0% found this document useful (0 votes)
94 views7 pages

Paper 50-Security Issues in The Internet of Things

This document summarizes a research publication that examines security issues in the Internet of Things (IoT). The publication provides a comprehensive study of security threats in IoT networks, including issues related to confidentiality, authentication, access control, and data integrity. It discusses how the widespread adoption of IoT devices has introduced new security risks as more devices are connected via the internet. The document also analyzes different types of attacks on IoT networks and potential solutions to enhance security and privacy in the IoT.

Uploaded by

Alti Adel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views7 pages

Paper 50-Security Issues in The Internet of Things

This document summarizes a research publication that examines security issues in the Internet of Things (IoT). The publication provides a comprehensive study of security threats in IoT networks, including issues related to confidentiality, authentication, access control, and data integrity. It discusses how the widespread adoption of IoT devices has introduced new security risks as more devices are connected via the internet. The document also analyzes different types of attacks on IoT networks and potential solutions to enhance security and privacy in the IoT.

Uploaded by

Alti Adel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/318096417

Security Issues in the Internet of Things (IoT): A Comprehensive Study

Article  in  International Journal of Advanced Computer Science and Applications · January 2017


DOI: 10.14569/IJACSA.2017.080650

CITATIONS READS
23 1,431

4 authors, including:

Mirza Abdur Razzaq


Shah Abdul Latif University
5 PUBLICATIONS   24 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

PhD Computer Science View project

All content following this page was uploaded by Mirza Abdur Razzaq on 08 July 2017.

The user has requested enhancement of the downloaded file.


(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017

Security Issues in the Internet of Things (IoT): A


Comprehensive Study

Mirza Abdur Razzaq Muhammad Ali Qureshi


Department of Computer Science Department of Telecommunication Engineering
Shah Abdul Latif University University College of Engineering and Technology
Khairpur, Pakistan The Islamia University of Bahawalpur, Pakistan

Sajid Habib Gill Saleem Ullah


Department of Computer Science Department of Computer Science & IT
NCBA & E Rahim Yar Khan Campus Khwaja Fareed University of Engineering and IT
Rahim Yar Khan, Pakistan Rahim Yar Khan, Pakistan

Abstract—Wireless communication networks are highly prone work, shop, chat (keep pets and plants in the virtual world
to security threats. The major applications of wireless commu- provided by the network), whereas humans live in the real
nication networks are in military, business, healthcare, retail, world. Therefore, it is very difficult to replace all the human
and transportations. These systems use wired, cellular, or adhoc activities with the fully automated living. There is a bounding
networks. Wireless sensor networks, actuator networks, and limit of fictional space that restricts the future development
vehicular networks have received a great attention in society
of internet for better services. The IoT has successfully in-
and industry. In recent years, the Internet of Things (IoT) has
received considerable research attention. The IoT is considered tegrated the fictional space and the real world on the same
as future of the internet. In future, IoT will play a vital role platform. The major targets of IoT are the configuration of
and will change our living styles, standards, as well as business a smart environment and self-conscious independent devices
models. The usage of IoT in different applications is expected such as smart living, smart items, smart health, and smart
to rise rapidly in the coming years. The IoT allows billions of cities among others [2]. Nowadays the adoption rate of the
devices, peoples, and services to connect with others and exchange IoT devices is very high, more and more devices are connected
information. Due to the increased usage of IoT devices, the IoT via the internet. According to appraisal [3], there are 30 billion
networks are prone to various security attacks. The deployment connected things with approximate 200 billion connections that
of efficient security and privacy protocols in IoT networks is will generate revenue of approximately 700 billion euros by the
extremely needed to ensure confidentiality, authentication, access
year 2020. Now in China, there are nine billion devices that are
control, and integrity, among others. In this paper, an extensive
comprehensive study on security and privacy issues in IoT expected to reach 24 billion by the year 2020. In future, the IoT
networks is provided. will completely change our living styles and business models.
It will permit people and devices to communicate anytime,
Keywords—Internet of Things (IoT); security issues in IoT; anyplace, with any device under ideal conditions using any
security; privacy network and any service [4]. The main goal of IoT is to create
Superior world for human beings in future. Fig. 1 shows the
I. I NTRODUCTION concept of IoT with their capabilities.

