SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 721
SECURITY AND PRIVACY BIG CHALLENGES IN INTERNET OF THINGS
1Ms Priyanka D. Raut, 2Prof Sachin Vyawhare
1ME Scholer Sanmati Engineering College, Washim.
2Assistant Professor, Sanmati Engineering College Washim (MH)
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Internet of Things systems has fastly growing in
all over the world and major roles in daily life by providing
new capabilities to streamline diverse tasks. IoT provide the
new capabilities and creates opportunities for increased
productivity and societal benefits. IoT also provide the broad
area of functionality and components will result in important
challenges of privacy and security should beaddressed. Large-
scale, pervasive networks that receivethedatafromthe world.
Used new predictive technologies and algorithms that enable
IoT. Once the data collected from IoT devices and algorithms
that process this data andafterwordused fordecision-making.
IoT also presents new security and privacy challenges.
Sometimes it is more difficult todeploysecurityandprotection
schemes for IOT devices because with less functionality, less
processing power, minimum storage capacity etc. Such
deployments may need new protocols and system designsthat
are better implemented to operate in resource-limited
environments. Policy and technical approaches to show the
IoT privacy and security challenges should continue to
encourage innovation while ensuring that user trust in these
devices and systems will maintain the strong privacy and
security.
Key Words: Internet of Things, Network Security,
Privacy & Security Protocol, Predictive Technology,
Pervasive Network, etc
1. INTRODUCTION
Day by day internet technology and communications
technology are fastly growing; our life is gradually changed
into an imaginary space of virtual world. People can chat,
work, shopping, keeps pets and plants in the virtual world
provided by the network. To eliminate this impulsion,a new
technology is required to sum-up the imaginary space and
real-world on a same platform which is called as Internet of
Things (IoTs). Based on a large number of low-cost sensors
and wireless communication,thesensornetwork technology
puts forward new demands totheInternettechnology.It will
bring huge changes to the future society, change our way of
life and business models.
There are several security and privacy concerns at different
layers viz; Front end, Back end and Network. In this paper is
to present the study of security and privacy issues in
Internet of Things (IoTs) and by present some challenges.
2. LITURATURE REVIEW
J. Sathish Kumar et. al. [1] presents the Internet of Things
with architecture and design goals. They show the security
and privacy concerns at different layers in IoTs. In addition,
they identifiedseveral open issues relatedtothesecurityand
privacy that need to be addressed by research community to
make a secureand trusted platform for the delivery of future
Internet of Things. They alsodiscussedapplicationsofIoTsin
real life.
Sivarama Subramanian et. al. [2] introducing security in
the early life cycle of the IoT solution can make mitigation
design much easier. Security and privacy challenges for any
IoT solution can be addressed by following secure systems
development life cycle (SDLC) practices, secure coding
practices and periodic penetration testing activities.
Zejun Ren et. al. [3] analyze the privacy and security
challenges in the IoT and survey on the corresponding
solutions to enhance the security of IoT architecture and
protocol. They should focusmore on the securityandprivacy
on IoT and help to promote the development of IoT.
Shervin Erfani et.al. [4] analyzesdistinctIoTsecurityand
privacy features, including security requirements, threat
models, and attacks from the smart home perspective.
Further, this paper proposes an intelligent collaborative
security management model to minimize security risk. The
security challenges of the IoT for a smart home scenario are
encountered, anda comprehensiveIoTsecuritymanagement
for smart homes has been proposed.
What is IoT?
Internet of Things is the system to connect the physical
devices and operate or access through the internet. The
‘thing’ in IoT could be a person with a heart monitor with
built-in-sensors, i.e. objects that have been assigned an IP
address and have the ability to receive and transferdataover
a network without manual assistance or intervention. The
embedded technology in the objects helps them to interact
with internal states or the external environment, which in
turn affects the decisions taken..
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 722
Fig -1: IoT
3. SECURITY AND PRIVACY CHALLENGES
IoT provide novel and universal access to the devices that
make up everything from assembly lines, health and
wellness devices, and transportation systems to weather
sensors. Free access to that much data poses major security
and privacy challenges, including:
Fig -2: IoT Security challenges
Insufficient authentication/authorization: A huge
number of users and devices rely on weak and simple
passwords and authorizations. Many devices accept
passwords such as ABCD or 1234.
