SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1555
A Study on Smart Way for Securing IoT Devices
Thrisha V.S1, Dr.Anitha T.N2
1M. Tech Student, Dept. of CS&E, S J C Institute of Technology, Chickballapur
2Professor & Head, Dept. of CS&E, S J C Institute of Technology, Chickballapur
------------------------------------------------------------------------***-------------------------------------------------------------------------
Abstract - Usage of Internet has been widelyincreasedinday-
to-day life. Most of the human activities are done through
internet in which the transfer of informationfromoneplace to
another place is also done through internet. The information
which we send from one device to another device is not been
secured. To provide security to all IOT devices, functioning of
security management should be done in a proper way.
Currently security enabled model is developed to secure end-
to-end communication in IOT environment. To overcome all
these security problems in IOT devices a well secured solution
is required. This paper deals with various different techniques
which is used to secure IOT devices.
Key Words: IoT, GSM, RPL, RFID.
1. INTRODUCTION
The amount of persons associated to internet is growing
day-by-day and in the similar entity is also happening to all
the strategies that are linked to internet to discuss the data
and to cooperate with each other. Due to the massive
increase in the population of the world, the usage of smart
devices has also been increased. According to the current
situation more than 100 countriesarelinkedto exchangethe
data opinions through internet. This huge usage of internet
by many people lead to a new problem called security. The
safety administration of IoT policies isachiefproblem which
we are facing in now-a-days. Hackers can attack and get the
information easily due to decrease inthesecuritylevel ofIoT
devices.
IoT is a generous type of Worldwide System that is used to
attach various things that comprises of smart machines,
environmental objects and infrastructures and Radio
Frequency Identification (RFID).
IoT devices are beneficial for many of the actual creation of
applications and amenities and it can alsobeappliedtobuild
a small residence. In future, the major functioning of IoT is
done through IoT. Wireless sensor networks, actuator
networks and vehicular networks play a major role in the
field of industry.
These devices has its applications in many areas like
Industries, Educational Institutions, Hospitalsetc.Thismass
usage of IoT devices in different areas leads to security
problem where many techniques have been applied to
collect, analyze and understand the problem.
1.1 Volume:
It is an extreme task in Bio-Diversity. Thevarietyofsuchsort
of material conservational information therapeutic
information or data and commercial evidence. Facebook or
Instagram, for example products of 500 terra bytesofdata is
utilized in each day and it is recognizedfromthedescription,
the unpackaged counts. We cannot set any of the boundaries
for the and it does not comprise any sort of data.
1.2 Velocity:
As it is stated in the previous filling to multiplicity and
intricacy of the data structure, if more swiftness and large
data is additionally joined, then the operation becomes a
thought-provoking work. Speed is the another feature in
which it is contested. The allowance of high-velocity figures
is more stimulating.
2. RELATED WORKS
[1] Security Model for IoT based devices, in this paper
writer advises a safety model in which the IoT supports the
characteristics for protecting the data from unauthorized
access. Initially perception layer is the main source for
collection of data and all the real time data is thus collected
by Radio Frequency Identification Devices(RFID) and each
layer of IoT structure face challenges for providing security
and privacy. In this security model we also have a massive
foundation of fog computing and storage which helps in
managing the administration of fog objects.
[2] A survey on IoT security challenges, in this paper author
propose challenges for random access mechanisms to
protect IoT devices. The two mainly used mechanisms are
overlapped contention and segmented contention. The
overlapped contention contains twolayersupperbound and
the lower bound in which windowscanshareall thenodesin
zero level which is determined as lower bound. In
segmented contention, Upper bound is the better way to
share all the nodes. The proposed mechanismsareanalyzed,
implemented and evaluated on linux based testing and NS3
simulator.
[3] Security on IoT and its smart Appliances, in this paper
author proposes an idea to provide security for smart
appliances. This can be achieved when the appliances are
connected to MCU/embedded system processor with an
unique ID. Global System for Mobile Communication (GSM)
is also provided to control messageorinformationdisplayed
without showing the location of the user. Further open
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1556
wireless skill such as Bluetooth, Wi-Fi and also the
telephonic information facilities and also embedded sensor
and actuator nodes are made to use in keen appliances.
[4] Ongoing challenges and research opportunities, in this
paper author proposes different challenges and
opportunities given to secure IoT devicesinwhichoneof the
important challenge is technology challenge. By using
advanced technology many people hack the devices to get
information which is keptconfidentiallyandhackingprocess
has become common in many of the private companies and
government agencies. Therefore security should be
increased in these fields to avoid hackers and apart from
these Artificial intelligence, security and privacyarethenew
challenging aspects of IoT devices. Research opportunities
are provided to improve connectivity, architecture and
robustness in all IoT devices.
[5] Effectl ofl IoTl newl featuresl onl securityl andl privacyl,
in this paper author proposes newly introduced features on
security and privacy which developed a great effect on IoT
devices. Intrusionl Detectionl system(IDS)l and Intrusionl
Preventionl Systeml(IPS)l models are used to defend
dissimilar kinds of campaigns at the similar time that are
mostly based on heterogeneous IoT devices and these are
mainly used in the detection of traffic network.IfIoTdevices
are light-weight in size then they will not have memory
management unit(MMU), so Memoryl Isolationl Addressl
Spacel Layoutl Randomizationl(ASLR)l and other security
actions cannot be unswervingly deployed on these
diplomacies. It is a tough mission for the researches to
deploy much multifaceted encryption and authentication
algorithms on minute IoT devices.
[6] Security analysis of Big Data on IoT, in this paper writer
suggests the working of safety and communication in IoT by
using Big Data which contains high volumes of data. The
information system which is based on IoT initially collects
the information from the sensors, RFIDs and other smart
devices to store them in the memory and get processed in
the servers with high ultra strength and power. Google and
Amazon companies support these powerful servers. The
important analysis done between IoT and Big Data is
congregation the environmental data, GIS and stargazing
through the wireless sensors of IoT policies.
[7] Security Issues in IoT, in this paper author proposes a
mechanism to protect personal information. Personal
Medical Devices(PMDs) are used to know the present
condition of the patient. These PMDs contains wireless
interface which is used for communication purposes and to
read status of the device, medical reports and also to update
the status. Personal information can also be stored in smart
homes where all smart devices are connected to internet
environment and then smart home services contains digital
services which can efficiently communicate with each other
by using Internet Protocol(IP) addresses.
[8] A Review on Security in IoT, in this paper author
proposes different layers in which all IoT device scan be
secured. The basic layer is the perception layer(recognition
layer) which is used to recognize the security problem in a
particular device which helps to collect all types of
information by using physical equipment which includes
RFID reader, different sensors GPS etc. The transmission of
information, classification, processing is done through
network layer. For improving the ability to recognize the
problem support layer is used. Data sharing is one of the
most important aspect in application layer and ton solve the
protection problem in application layer authentication and
privacy protection is used where Advanced Encryption
Standard(AES) algorithm is used to maintainconfidentiality.
[9] A Surveyl ofl Securityl challengesl in IoT, in this paper
author proposes abouttheincompatibility whichisa original
contest facing aspects of IoT distressing numerous zones
mainly in the field of security where Privacy Enhancing
Technologies(PET) is developed to attain confidentiality
areas which include Virtual Private Networks(VPN)
Transportl Layerl Securityl(TLS)l and Peer-to –Peerl(P2P)l.
In Order to investigate the safety problems in a better way,
IoT is divided into different layerssuchasdevices,Gateways,
and applications/services. A usual group ofsensorsformthe
network named as “Sensor Network” which helps in the
interaction of devices and Internet Protocol(IP) is used in a
wider range for addressing in IoT.
[10] Design Challenges on Security of IoT systems, in this
paper author proposes Computer Aided Design(CAD)
technique to provide security for IoT devices in which CAD
variable is present for optimization of schemes with a huge
quantity of powerfully cooperatingmachineriesandthis sort
of functioning occurs internally in many of the significant
evolving schemes such as information centers and podiums.