Internet of Things (IoT) has attracted considerable attention


Unfortunately, the majority of these devices and appli-
during the past few years. The concept of IoT was firstly
cations are not designed to handle the security and privacy
proposed by Kevin Ashton in 1999. Due to rapid advance-
attacks and it increases a lot of security and privacy issues
ments in mobile communication, Wireless Sensor Networks
in the IoT networks such as confidentiality, authentication,
(WSN), Radio Frequency IDentification (RFID), and cloud
data integrity, access control, secrecy, etc. [5]. On every day,
computing, communications among IoT devices has become
the IoT devices are targeted by attackers and intruders. An
more convenient than it was before. IoT devices are capable
appraisal discloses that 70% of the IoT devices are very easy to
of co-operating with one another. The World of IoT includes
attack. Therefore, an efficient mechanism is extremely needed
a huge variety of devices that include smart phones, personal
to secure the devices connected to the internet against hackers
computers, PDAs, laptops, tablets, and other hand-held em-
and intruders.
bedded devices. The IoT devices are based on cost-effective
sensors and wireless communication systems to communicate
with each other and transfer meaningful information to the The rest of the paper is organized as: Section II discusses
centralized system. The information from IoT devices is further IoT applications while Section III provides a brief overview
processed in the centralized system and delivered to the of security requirements followed by security threats in IoT
intended destinations. With the rapid growth of communication are discussed in Section IV. Section V provides analysis of
and internet technology, our daily routines are more concen- different attacks and their possible solutions and finally the
trated on a fictional space of virtual world [1]. People can paper is concluded in Section VI.
www.ijacsa.thesai.org 383 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017