Lack of transport encryption: Most of the devices fail to
encrypt data that are being transferred, even when the
devices are using the Internet.
Insecure web/mobile interface: IoT-based solutions have
a web/mobile interface for device management or for
consumption of aggregated data. This web interfaceisfound
to be prone to the Open Web Application Security Project
(OWASP) Top 10 vulnerabilities, such as poor session
management, weak default credentials and cross-site
scripting vulnerabilities.
Default credentials: Most devices and sensors are
configured to use the default username/passwords.
Lack of secure code practices: Services and business logic
would be developed without adhering to secure coding
practices.
Privacy concerns: Devices used in the health care domain
receives at least one piece of personal information; the vast
majority of devices collect detailssuchasusernameanddate
of birth. However, the fact that many devices transmit
information across networks without encryptionposes even
more privacy risk. Privacy risk arises as the objects within
the IoT receive and integrate fragments of data that relate to
their service. For example, the regular purchase of different
food types may divulge the religion or health information of
the buyer.
4. MITIGATING SECURITY AND PRIVACY CHALLENGES
IoT products are manufactured only for security when
security is embedded at thetimeofproduction.Eachproduct
should undergo security parameters to detect
vulnerabilities.
Countermeasures, such as the following, can be taken to
address the security challenges:
Base device platform analysis: Weak platform
configuration might lead to compromises such as privilege
increases. Base device platform operating system and its
security properties, configurations and features should be
verified against the base-lined information security
requirements. Verification needs to be done to ensure that
any test interfaces are removed from the hardware.
Network traffic verification: Network traffic (wired or
wireless) should be analyzed for any in-disputable,
unencrypted or versatile data. There is a compromise
between performance and security when encryption is
recommended. Lightweight encryption algorithms can be
used to cater to performance requirements.
Verification of functional security requirements: To
validate the high-level functional security requirement. The
negative testing is important of software. IoT solutions can
uses the cloud services such asSoftwareasa Servicewhichis
based on identity management solutions for authorization
and authentication requirements.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 723
Trust boundary review and fault injection: All trust
boundaries across the signal path should be reviewed and
subject to fault injection using negative test cases. The trust
boundaries can be verified using manual testing techniques.
Mostly Periodic penetration testing is suggested.
Side channel attack defense verification: If side channel
defenses are implemented, either in software or hardware,
they should be verified using continuous penetrationtesting
activities. Continuous penetration testing helps to minimize
advanced persistent threats (APTs) for IoT solutions.
Secure code reviews: Early secure code reviews lead to
early mitigation techniques. Sensitive and security impact
areas such as boot process, security enforcement and
encryption modules should go through secure codereviews.
The cost of fixing a security defect is greatly reduced when
the security vulnerability is discovered during the
development cycle.
End-to-end penetration test: End-to-end penetrationtests
should be conducted across the signal path to identify any
vulnerability in the web interface,mobileinterfaceandcloud
interface of the IoT solutions. The penetration testing give
the more security of the IoT solution for each components.
Security Assessment of an IoT Solution
A US-based software company developed a Secure Travel
product using IoT technology. The product provides real-
time data about the speed of vehicles,locationofthevehicles
and people traveling on the vehicles.
The technology components involved included:
 Sensors in the vehicles
 Gateways
 Services
 Web interface
 Mobile interface
Threat modeling using the Spoofing, Tampering,
Repudiation, Information disclosure,Denial ofservice(DoS),
Elevation of privilege (STRIDE) software approach was
conducted to identify the attack scenarios and formulate
mitigation plans for each of the components.
5. CONCLUSIONS
The Internet of Thing makes large development in
everyone’s everyday life. In the IoTs term, the short-range
mobile transceivers will be implanted in variety of daily
requirements. The connections between people and
communications of people will grow and between objectsto
objects at anytime, in any location. The efficiency of
information managementandcommunicationswill arise toa
new high level. The dynamic environmentofIoTsintroduces
unseen opportunities for communication,whicharegoingto
change the perception of computing and networking. The
privacy and security refer such an evolution should be
carefully considered to the promising technology. The
protection of data and privacy of users has beenidentified as
one of the key challenges in the IoT. In this paper is to
present the study of security and privacy issues in Internet
of Things (IoTs) and by present some challenges.