The main aim is to provide hardwarebased security whichis
suitable to answer all the requirements of IoT security and
also to provide efficient solutions to solve many unsolved
problems of cryptography in which one of the problem is
security problem.
Table -1: COMPARISON OF DIFFERENT TECHNOLOGIES
SL
No
Technology Advantage Disadvantage
1 RFID
High level
security, quick
response
Cost effective,
low range
coverage
2 NS3
Simulator
Improves the
network
performance
Problem occurs
due to large
scale devices
3
Embedded
processor,
GSM
Open source,
queries are
answered
quickly
High cost,
requires more
staff
4
Artificial
Intelligence
Efficiency is
improved, low
Storage is
expensive
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1557
error rate
5 IDS,IPS
High level
protection
Low latency
6 Big Data
High volumes of
information is
stored
Light-Weight
devices are not
processed
7 PMD,IP
Data
authentication,
end-to-end
protection
Loss of services,
physical security
risk
8 RFID,GPS
High security,
easy installation
Low speed
9 Network
sensors
Organizing
capability, high
scalability
Risk in securing
Wi-Fi network
10
Ultrasonic
sensors
Can sense all
materials
Highly sensitive
to external
environment
3. CONCLUSION
In this paper we have discussed different techniques to
secure IoT devices. The best and shortest solution which we
have obtained to solve the problem of securityinIoTdevices
is providing security enabled model to secure end-to-end
communication in IoT environment. Apart from this various
solutions have been provided to solve different security
issues.
REFERENCES
1. Z. Safdar, S. Farid, M. Pasha, K. Safdar, “ A Security
Model for IoT based Systems” in Technicall Journall,
Universityl ofl Engineeringllandll Technologyl(UET)
Taxilal, Pakistanl vol.22l No. 4-2017l ISSN:1813l-
1786l(print) l2313l-7770l(online)ll
2. Shubhalika Dihulial, Tanveer Farooquil, “ A Surveyl
onl IoT Securityl Challengesl” in Internationall
Journall of /.mputer Appliancesl(0975-8887)
volumel 169 – No.4, July 2017l
3. Vandanal Sharmal, Ravil Tiwari “ Securityl on IoTl
and itsl Smartl Appliancesl” in Internationall
Journall of Sciencel, Engineering andl Technologyl
Researchl(IJSETR), volume 5, Issue 2, February
2016l
4. Sachinl Upadhyayl “Ongoingl Challengesl andl
Researchl Opportunitiesl” in Internationall Journall
ofl Engineeringl Technologiesl andl Managementl
Research,5(2:SE),216-222l.
DOL:10.6281/Zenodo.1195065l
5. Wei Zhoul, Yuqingl Zhangl, Pengl Liul “Effectl ofIoTl
newl featuresl onl securityl and privacyl” in The
Collegel of Information Sciences and Tcehnology,
Thel Pennsylvanial Statel Universityl,PA16802,USA
6. Saeedl Banaeianl Farl,Azadehl Imanil Radl “Security
analysisl of Bigl Datal onl IoTl” in IEEEl
transactionsl in Industriall informaticsl 12.3(2016):
1232-1242l
7. Mirzal Abdurl Razzaql, Muhammadl Alil Qureshil,
Sajidl Habibl Gilll, Saleeml Ullahl “Securityl Issuesl
inl IoTl” inl (IJASCA)l Internationall Journall ofl
Advancedl Computerl Sciencel andl Appliancesl,
volumel 8, No.6,2017l
8. Huil Suol, Jiaful Wanl, Caifengl Zoul, Jianqil Liu “A
Reviewl onl Securityl in IoTl” in 2012l Intenationall
Conferencel onl Computerl Sciencel andl
Electronicsl Engineeringl
9. Anassl Sedratil, Abdellatifl Mezriouil “A Surveyl of
Securityl Challengesl in IoTl” in Advancesl in
Sciencel, Technologyl andl Engineeringl Systemsl
Journall volume 3l, No 1,274-280(2018)l
10. Teng Xul, Jamesl Bl Wendtl, Miodragl Potkonjakl
“Designl Challengesl on Securityl of IoTl Sytemsl”in
IEEEl Journall onl Selectedl Areasl in
Communicationsl, volume 24, No2,381-394(2014)l

More Related Content

PDF
A survey on Internet of Things (IoT) security : Challenges and Current status
PDF
Internet of Things IoT Anytime Anywhere Anything Connectivity
PDF
76 s201918
PDF
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
PDF
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
PDF
Io t security_review_blockchain_solutions
PDF
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
PDF
Review on Vulnerabilities of IoT Security
A survey on Internet of Things (IoT) security : Challenges and Current status
Internet of Things IoT Anytime Anywhere Anything Connectivity
76 s201918
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Io t security_review_blockchain_solutions
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
Review on Vulnerabilities of IoT Security

What's hot (19)

PDF
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
PDF
A Novel Security Approach for Communication using IOT
PDF
509286-Aki_Koivu-Review
PDF
IRJET- Authentication and Context Awareness Access Control in Internet of Things
PDF
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
PDF
Will Internet of Things (IoT) be secure enough?
PDF
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
PDF
IRJET - Cyber Security Threats and Vulnerabilities in IoT
PDF
DEDA: An algorithm for early detection of topology attacks in the internet of...
PDF
Security Issues & Threats in IoT Infrastructure
PPTX
Internet of Things and i's Applications
PPTX
Internet of Things Forensics
PDF
General Overview of IOT Empower Technology
PPTX
A survey in privacy and security in Internet of Things IOT
PPTX
Security in IoT
PPTX
Lecture 16
PDF
IRJET- Enhanced SIT Algorithm for Embedded Systems
DOCX
Chapter-2.docx
PDF
Wearable Technology for Enhanced Security.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Novel Security Approach for Communication using IOT
509286-Aki_Koivu-Review
IRJET- Authentication and Context Awareness Access Control in Internet of Things
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Will Internet of Things (IoT) be secure enough?
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
IRJET - Cyber Security Threats and Vulnerabilities in IoT
DEDA: An algorithm for early detection of topology attacks in the internet of...
Security Issues & Threats in IoT Infrastructure
Internet of Things and i's Applications
Internet of Things Forensics
General Overview of IOT Empower Technology
A survey in privacy and security in Internet of Things IOT
Security in IoT
Lecture 16
IRJET- Enhanced SIT Algorithm for Embedded Systems
Chapter-2.docx
Wearable Technology for Enhanced Security.
Ad

Similar to IRJET - A Study on Smart Way for Securing IoT Devices (20)

PDF
Internet of Things IoT Security Perspective
PDF
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
DOCX
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
PDF
Security in the Internet of Things
PDF
Security and Privacy Big Challenges in Internet of things
PDF
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
PDF
Most cited articles in academia - International journal of network security &...
PDF
76 s201917
PDF
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
PDF
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
PDF
May 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
June 2021 - Top 10 Read Articles in Network Security and Its Applications
PDF
Security Aspects in IoT - A Review
PPTX
A_Review_on_Security_Challenges_in_Internet_of.pptx
PDF
A Survey Report on : Security & Challenges in Internet of Things
DOCX
Security and Privacy considerations in Internet of Things
PDF
Security and Privacy Issues in IoT Environment
PDF
Most Downloaded article for an year in academia - International Journal of Ne...
PDF
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
DOCX
Addressing security and privacy in io t ecosystem v0.4
Internet of Things IoT Security Perspective
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
Security in the Internet of Things
Security and Privacy Big Challenges in Internet of things
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
Most cited articles in academia - International journal of network security &...
76 s201917
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
May 2021: Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
Security Aspects in IoT - A Review
A_Review_on_Security_Challenges_in_Internet_of.pptx
A Survey Report on : Security & Challenges in Internet of Things
Security and Privacy considerations in Internet of Things
Security and Privacy Issues in IoT Environment
Most Downloaded article for an year in academia - International Journal of Ne...
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
Addressing security and privacy in io t ecosystem v0.4
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Well-logging-methods_new................