status of the device, medical reports, and change parameters of


the device, or update status on the device. Wireless interface
AnyBusiness AnyNetwork causes a lot of security and privacy threats for the patient. The
AnyService AnyPath wireless interface of such devices is very easy to cyber-attacks
that may jeopardize the patients security, privacy, and safety.
In the case of health care, the primary goal is to ensure the
security of network in order to prevent the privacy of patient
from malicious attacks. When attackers attack mobile devices,
they have their predefined goals. Usually, their aim is to steal
AnyBody Internet of Things AnyDevice the information, attack on devices to utilize their resources, or
AnyOne (IoT) AnyThing may shut down some applications that are monitoring patients
condition.
There are many types of attacks on medical devices that
include eavesdropping in which privacy of the patient is leaked,
integrity error in which the message is being altered, and
availability issues which include battery draining attacks. Some
AnyContext AnyWhere cyber security threats related to security, privacy, and safety of
AnyTime AnyPlace medical data of patient are discussed as follows:
1) PMDs are critical to any task that uses battery power.
Hence these devices must support a limited encryp-
Fig. 1. Definition of IoT.
tion. If the device is a part of different networks then
confidentiality, availability, privacy, and integrity will
be at high risk.
II. I OT A PPLICATIONS 2) As PMDs have no authentication mechanism for
wireless communication. So the information stored
The main objectives of IoT are the configuration of a smart in the device may be easily accessed by unauthorized
environment and self-conscious independent devices such as persons.
smart living, smart items, smart health, and smart cities among 3) Absence of secure authentication also uncovers the
others [2]. The applications of IoT in industries, medical field, devices to many other security threats that may leads
and in home automation are discussed in the following section. to malicious attacks. A hostile may launch Denial of
Service (DoS) attacks.
A. IoT in Industries 4) The data of patient is sent over transmission medium
which may be altered by unauthorized parties, as a
The IoT has provided a fair opportunity to build significant result privacy of a patient may loss.
industrial systems and applications [6], in an intelligent IoT
transportation system, the authorized person can monitor the C. IoT in Smart Home
existing location and movement of a vehicle. The authorized
person can also predict its future location and road traffic. The IoT smart home services are increasing day by day [9],
In earlier stage, the term IoT was used to identify unique digital devices can effectively communicate with each other
objects with RFID. Latterly, the researchers relate the term using Internet Protocol (IP) addresses. All smart home devices
IoT with sensors, Global Positioning System (GPS) devices, are connected to the internet in a smart home environment.
mobile devices, and actuators. The acceptance and services of As the number of devices increases in the smart home en-
new IoT technologies mainly depend upon the privacy of data vironment, the chances of malicious attacks also increase. If
and security of information. The IoT permits many things to be smart home devices are operated independently the chances of
connected, tracked and monitored so meaningful information malicious attacks also decreases. Presently smart home devices
and private data collected automatically. In IoT environment, can be accessed through the internet everywhere at any time.
the privacy protection is a more critical issue as compared to So, it increases the chances of malicious attacks on these
traditional networks because numbers of attacks on IoT are devices.
very high. A smart home consists of four parts: service platform,
smart devices, home gateway, and home network as shown
B. IoT in Personal Medical Devices in Fig. 2. In the smart home, many devices are connected
and smartly shares information using a home network. Con-
The IoT devices are also widely used in healthcare systems sequently, there exists a home gateway that controls the flow
for monitoring and assessment of patients [7]. To monitor of information among smart devices connected to the external
the medical condition of a patient, Personal Medical Devices network. Service platform uses the services of service provider
(PMDs) are either planted in patients body or it may attach that deliver different services to the home network.
to patients body externally. PMDs are small electronic devices
that are becoming very common and popular. The market value
III. S ECURITY R EQUIREMENTS
of these devices is projected to be around 17 billion dollars
by 2019 [8]. These devices use a wireless interface to perform In IoT, all the devices and people are connected with each
communication with a base station that is further used to read other to provide services at any time and at any place. Most
www.ijacsa.thesai.org 384 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017

Fig. 3. Threats in smart home in IoTs.

Fig. 2. Elements of a smart home in IoTs.