REFERENCES
[1] J. Sathish Kumar, Dhiren R. Patel, "ASurveyonInternetof
Things: Security and Privacy Issues",International Journal of
Computer Applications (0975 – 8887), Volume 90 – No 11,
March 2014.
[2] Sivarama Subramanian,Varadarajan Vellore
Gopal,Marimuthu Muthusamy, "Security and Privacy
Challenges of IoT-enabled Solutions", ISACA JOURNAL
VOLUME 4, 2015.
[3] Zejun Ren, Xiangang Liu, RunguoYe,TaoZhang,"Security
and privacy on internet of things", 7th IEEE International
Conference on Electronics Information and Emergency
Communication (ICEIEC), 2017
[4] Shervin Erfani, Majid Ahmadi, Long Chen, "The Internet
of Things for smart homes: An example", 8th Annual
Industrial Automation and Electromechanical Engineering
Conference (IEMECON), 2017.
[5] Elias Tabane, Tranos Zuva, "Is there a room for security
and privacy in IoT?", International Conference on Advances
in Computing and Communication Engineering (ICACCE),
2016
[6] Snehal Deshmukh, S. S. Sonavane, "Security protocols for
Internet of Things: A survey", International Conference on
Nextgen Electronic Technologies: Silicon to Software
(ICNETS2), 2017.
BIOGRAPHIES
Miss Priyanka D. Raut completed
Bachelor of Engineering in computer
science and engineering from MGI-
COET, Shegaon and pursuing Masterof
Engineering in Computer Science and
Information Technology from Sanmati
Engineering College, Washim.
Prof. Sachin Vyawhare is working as
Asst. Professor and HOD of Computer
Department at Sanmati Engineering
College Washim (MH). He received BE
degree and ME degree from S.G.B.A.U.
Amaravati. His research interest
includesnetworking,OperatingSystem
and Image Processing.

More Related Content

PDF
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
PDF
Cybersecurity: A Manufacturers Guide by Clearnetwork
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PDF
IoT: Security & Privacy at IGNITE 2015
PDF
CyberSecurity_for_the_IoT
PPTX
Automatski - The Internet of Things - Privacy in IoT
PPTX
IoT security compliance checklist
PDF
Security and Privacy in IoT and Cyber-physical Systems
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
Cybersecurity: A Manufacturers Guide by Clearnetwork
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
IoT: Security & Privacy at IGNITE 2015
CyberSecurity_for_the_IoT
Automatski - The Internet of Things - Privacy in IoT
IoT security compliance checklist
Security and Privacy in IoT and Cyber-physical Systems

What's hot (20)

PDF
Security and Privacy Issues in IoT Environment
PDF
IRJET- Authentication and Context Awareness Access Control in Internet of Things
PDF
Io t business-index-2020-securing-iot
PDF
John kingsley OT ICS SCADA Cyber security consultant
PDF
An Internet of Things Reference Architecture
PDF
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
PPTX
Security of iot device
PDF
Overview of IoT and Security issues
PDF
Safeguarding the Internet of Things
PDF
IRJET - A Study on Smart Way for Securing IoT Devices
PDF
The Internet of Things: Privacy and Security Issues
PDF
Hacking Internet of Things (IoT)
PDF
DEDA: An algorithm for early detection of topology attacks in the internet of...
PDF
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
PDF
FinalResearch_95752_oliver
PDF
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
PDF
IRJET - Cyber Security Threats and Vulnerabilities in IoT
PDF
76 s201917
PDF
509286-Aki_Koivu-Review
PDF
A Novel Security Approach for Communication using IOT
Security and Privacy Issues in IoT Environment
IRJET- Authentication and Context Awareness Access Control in Internet of Things
Io t business-index-2020-securing-iot
John kingsley OT ICS SCADA Cyber security consultant
An Internet of Things Reference Architecture
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Security of iot device
Overview of IoT and Security issues
Safeguarding the Internet of Things
IRJET - A Study on Smart Way for Securing IoT Devices
The Internet of Things: Privacy and Security Issues
Hacking Internet of Things (IoT)
DEDA: An algorithm for early detection of topology attacks in the internet of...