PPTX
Artificial Intelligence
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
web development for engineering and engineering
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Geodesy 1.pptx...............................................
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
bas. eng. economics group 4 presentation 1.pptx
III.4.1.2_The_Space_Environment.p pdffdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Well-logging-methods_new................
Artificial Intelligence
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
web development for engineering and engineering
R24 SURVEYING LAB MANUAL for civil enggi
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Safety Seminar civil to be ensured for safe working.
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Geodesy 1.pptx...............................................

IRJET - A Study on Smart Way for Securing IoT Devices

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1555 A Study on Smart Way for Securing IoT Devices Thrisha V.S1, Dr.Anitha T.N2 1M. Tech Student, Dept. of CS&E, S J C Institute of Technology, Chickballapur 2Professor & Head, Dept. of CS&E, S J C Institute of Technology, Chickballapur ------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract - Usage of Internet has been widelyincreasedinday- to-day life. Most of the human activities are done through internet in which the transfer of informationfromoneplace to another place is also done through internet. The information which we send from one device to another device is not been secured. To provide security to all IOT devices, functioning of security management should be done in a proper way. Currently security enabled model is developed to secure end- to-end communication in IOT environment. To overcome all these security problems in IOT devices a well secured solution is required. This paper deals with various different techniques which is used to secure IOT devices. Key Words: IoT, GSM, RPL, RFID. 1. INTRODUCTION The amount of persons associated to internet is growing day-by-day and in the similar entity is also happening to all the strategies that are linked to internet to discuss the data and to cooperate with each other. Due to the massive increase in the population of the world, the usage of smart devices has also been increased. According to the current situation more than 100 countriesarelinkedto exchangethe data opinions through internet. This huge usage of internet by many people lead to a new problem called security. The safety administration of IoT policies isachiefproblem which we are facing in now-a-days. Hackers can attack and get the information easily due to decrease inthesecuritylevel ofIoT devices. IoT is a generous type of Worldwide System that is used to attach various things that comprises of smart machines, environmental objects and infrastructures and Radio Frequency Identification (RFID). IoT devices are beneficial for many of the actual creation of applications and amenities and it can alsobeappliedtobuild a small residence. In future, the major functioning of IoT is done through IoT. Wireless sensor networks, actuator networks and vehicular networks play a major role in the field of industry. These devices has its applications in many areas like Industries, Educational Institutions, Hospitalsetc.Thismass usage of IoT devices in different areas leads to security problem where many techniques have been applied to collect, analyze and understand the problem. 1.1 Volume: It is an extreme task in Bio-Diversity. Thevarietyofsuchsort of material conservational information therapeutic information or data and commercial evidence. Facebook or Instagram, for example products of 500 terra bytesofdata is utilized in each day and it is recognizedfromthedescription, the unpackaged counts. We cannot set any of the boundaries for the and it does not comprise any sort of data. 1.2 Velocity: As it is stated in the previous filling to multiplicity and intricacy of the data structure, if more swiftness and large data is additionally joined, then the operation becomes a thought-provoking work. Speed is the another feature in which it is contested. The allowance of high-velocity figures is more stimulating. 2. RELATED WORKS [1] Security Model for IoT based devices, in this paper writer advises a safety model in which the IoT supports the characteristics for protecting the data from unauthorized access. Initially perception layer is the main source for collection of data and all the real time data is thus collected by Radio Frequency Identification Devices(RFID) and each layer of IoT structure face challenges for providing security and privacy. In this security model we also have a massive foundation of fog computing and storage which helps in managing the administration of fog objects. [2] A survey on IoT security challenges, in this paper author propose challenges for random access mechanisms to protect IoT devices. The two mainly used mechanisms are overlapped contention and segmented contention. The overlapped contention contains twolayersupperbound and the lower bound in which windowscanshareall thenodesin zero level which is determined as lower bound. In segmented contention, Upper bound is the better way to share all the nodes. The proposed mechanismsareanalyzed, implemented and evaluated on linux based testing and NS3 simulator. [3] Security on IoT and its smart Appliances, in this paper author proposes an idea to provide security for smart appliances. This can be achieved when the appliances are connected to MCU/embedded system processor with an unique ID. Global System for Mobile Communication (GSM) is also provided to control messageorinformationdisplayed without showing the location of the user. Further open
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1556 wireless skill such as Bluetooth, Wi-Fi and also the telephonic information facilities and also embedded sensor and actuator nodes are made to use in keen appliances. [4] Ongoing challenges and research opportunities, in this paper author proposes different challenges and opportunities given to secure IoT devicesinwhichoneof the important challenge is technology challenge. By using advanced technology many people hack the devices to get information which is keptconfidentiallyandhackingprocess has become common in many of the private companies and government agencies. Therefore security should be increased in these fields to avoid hackers and apart from these Artificial intelligence, security and privacyarethenew challenging aspects of IoT devices. Research opportunities are provided to improve connectivity, architecture and robustness in all IoT devices. [5] Effectl ofl IoTl newl featuresl onl securityl andl privacyl, in this paper author proposes newly introduced features on security and privacy which developed a great effect on IoT devices. Intrusionl Detectionl system(IDS)l and Intrusionl Preventionl Systeml(IPS)l models are used to defend dissimilar kinds of campaigns at the similar time that are mostly based on heterogeneous IoT devices and these are mainly used in the detection of traffic network.IfIoTdevices are light-weight in size then they will not have memory management unit(MMU), so Memoryl Isolationl Addressl Spacel Layoutl Randomizationl(ASLR)l and other security actions cannot be unswervingly deployed on these diplomacies. It is a tough mission for the researches to deploy much multifaceted encryption and authentication algorithms on minute IoT devices. [6] Security analysis of Big Data on IoT, in this paper writer suggests the working of safety and communication in IoT by using Big Data which contains high volumes of data. The information system which is based on IoT initially collects the information from the sensors, RFIDs and other smart devices to store them in the memory and get processed in the servers with high ultra strength and power. Google and Amazon companies support these powerful servers. The important analysis done between IoT and Big Data is congregation the environmental data, GIS and stargazing through the wireless sensors of IoT policies. [7] Security Issues in IoT, in this paper author proposes a mechanism to protect personal information. Personal Medical Devices(PMDs) are used to know the present condition of the patient. These PMDs contains wireless interface which is used for communication purposes and to read status of the device, medical reports and also to update the status. Personal information can also be stored in smart homes where all smart devices are connected to internet environment and then smart home services contains digital services which can efficiently communicate with each other by using Internet Protocol(IP) addresses. [8] A Review on Security in IoT, in this paper author proposes different layers in which all IoT device scan be secured. The basic layer is the perception layer(recognition layer) which is used to recognize the security problem in a particular device which helps to collect all types of information by using physical equipment which includes RFID reader, different sensors GPS etc. The transmission of information, classification, processing is done through network layer. For improving the ability to recognize the problem support layer is used. Data sharing is one of the most important aspect in application layer and ton solve the protection problem in application layer authentication and privacy protection is used where Advanced Encryption Standard(AES) algorithm is used to maintainconfidentiality. [9] A Surveyl ofl Securityl challengesl in IoT, in this paper author proposes abouttheincompatibility whichisa original contest facing aspects of IoT distressing numerous zones mainly in the field of security where Privacy Enhancing Technologies(PET) is developed to attain confidentiality areas which include Virtual Private Networks(VPN) Transportl Layerl Securityl(TLS)l and Peer-to –Peerl(P2P)l. In Order to investigate the safety problems in a better way, IoT is divided into different layerssuchasdevices,Gateways, and applications/services. A usual group ofsensorsformthe network named as “Sensor Network” which helps in the interaction of devices and Internet Protocol(IP) is used in a wider range for addressing in IoT. [10] Design Challenges on Security of IoT systems, in this paper author proposes Computer Aided Design(CAD) technique to provide security for IoT devices in which CAD variable is present for optimization of schemes with a huge quantity of powerfully cooperatingmachineriesandthis sort of functioning occurs internally in many of the significant evolving schemes such as information centers and podiums. The main aim is to provide hardwarebased security whichis suitable to answer all the requirements of IoT security and also to provide efficient solutions to solve many unsolved problems of cryptography in which one of the problem is security problem. Table -1: COMPARISON OF DIFFERENT TECHNOLOGIES SL No Technology Advantage Disadvantage 1 RFID High level security, quick response Cost effective, low range coverage 2 NS3 Simulator Improves the network performance Problem occurs due to large scale devices 3 Embedded processor, GSM Open source, queries are answered quickly High cost, requires more staff 4 Artificial Intelligence Efficiency is improved, low Storage is expensive
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1557 error rate 5 IDS,IPS High level protection Low latency 6 Big Data High volumes of information is stored Light-Weight devices are not processed 7 PMD,IP Data authentication, end-to-end protection Loss of services, physical security risk 8 RFID,GPS High security, easy installation Low speed 9 Network sensors Organizing capability, high scalability Risk in securing Wi-Fi network 10 Ultrasonic sensors Can sense all materials Highly sensitive to external environment 3. CONCLUSION In this paper we have discussed different techniques to secure IoT devices. The best and shortest solution which we have obtained to solve the problem of securityinIoTdevices is providing security enabled model to secure end-to-end communication in IoT environment. Apart from this various solutions have been provided to solve different security issues. REFERENCES 1. Z. Safdar, S. Farid, M. Pasha, K. Safdar, “ A Security Model for IoT based Systems” in Technicall Journall, Universityl ofl Engineeringllandll Technologyl(UET) Taxilal, Pakistanl vol.22l No. 4-2017l ISSN:1813l- 1786l(print) l2313l-7770l(online)ll 2. Shubhalika Dihulial, Tanveer Farooquil, “ A Surveyl onl IoT Securityl Challengesl” in Internationall Journall of /.mputer Appliancesl(0975-8887) volumel 169 – No.4, July 2017l 3. Vandanal Sharmal, Ravil Tiwari “ Securityl on IoTl and itsl Smartl Appliancesl” in Internationall Journall of Sciencel, Engineering andl Technologyl Researchl(IJSETR), volume 5, Issue 2, February 2016l 4. Sachinl Upadhyayl “Ongoingl Challengesl andl Researchl Opportunitiesl” in Internationall Journall ofl Engineeringl Technologiesl andl Managementl Research,5(2:SE),216-222l. DOL:10.6281/Zenodo.1195065l 5. Wei Zhoul, Yuqingl Zhangl, Pengl Liul “Effectl ofIoTl newl featuresl onl securityl and privacyl” in The Collegel of Information Sciences and Tcehnology, Thel Pennsylvanial Statel Universityl,PA16802,USA 6. Saeedl Banaeianl Farl,Azadehl Imanil Radl “Security analysisl of Bigl Datal onl IoTl” in IEEEl transactionsl in Industriall informaticsl 12.3(2016): 1232-1242l 7. Mirzal Abdurl Razzaql, Muhammadl Alil Qureshil, Sajidl Habibl Gilll, Saleeml Ullahl “Securityl Issuesl inl IoTl” inl (IJASCA)l Internationall Journall ofl Advancedl Computerl Sciencel andl Appliancesl, volumel 8, No.6,2017l 8. Huil Suol, Jiaful Wanl, Caifengl Zoul, Jianqil Liu “A Reviewl onl Securityl in IoTl” in 2012l Intenationall Conferencel onl Computerl Sciencel andl Electronicsl Engineeringl 9. Anassl Sedratil, Abdellatifl Mezriouil “A Surveyl of Securityl Challengesl in IoTl” in Advancesl in Sciencel, Technologyl andl Engineeringl Systemsl Journall volume 3l, No 1,274-280(2018)l 10. Teng Xul, Jamesl Bl Wendtl, Miodragl Potkonjakl “Designl Challengesl on Securityl of IoTl Sytemsl”in IEEEl Journall onl Selectedl Areasl in Communicationsl, volume 24, No2,381-394(2014)l