Tuesday, May 5, 2020
Data Security Technology Internet Of Things-Myassignmenthelp.Com
Question: Discuss About The Data Security Technology Internet Of Things? Answer: Introduction With the number of internet users is increasing rapidly today, the Internet has become an essential tool for communication across the globe. Various technological advancements are designed and developed so as to enhance the quality of communication. Internet of Things (IoT) is one such technical advancement where various devices are able to communicate with each other via the internet medium with the purpose of controlling and management. Anywhere, anytime communication applications for different domains is now possible via the Internet of Things. The IoT is a new technology and the traditional communication stack and standards cannot be applied directly to IoT applications. Thus, many IoT based applications pose serious security threats. It is thus needed to have a flexible security framework for IoT applications. This paper reviews the current state of IoT, examines security threats of IoT, and proposes a solution as a countermeasure to this security threat. Literature review Internet of Things emerged as a solution to create a smart city wherein the public resources are used in an optimized manner; quality services are provided to the users; and to have a decreased operational cost of these services. Thus, the main goal of Internet of Things is to create a technological based environment for humans so that they can communicate at anytime from anywhere and are supported with devices which can provide services as per the human nends. Internet of Things is thus a sort of global network which connects various devices and smart objects using the internet technology for communication, control, and management purposes. There are various definitions of Internet of Things. According to the Center for Data and Innovation, the Internet of Things is a platform for objects and smart devices to communicate via the internet with the world around them [3]. It is also defined as the things which have identities and virtual personality, and are capable of communication within the social, environmental, and user context via the internet and intelligent interfaces [4]. Internet of Things has emerged as one of the promising technologies of future due to its wide domain-based applications. According to the research, it is predicted that Internet of Things shall take nearly 5 to 10 years for market adoption and due to its wide domain applications, it shall be the most popular technology to be used by 2020 [7]. It provides applications for personal and home purposes like a washing machine, air conditioner controller, energy management solutions etc,. [8]. It provides enterprise solutions for health care services, emergency management services, water management services, and Mobile services like smart management for transportation and logistics systems. Internet of Things is used using the machine to machine communication for various applications like transportation management, logistics management in large warehouses using RFID, and Wireless Sensor Networks. These applications have proven to be utilizing technology resources in an optimal manner and pr ovide decreased cost solutions for monitoring and control [5]. Many healthcare institutions and emergency services are widely adopting this technology as these smart devices are capable to communicate within the small environment very easily and in a user-friendly manner. These devices are providing a fast communicating experience at cheaper costs. Thus, many health institutions have adopted these technologies for the patient monitoring system, for quick response emergency team communication, vital health status monitoring system, etc. [4]. Architecture Internet of Things is a combination of four major layers which perform a specific task. These layers are as follows: Perception layer: This layer is used to collect the input data with the help of sensors. It also helps in identifying the associated objects of the environment [1]. Network Layer: This layer is used to transfer the gathered information from the perception layer to other information processing applications or devices via communication networks like the Internet [12]. MiddleWare layer: In this layer actions are performed based on the processing outputs of the provided input data and the instructions stored in the databases. Thus, in this layer, an information processing system linked with databases is used to perform the desired action from the device [12]. Application Layer: This layer identifies various applications based on needs of users and industry standards [12]. The basic elements that make the Internet of Things possible are Radio Frequency Identification (RFID) which is used to identify the object and provide sensors for gathering input data via object identification, Wireless Sensor Networks (WSN) are used for creating a sensor network for remote sensing applications; Addressing Schemes are used to represent the uniquely identified objects in the databases; Data Storage and analytics provide capability for storing, and sharing data for monitoring and processing purposes; and Visualization element allows interaction of the user with the environment [10]. Security Issues The major security goal of Internet of Things applications is to ensure that the data is confidential, authentic, and available for communication. Thus, security triad CIA model is employed for providing information security in these applications. The IoT devices are generally wireless based objects and can be located in public places for applications ranging from personal control and monitoring to public utilities control and management. Thus, these applications are prone to security