of devices [13], [14]. Hence a secure mechanism is needed to
protect the personal information.
of the devices connected to the internet are not equipped with
efficient security mechanisms and are vulnerable to various Moreover, for IoT services, there are multiple types of
privacy and security issues e.g., confidentiality, integrity, and devices that perform communication using different networks.
authenticity, etc. For the IoT, some security requirements must It means there are a lot of security issues on user privacy
be fulfilled to prevent the network from malicious attacks [7], and network layer. User privacy can also be uncovered from
[10], [11]. Here, some of the most required capabilities of a different routes. Some security threats in the IoT are as follows:
secure network are briefly discussed.
1) E2E Data life cycle protection: To ensure the
• Resilience to attacks: The system should be capable security of data in IoT environment, end-to-end data
enough to recover itself in case if it crashes during protection is provided in a complete network. Data
data transmission. For an example, a server working is collected from different devices connected to each
in a multiuser environment, it must be intelligent and other and instantly shared with other devices. Thus,
strong enough to protect itself from intruders or an it requires a framework to protect the data, confiden-
eavesdropper. In the case, if it is down it would recover tiality of data and to manage information privacy in
itself without intimation the users of its down status. full data life cycle.
2) Secure thing planning: The interconnection and
• Data Authentication: The data and the associated communication among the devices in the IoT vary
information must be authenticated. An authentication according to the situation. Therefore, the devices must
mechanism is used to allow data transmission from be capable of maintaining security level. For example,
only authentic devices. when local devices and sensors used in the home-
• Access control: Only authorized persons are provided based network to communicate with each other safely,
access control. The system administrator must control their communication with external devices should
access to the users by managing their usernames and also work on same security policy.
passwords and by defining their access rights so that 3) Visible/usable security and privacy: Most of the se-
different users can access only relevant portion of the curity and privacy concerns are invoke by misconfig-
database or programs. uration of users. It is very difficult and unrealistic for
users to execute such privacy policies and complex
• Client privacy: The data and information should be security mechanism. It is needed to select security
in safe hands. Personal data should only be accessed and privacy policies that may apply automatically.
by authorized person to maintain the client privacy. It
means that no irrelevant authenticated user from the
system or any other type of client cannot have access A. Security Threats in Smart Home
to the private information of the client. Smart home services can be exposed to cyber-attacks be-
cause majority of the service provider do not consider security
IV. I OT S ECURITY, P RIVACY, T HREATS AND parameters at early stages. The possible security threats in a
C HALLENGES smart home are eavesdropping, Distributed Denial of Service
(DDoS) attacks and leakage of information, etc. Smart home
The era of IoT has changed our living styles [12]. Although networks are threatened by unauthorized access. The possible
the IoT provides huge benefits, it is prone to various security security threats to smart home are discussed as follows (see
threats in our daily life. The majority of the security threats Fig. 3).
are related to leakage of information and loss of services.
In IoT, the security threats straightforwardly are affecting the 1) Trespass: If the smart door lock is effected by malicious
physical security risk. The IoT consists of different devices and codes or it is accessed by an unauthorized party, the attacker
platform with different credentials, where every system needs can trespass on smart home without smashing the doorway
the security requirement depending upon its characteristics. as shown in Fig. 4. The result of this effect could be in the
The privacy of a user is also most important part because a lot form of loss of life or property. To get rid of such attacks,
of personal information is being shared among various types passwords should be changed frequently that must contain at
www.ijacsa.thesai.org 385 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017

Fig. 4. An example of Trespass attack, hacking a door lock.

Fig. 6. An example of DDoS attack.

Fig. 5. An example of monitoring personal information.

least ten characters because it is very difficult for attackers to


break the long password. Similarly, authentication mechanism Fig. 7. An example of falsification.
and access control may also be applied.
2) Monitoring and personal information leakage: Safety
is one of the important purposes of a smart home. Hence The IoT is a concept that depicts future where the physical
there are a lot of sensors that are used for fire monitoring, objects connected to internet communicate with each other and
baby monitoring, and housebreaking, etc. If these sensors are identify themselves for other devices [15]. The IoT system
hacked by an intruder then he can monitor the home and access consists of smart objects, smartphones, tablets and intelligent
personal information as shown in Fig. 5. To avoid from this devices etc. as shown in Fig. 8. Such systems use RFID,
attack, data encryption must be applied between gateway and Quick Response (QR) codes or wireless technology to perform
sensors or user authentication for the detection of unauthorized communication between different devices.
parties may be applied. The IoT helped to build connections from human to hu-
3) DoS/DDoS: Attackers may access the smart home net- man, human to physical objects, and physical object to other
work and send bulk messages to smart devices such as Clear physical objects. As per appraisal from IDC, there will be 30
To Send (CTS) / Request To Send (RTS). They can also attack billion internet connected devices by 2020. This rapid growth
targeted device by using malicious codes in order to perform of internet data needs more valuable and secure network.
DoS attacks on other devices that are connected in a smart
home as shown in Fig. 6. As a result, smart devices are
unable to perform proper functionalities because of draining
resources due to such attacks. For avoidance from this attack,
it is very important to apply authentication to block and detect
unauthorized access.
4) Falsification: When the devices in smart home perform
communication with the application server, the attacker may
collect the packets by changing routing table in the gateway
as shown in Fig. 7. Although the SSL (secure socket layer)
technique is applied, an attacker can bypass the forged certifi-
cate. In this way, the attacker can misinterpret the contents
of data or may leak the confidentiality of data. To secure
the smart home network from this attack, SSL technique with
proper authentication mechanism should be applied. It is also
important to block unauthorized devices that may try to access
smart home network. Fig. 8. Example of IoT system [16].