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
FinalResearch_95752_oliver
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
76 s201917
509286-Aki_Koivu-Review
A Novel Security Approach for Communication using IOT
Ad

Similar to Security and Privacy Big Challenges in Internet of things (20)

PDF
Deep Learning and Big Data technologies for IoT Security
PDF
Security Issues in IoT-Based Environments
PDF
Security Issues in IoT-Based Environments
PDF
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
PDF
How To Evaluate the Strengths and Weaknesses of Security and Privacy in IoT D...
PDF
assignment help experts
PDF
sample assignment
PDF
General Overview of IOT Empower Technology
PDF
Survey on Security Issues of Internet of Things (IoT) Devices
PDF
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
PDF
Security for the IoT - Report Summary
PDF
Navigating IoT Challenges_ Ensuring Security and Privacy in a Connected World
PDF
76 s201918
PDF
Cybersecurity in the Age of IoT - Skillmine
PDF
A survey on Internet of Things (IoT) security : Challenges and Current status
PPTX
Internet & iot security
PDF
Security Issues and Challenges in Internet of Things – A Review
PDF
Io t security_review_blockchain_solutions
PDF
Internet of Things IoT Anytime Anywhere Anything Connectivity
PDF
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Deep Learning and Big Data technologies for IoT Security
Security Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
How To Evaluate the Strengths and Weaknesses of Security and Privacy in IoT D...
assignment help experts
sample assignment
General Overview of IOT Empower Technology
Survey on Security Issues of Internet of Things (IoT) Devices
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Security for the IoT - Report Summary
Navigating IoT Challenges_ Ensuring Security and Privacy in a Connected World
76 s201918
Cybersecurity in the Age of IoT - Skillmine
A survey on Internet of Things (IoT) security : Challenges and Current status
Internet & iot security
Security Issues and Challenges in Internet of Things – A Review
Io t security_review_blockchain_solutions
Internet of Things IoT Anytime Anywhere Anything Connectivity
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Lecture Notes Electrical Wiring System Components
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
composite construction of structures.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Construction Project Organization Group 2.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Welding lecture in detail for understanding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Lecture Notes Electrical Wiring System Components
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
OOP with Java - Java Introduction (Basics)
composite construction of structures.pdf
Internet of Things (IOT) - A guide to understanding
Construction Project Organization Group 2.pptx
Structs to JSON How Go Powers REST APIs.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Welding lecture in detail for understanding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
573137875-Attendance-Management-System-original
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
UNIT 4 Total Quality Management .pptx
additive manufacturing of ss316l using mig welding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx

Security and Privacy Big Challenges in Internet of things

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 721 SECURITY AND PRIVACY BIG CHALLENGES IN INTERNET OF THINGS 1Ms Priyanka D. Raut, 2Prof Sachin Vyawhare 1ME Scholer Sanmati Engineering College, Washim. 2Assistant Professor, Sanmati Engineering College Washim (MH) ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Internet of Things systems has fastly growing in all over the world and major roles in daily life by providing new capabilities to streamline diverse tasks. IoT provide the new capabilities and creates opportunities for increased productivity and societal benefits. IoT also provide the broad area of functionality and components will result in important challenges of privacy and security should beaddressed. Large- scale, pervasive networks that receivethedatafromthe world. Used new predictive technologies and algorithms that enable IoT. Once the data collected from IoT devices and algorithms that process this data andafterwordused fordecision-making. IoT also presents new security and privacy challenges. Sometimes it is more difficult todeploysecurityandprotection schemes for IOT devices because with less functionality, less processing power, minimum storage capacity etc. Such deployments may need new protocols and system designsthat are better implemented to operate in resource-limited environments. Policy and technical approaches to show the IoT privacy and security challenges should continue to encourage innovation while ensuring that user trust in these devices and systems will maintain the strong privacy and security. Key Words: Internet of Things, Network Security, Privacy & Security Protocol, Predictive Technology, Pervasive Network, etc 1. INTRODUCTION Day by day internet technology and communications technology are fastly