threats. Some of the major security threats in Internet of Things are as follows: Authentication issues: IoT makes use of technologies like RFID, WSN, etc. Due to open wireless signals, it is easy for an attacker to search for a particular ongoing communication, intercept it, monitor it and jam the communication signals [7]. Thus, with weak authentication, the attacker can perform attacks like denial of service attacks, replace the objects, and the data on tags of the RFID easily and create confusion [1]. Once the attacker is able to make a false authentication it is possible for attackers to change the data, duplicate the data, and thus have an effect on integrity and confidentiality of the data [2]. Privacy threats: The IoT based applications have with the large databases containing vital information like patient records and customer records for control and monitoring. The privacy of the data can be attacked using various kinds of attacks like virus-based attacks[5], Trojan Horses, phishing attacks, sniffing attacks, etc. [6]. Spam-based emails and messages can be delivered to the end devices for gaining credentials and then the data can be compromised using the phishing attacks [8]. Sleep Deprivation Attack: In this attack, the sensor nodes of the Wireless sensor networks are not allowed to sleep as per their sleep routines. This impacts their battery consumption and can stop the nodes to work after the discharge of the batteries. This attack can take place by breaching the trust of the communication channel and the network [9]. Countermeasures In order to ensure the Data privacy, it is essential to provide secure authentication mechanism, secure access control mechanism, and secure data confidentiality mechanism. The security measure for authentication based threats is a layered approach where different authentication controls are provided at different levels of the IoT structure. At the perception layer level for authentication, various cryptographic Hash algorithms can be used which can provide digital signatures for identification of the users [11]. These digital signatures can even provide private communication and thus can counter attacks like brute force attacks, collision attacks, etc. For authentication control at the network layer level, a point to point authentication mechanism can be used. This shall prevent the illegal access to the sensor nodes to spread fake information. For Middle layer level and at the application layer level, it is suggested to make use of cooperating services where any user can choose the associated information to be shared with the services. Thus, using a layered authentication mechanism, a strong authentication security can be provided to the IoT applications. Conclusion Internet of Things is a platform for objects and smart devices to communicate via the internet with the world around them. Internet of Things has emerged as one of the promising technologies of future due to its wide domain-based applications. Due to the Internet of Things various public resources are used in an optimized manner, quality services are provided to the users and to have a decreased operational cost of these services. As IoT provides connectivity between various things and makes use of wireless communication medium it is prone to various kinds of security threats that affect the confidentiality, integrity, and availability of the data. A layered authentication approach is suggested in this work as a countermeasure to the authentication threats in the Internet of Things applications. In the future, more validation, risk evaluation, and instruction detection methods are needed for securing these kinds of applications. References Singh, G. Tripathi, A.J. Jara, A survey of Internet-of-Things: Future Vision, Architecture, Challenges, and Services, in Internet of Things (WF-IoT), 2014 Roman, P. Najera and J. Lopez, "Securing the Internet of Things,", IEEE Computer, vol. 44, pp. 51-58, 2011. Yang, Z. Li, Z. Geng, H. Zhang, A Multilayer Security Model for Internet of Things, in Communications in Computer and Information Science, 2012, Volume 312, pp 388-393 Liu, Y. Zhang, J. Zeng, L. Peng, R. Chen, Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology, in Eighth International Conference on Natural Computation (ICNC), 2012 Qiang, Guang-ri Quan, Bai Yu and Liu Yang, Research on Security Issues of the Internet of Things, in International Journal of Future Generation Communication and Networking, Volume 6, Number 6, 2013, pp. 1-10 MALEH and A. Ezzati, A Review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks, in International Journal of Wireless Mobile Networks (IJWMN), Volume 5, Number 6, 2013 Zhao, Research on data security technology in the internet of things, in 2013 2nd International Conference on Mechatronics and Control Engineering, ICMCE 2013, Dalian, China, 2013, pp. 17521755. Kothmayr, C. Schmitt, W. Hu, M. Brunig and G. Carle, Dtls based security and two-way authentication for the internet of things, Ad Hoc Netw. 11 (8) (2013) 27102723 Cao, B. Carminati, E. Ferrari and K.L. Tan, CASTLE: continuously anonymizing data streams, IEEE Trans. Dependable Secure Comput. 8 (3) (2011) 337352. [10]. A. Zanella, N. Bui, A. P. Castellani, L. Vangelista, and M. Zorzi, Internet of Things for smart cities, IEEE Internet Things J., vol. 1, no. 1, pp. 2232, Feb. 2014. [11]. A. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, Context-aware computing for the Internet of Things: a survey, IEEE Communications Surveys Tutorials, submitted 2013. [12]. Y. Liu, Z. Chen, F. Xia, X. Lv, F. Bu, A trust model based on service classification in mobile services, in: Proceedings 2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, Hangzhou, China, 2010, pp. 572576
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment