things, Examples and Issues

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 868 INTERNET OF THINGS, EXAMPLES and ISSUES Namratha Kalasannavar Assistant Professor Department of Master of Computer Applications Sambhram Institute of Technology, Bangalore -----------------------------------------------------------******-------------------------------------------------------------------- Abstract: These days Internet of Thing is getting even popular with the way technology is moving and today’s world is almost depend upon Internet of Things. From home facilities to traffic management in a smart city can help to develop a nation with Internet of Things. There are more advantages for using Internet of Things, but with usage of Internet of Things there is more number of frauds causes due to more usage and due to low privacy settings. There are three different levels of Internet of Things. To overcome of fraud and issue to Internet of Things can secure using the secured products. Keywords: Internet of Thing, Examples of Internet of Things, Issues in IOT, Levels of IOT INTRODUCTION These days Internet of Thing is getting even popular with the way technology is moving and taking its new form the internet of things changing everything about the world we live it from where we make purchases and even how we get energy for our homes. In the world of today you see people talking connecting but not for the voices but with things things, that are close to their heart and within arm's reach things that are at their fingertips that measure the inspiration and things that I've with them every step of the way all of it is possible because the Internet of Things has made it possible. [1] Billions of things talking to each other providing insight continuously. How the world's best run businesses responding how they integrating the core of their businesses with the edge of the network. Simple they're connecting the business with technology to get these things to speak the same language gathering intelligence and transforming their existing business, processes and ultimately reimagining their customers’ experiences, which in the end is turning millions of customers into millions of fun. Sophisticated sensors and chips are embedded in the physical things that surround us is transmitting valuable data that lets us better understand how these things work and work together how exactly do these devices share such large quantities of data and how we put that information to work. Whether we are improving the production of a factory giving cities and real-time updates on where to park our monitoring a personal health it's a common Internet of Things, platform that brings divers information together and provides a common language for the devices and apps to communicate with each other. The process starts within the device itself with security communicates for the Internet of Things platform/ this platform integrates the data from many devices and applies analytics to share the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 869 most valuable data with applications that address industry specific needs. EXAMPLES OF IOT Transportation system internet of thing is intended to play an essential role for Ivy to see its full potential there are many challenges that need to be addressed including collecting real- time vehicle information and on time delivery rate optimizing dispatch and fleet arrangement. To improve the operating performance and reducing manpower and fuel costs. The ultimate goal is to achieve a more efficient safe. Handheld device can be used to track location and movement of vehicles in real-time it not only helps fleet drivers complete their missions on time but also enables fleet. Managers to flexibly dispatch orders as for taxi fleet management wireless data recorder is a smart taxi solution integrating hail taxi app and taxi passenger matching service. It enables the taxi company to quickly locate the calling customer and assign a suitable taxi thus taxi idle time can be effectively reduced the result is greater fleet utilization and operation performance regarding public Transportation. Computer comes with features like power on/off delay and why temperature support it also can be used to monitor vehicle information like temperature pressure oil and engine speed for vehicle safety control besides this the in-vehicle. Digital signage solution enables customized contents so that marketing messages are aimed to target audiences. A cloud- based device management solution to manage all the mobile devices over-the-air it facilitates administrative tasks like remote control real- time tracking and app management. It also protects corporate data with remote lock and wipe in case of devices stolen or lost. There are million vehicles. Every year we spend hundreds of millions of rupees maintaining these roads. Dealing with flooding if we need where and when these problems might happen we could make better plans. So we put data sensors in our cities. the moments on our alarm posts and collected data on traffic flow weather and road maintenance. Then made all this information available in one place and called it the heart. Now we can repair roads more efficiently clean the cities only when they need cleaning with the right places at the right times we are creating more efficient systems to manage our highways to help save resources money. BENEFITS AND RISKS The Internet of Things describes the ever- growing number of intelligent objects that are being connected to the internet and each other. These systems are infiltrating the heart of our critical infrastructure and are forming the basis of current and future smart services. Smartphones tablets wearable technology and smart home devices are now being adopted into our everyday and they're starting to appear on enterprise networks. As we continue to embed these interconnected objects and a wider variety of wireless devices infiltrate enterprise infrastructure's the security risks posed by the Internet of Things is becoming more complex
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 870 and may have serious consequences. Some of these risks are already emerging, for example many Internet of Things devices in our homes can be connected to a smart hub for easier setup and use. Unfortunately some of these smart hubs contain serious vulnerabilities that could allow an attacker to walk up to the front door and unlock a smartlock that is connected to a smart hub. For specific smart hub products this is one hundred percent certain if the attacker successfully gains access to our home's Wi-Fi network. Vulnerabilities in these devices may also allow cybercriminals to search and locate these smart locks while driving around a city known as war driving. Attackers could then hack into the Smart Hub. To see which devices are attached and even monitors the home through its security cameras. By exploiting these security vulnerabilities hackers may become uninvited guest to our homes. [2] A smartphone actually a multi-purpose pocket- computer, that stays connected at all times and goes with me wherever I go and with this simple device and I generate an astounding amount of personal information, like pictures and videos. My web browsing GPS locations financial information and even health information. Now here's a question what happens to all this sensitive data. We all know our data is stored locally on our devices but did you know they are also recorded onto third-party cloud storage systems. Where large businesses can learn more about their users. not only is this unfair privacy is also jeopardized as cloud systems have been prone to security attacks and sensitive data leak into the wrong hands every day and the plot is about to get much thicker. Everyday ordinary household items and appliances like thermostats refrigerators alarm clocks, activity trackers and even light bulbs are being embedded with sensor technology. We are about to enter the age of the Internet of Things and it is predicted in a few years there will be millions of these devices. For this issues we need to build a product to connect with all your IOT devices and securely collect back up and transfer your data within your own network every piece of data in the product is encrypted individually and are only accessible to the primary users unauthorized parties would have to try to decrypt each piece of data individually if possible at all and for data sharing the product allows you to create your own circles this can be personal professional or even medical circles. Let your physician track your health and activity monitoring devices let your friends track the type of music you're purchasing set privacy restrictions on your service providers for a change the possibilities are endless and you will always be in control. Remember no institution and protect the privacy of your personal information better than you the product with power back into your hands SECURITY MEASURES The Internet of Things and the exponential growth of associated technologies have presently reached 6 billion connected devices. Machines connect to each other. This automatic exchange of information with no human intervention opens up a new world of services and products. the range of peyote solutions as well as the number of diverse environment within which it is used. Conversely generates the potential for security breaches to be established across this
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 871 heterogeneous web-connected thing. we are facing a global scenario where security is no longer an option but is a mandatory requirement that we need to address. There are three basic security premises to follow:  Prevention: deter attacks to avoid losses  Detection: identify attacks to enable rapid and thorough response  Respondents: address and mitigate the incident as soon as possible in structured way to minimize losses and allow return to normal operating business.[3] There are three security levels Level 1) Secure Network IOT infrastructure: security measures used within the communication infrastructure such as virtual private networks dedicated and secure links. Level 2) Secure IOT enable layer: communication related alerts and automated responses these include the detection of replacement devices or a change in location or devices which shouldn't move. Such as a meat allowed to call only the authorized telephone numbers. Level 3) Secure IOT business IT and devices: these extra security levels enables end-to-end security in our customers IT business and manage devices. level 3 offers comprehensive and Innovative solutions including trusted public infrastructure provides a unique digital identity to IOT devices by our digital certificate SSL allowing mutually strong authentication between the IOT solutions this society and the device. [4] Thread detection: supplies and hence the information to improve awareness and inside of potential security exposure in the digital world and the associated identity threats and risks. Vulnerability management delivers a global security view of the IOT solution through penetration testing and the identification of potential risks. Security monitoring administers and protects IOT information with real-time alert notification and reporting. Security incident response manages critical security incidents and resolution by implementing clear and agrees business solutions and protocol. [5] REFERENCES [1] Md. Mahmud Hossain, Maziar Fotouhi, and Ragib Hasan, “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things” [2] Andrea Zanella, “Internet of Things for Smart Cities”, IEEE, 2014 [3]Friedemann Mattern and Christian Floerkemeier, “From the Internet of Computers to the Internet of Things” [4] Mohamed Abomhara, Geir M. Køien “Security and Privacy in the Internet of Things:Current Status and Open Issues”
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 872 [5] Liane Margarida Rockenbach Tarouco, Lucas Mendes Ribeiro Arbiza “Internet of Things in Healthcare: Interoperatibility and Security Issues”