growing; our life is gradually changed into an imaginary space of virtual world. People can chat, work, shopping, keeps pets and plants in the virtual world provided by the network. To eliminate this impulsion,a new technology is required to sum-up the imaginary space and real-world on a same platform which is called as Internet of Things (IoTs). Based on a large number of low-cost sensors and wireless communication,thesensornetwork technology puts forward new demands totheInternettechnology.It will bring huge changes to the future society, change our way of life and business models. There are several security and privacy concerns at different layers viz; Front end, Back end and Network. In this paper is to present the study of security and privacy issues in Internet of Things (IoTs) and by present some challenges. 2. LITURATURE REVIEW J. Sathish Kumar et. al. [1] presents the Internet of Things with architecture and design goals. They show the security and privacy concerns at different layers in IoTs. In addition, they identifiedseveral open issues relatedtothesecurityand privacy that need to be addressed by research community to make a secureand trusted platform for the delivery of future Internet of Things. They alsodiscussedapplicationsofIoTsin real life. Sivarama Subramanian et. al. [2] introducing security in the early life cycle of the IoT solution can make mitigation design much easier. Security and privacy challenges for any IoT solution can be addressed by following secure systems development life cycle (SDLC) practices, secure coding practices and periodic penetration testing activities. Zejun Ren et. al. [3] analyze the privacy and security challenges in the IoT and survey on the corresponding solutions to enhance the security of IoT architecture and protocol. They should focusmore on the securityandprivacy on IoT and help to promote the development of IoT. Shervin Erfani et.al. [4] analyzesdistinctIoTsecurityand privacy features, including security requirements, threat models, and attacks from the smart home perspective. Further, this paper proposes an intelligent collaborative security management model to minimize security risk. The security challenges of the IoT for a smart home scenario are encountered, anda comprehensiveIoTsecuritymanagement for smart homes has been proposed. What is IoT? Internet of Things is the system to connect the physical devices and operate or access through the internet. The ‘thing’ in IoT could be a person with a heart monitor with built-in-sensors, i.e. objects that have been assigned an IP address and have the ability to receive and transferdataover a network without manual assistance or intervention. The embedded technology in the objects helps them to interact with internal states or the external environment, which in turn affects the decisions taken..
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 722 Fig -1: IoT 3. SECURITY AND PRIVACY CHALLENGES IoT provide novel and universal access to the devices that make up everything from assembly lines, health and wellness devices, and transportation systems to weather sensors. Free access to that much data poses major security and privacy challenges, including: Fig -2: IoT Security challenges Insufficient authentication/authorization: A huge number of users and devices rely on weak and simple passwords and authorizations. Many devices accept passwords such as ABCD or 1234. Lack of transport encryption: Most of the devices fail to encrypt data that are being transferred, even when the devices are using the Internet. Insecure web/mobile interface: IoT-based solutions have a web/mobile interface for device management or for consumption of aggregated data. This web interfaceisfound to be prone to the Open Web Application Security Project (OWASP) Top 10 vulnerabilities, such as poor session management, weak default credentials and cross-site scripting vulnerabilities. Default credentials: Most devices and sensors are configured to use the default username/passwords. Lack of secure code practices: Services and business logic would be developed without adhering to secure coding practices. Privacy concerns: Devices used in the health care domain receives at least one piece of personal information; the vast majority of devices collect detailssuchasusernameanddate of birth. However, the fact that many devices transmit information across networks without encryptionposes even more privacy risk. Privacy risk arises as the objects within the IoT receive and integrate fragments of data that relate to their service. For example, the regular purchase of different food types may divulge the religion or health information of the buyer. 4. MITIGATING SECURITY AND PRIVACY CHALLENGES IoT products are manufactured only for security when security is embedded at thetimeofproduction.Eachproduct should undergo security parameters to detect vulnerabilities. Countermeasures, such as the following, can be taken to address the security challenges: Base device platform analysis: Weak platform configuration might lead to compromises such as privilege increases. Base device platform operating system and its security properties, configurations and features should be verified against the base-lined information security requirements. Verification needs to be done to ensure that any test interfaces are removed from the hardware. Network traffic verification: Network traffic (wired or wireless) should be analyzed for any in-disputable, unencrypted or versatile data. There is a compromise between performance and security when encryption is recommended. Lightweight encryption algorithms can be used to cater to performance requirements. Verification of functional security requirements: To validate the high-level functional security requirement. The negative testing is important of software. IoT solutions can uses the cloud services such asSoftwareasa Servicewhichis based on identity management solutions for authorization and authentication requirements.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 723 Trust boundary review and fault injection: All trust boundaries across the signal path should be reviewed and subject to fault injection using negative test cases. The trust boundaries can be verified using manual testing techniques. Mostly Periodic penetration testing is suggested. Side channel attack defense verification: If side channel defenses are implemented, either in software or hardware, they should be verified using continuous penetrationtesting activities. Continuous penetration testing helps to minimize advanced persistent threats (APTs) for IoT solutions. Secure code reviews: Early secure code reviews lead to early mitigation techniques. Sensitive and security impact areas such as boot process, security enforcement and encryption modules should go through secure codereviews. The cost of fixing a security defect is greatly reduced when the security vulnerability is discovered during the development cycle. End-to-end penetration test: End-to-end penetrationtests should be conducted across the signal path to identify any vulnerability in the web interface,mobileinterfaceandcloud interface of the IoT solutions. The penetration testing give the more security of the IoT solution for each components. Security Assessment of an IoT Solution A US-based software company developed a Secure Travel product using IoT technology. The product provides real- time data about the speed of vehicles,locationofthevehicles and people traveling on the vehicles. The technology components involved included:  Sensors in the vehicles  Gateways  Services  Web interface  Mobile interface Threat modeling using the Spoofing, Tampering, Repudiation, Information disclosure,Denial ofservice(DoS), Elevation of privilege (STRIDE) software approach was conducted to identify the attack scenarios and formulate mitigation plans for each of the components. 5. CONCLUSIONS The Internet of Thing makes large development in everyone’s everyday life. In the IoTs term, the short-range mobile transceivers will be implanted in variety of daily requirements. The connections between people and communications of people will grow and between objectsto objects at anytime, in any location. The efficiency of information managementandcommunicationswill arise toa new high level. The dynamic environmentofIoTsintroduces unseen opportunities for communication,whicharegoingto change the perception of computing and networking. The privacy and security refer such an evolution should be carefully considered to the promising technology. The protection of data and privacy of users has beenidentified as one of the key challenges in the IoT. In this paper is to present the study of security and privacy issues in Internet of Things (IoTs) and by present some challenges. REFERENCES [1] J. Sathish Kumar, Dhiren R. Patel, "ASurveyonInternetof Things: Security and Privacy Issues",International Journal of Computer Applications (0975 – 8887), Volume 90 – No 11, March 2014. [2] Sivarama Subramanian,Varadarajan Vellore Gopal,Marimuthu Muthusamy, "Security and Privacy Challenges of IoT-enabled Solutions", ISACA JOURNAL VOLUME 4, 2015. [3] Zejun Ren, Xiangang Liu, RunguoYe,TaoZhang,"Security and privacy on internet of things", 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), 2017 [4] Shervin Erfani, Majid Ahmadi, Long Chen, "The Internet of Things for smart homes: An example", 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), 2017. [5] Elias Tabane, Tranos Zuva, "Is there a room for security and privacy in IoT?", International Conference on Advances in Computing and Communication Engineering (ICACCE), 2016 [6] Snehal Deshmukh, S. S. Sonavane, "Security protocols for Internet of Things: A survey", International Conference on Nextgen Electronic Technologies: Silicon to Software (ICNETS2), 2017. BIOGRAPHIES Miss Priyanka D. Raut completed Bachelor of Engineering in computer science and engineering from MGI- COET, Shegaon and pursuing Masterof Engineering in Computer Science and Information Technology from Sanmati Engineering College, Washim. Prof. Sachin Vyawhare is working as Asst. Professor and HOD of Computer Department at Sanmati Engineering College Washim (MH). He received BE degree and ME degree from S.G.B.A.U. Amaravati. His research interest includesnetworking,OperatingSystem and Image Processing.