www.ijacsa.thesai.org 386 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017

B. IoT Challenges V. A NALYSIS OF D IFFERENT T YPES OF ATTACKS AND


P OSSIBLE S OLUTIONS
The security concern is the biggest challenge in IoT.
The application data of IoT could be industrial, enterprise, The IoT is facing various types of attacks including active
consumer or personal. This application data should be secured attacks and passive attacks that may easily disturb the function-
and must remain confidential against theft and tampering. ality and abolish the benefits of its services. In a passive attack,
For example, the IoT applications may store the results of a an intruder just senses the node or may steal the information
patients health or shopping store. The IoT improve the com- but it never attacks physically. However, the active attacks
munication between devices but still, there are issues related to disturb the performance physically. These active attacks are
the scalability, availability and response time. Security is a con- classified into two further categories that are internal attacks
cern where the data is securely transmitted over the internet. and external attacks. Such vulnerable attacks can prevent the
While transporting the data across international border, safety devices to communicate smartly. Hence the security constraints
measure act may be applied by government regulation such must be applied to prevent devices from malicious attacks.
as Health Insurance Portability and Accountability (HIPA) Different types of attack, nature/behavior of attack and threat
act. Among different security challenges, the most important level of attacks are discussed in this section. Different levels
challenges relevant to IoT are discussed. of attacks are categorized into four types according to their
behavior and propose possible solutions to threats/attacks.
1) Data Privacy: Some manufacturers of smart TVs collect
data about their customers to analyze their viewing habits so 1) Low-level attack: If an attacker tries to attack a
the data collected by the smart TVs may have a challenge for network and his attack is not successful.
data privacy during transmission. 2) Medium-level attack: If an attacker/intruder or an
eavesdropper is just listening to the medium but dont
2) Data Security: Data security is also a great challenge.
alter the integrity of data.
While transmitting data seamlessly, it is important to hide from
3) High-level attack: If an attack is carried on a net-
observing devices on the internet.
work and it alters the integrity of data or modifies the
3) Insurance Concerns: The insurance companies in- data.
stalling IoT devices on vehicles collect data about health and 4) Extremely High-level attack: If an intruder/attacker
driving status in order to take decisions about insurance. attacks on a network by gaining unauthorized access
and performing an illegal operation, making the net-
4) Lack of Common Standard: Since there are many work unavailable, sending bulk messages, or jamming
standards for IoT devices and IoT manufacturing industries. network.
Therefore, it is a big challenge to distinguish between permit-
ted and non-permitted devices connected to the internet. The Table I presents different types of attacks, their threat
levels, their nature/behavior, and possible solution to handle
5) Technical Concerns: Due to the increased usage of these attacks.
IoT devices, the traffic generated by these devices is also
increasing. Hence there is a need to increase network capacity,
therefore, it is also a challenge to store the huge amount of
data for analysis and further final storage. VI. C ONCLUSION

6) Security Attacks and System Vulnerabilities: There has The main emphasis of this paper was to highlight major
been a lot of work done in the scenario of IoT security up till security issues of IoT particularly, focusing the security attacks
now. The related work can be divided into system security, and their countermeasures. Due to lack of security mechanism
application security, and network security [17]. in IoT devices, many IoT devices become soft targets and
even this is not in the victim’s knowledge of being infected.
a) System Security: System security mainly focuses on In this paper, the security requirements are discussed such
overall IoT system to identify different security challenges, to as confidentiality, integrity, and authentication, etc. In this
design different security frameworks and to provide proper survey, twelve different types of attacks are categorized as
security guidelines in order to maintain the security of a low-level attacks, medium-level attacks, high-level attacks, and
network. extremely high-level attacks along with their nature/behavior
as well as suggested solutions to encounter these attacks are
b) Application security: Application Security works for discussed.
IoT application to handle security issues according to scenario
requirements. Considering the importance of security in IoT applications,
it is really important to install security mechanism in IoT
c) Network security: Network security deals with se- devices and communication networks. Moreover, to protect
curing the IoT communication network for communication of from any intruders or security threat, it is also recommended
different IoT devices. not to use default passwords for the devices and read the
security requirements for the devices before using it for the first
In the next section, the security concerns regarding IoT are time. Disabling the features that are not used may decrease the
discussed. The security attacks are categorized into four broad chances of security attacks. Moreover, it is important to study
classes. different security protocols used in IoT devices and networks.
www.ijacsa.thesai.org 387 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 8, No. 6, 2017

TABLE I. A S UMMARY OF D IFFERENT T YPES OF ATTACKS AND T HEIR T HREAT L EVELS , T HEIR NATURE AND S UGGESTED S OLUTIONS
Type Threat level Behavior Suggested Solution
Passive Low Usually breach data confidentiality. Examples are passive eaves- Ensure confidentiality of data and do not allow an attacker to
dropping and traffic analysis. Hostile silently listen the commu- fetch information using symmetric encryption techniques.
nication for his own benefits without altering the data.
Man in the Middle Low to Medium Alteration and eavesdropping are the examples of this attack. Apply data confidentiality and proper integration on data to
An eavesdropper can silently sense the transmission medium ensure integrity. Encryption can be also applied so that no one
and can modify the data if encryption is not applied and steal can steal the information or modify the information or encode
the information that is being transmitted. Hostile may also the information before transmission.
manipulate the data.
Eavesdropping Low to Medium The information content may be lost by an eavesdropper that Apply encryption on all the devices that perform communica-
silently senses the medium. For example in medical environ- tion.
ment, privacy of a patient may be leaked.
Gathering Medium to High Occurs when data is gathered from different wireless or wired Encryption can be applied to prevent this kind of attack. Identity
medium. Examples are skimming, tampering and eavesdrop- based method and message authentication code can also be
ping. Data is being collected to detect messages. Messages may applied in order to prevent the network from such malicious
also be altered. attacks.
Active High Effects confidentiality and integrity of data. Hostile can alter Ensure both confidentiality and integrity of data. To maintain
the integrity of messages, block messages, or may re-route the data confidentiality, symmetric encryption can be applied. An
messages. It could be an internal attacker. authentication mechanism may be applied to allow data access
to only authorized person.
Imitation High It impersonate for an unauthorized access. Spoofing and cloning To avoid from spoofing and cloning attacks, apply identity
are the examples of this attack. In spoofing attack a malicious based authentication protocols. Physically unclonable function
node impersonate any other device and launch attacks to steal is a countermeasure for cloning attack.
data or to spread malware. Cloning can re-write or duplicate
data.
Privacy High Sensitive information of an individual or group may be dis- Apply anonymous data transmission. Transmit sample data
closed. Such attacks may be correlated to gathering attack or instead of actual data. Can also apply techniques like ring
may cause an imitation attack that can further lead to exposure signature and blind signature.
of privacy.
Interruption High Affects availability of data. This makes the network unavailable. Applying authorization, only authorized users are allowed to
access specific information to perform certain operation.
Routing diversion High Only the route is diverted showing the huge traffic and the Ensure connectivity based approach so no route will be di-
response time increased. verted.
Blocking Extremely High It is type of DoS, jamming, or malware attacks. It sends huge Turn on the firewall, apply packet filtering, anti-jamming, active
streams of data which may leads to jamming of network, jamming, and updated antivirus programs in order to protect the
similarly different types of viruses like Trojan horses, worms, network from such attacks.
and other programs can disturb the network.
Fabrication Extremely High Affects the authenticity of information. Hostile can inject false Data authenticity can be applied to ensure that no information
data and can destroy the authenticity of information. is changed during the transmission of data.
DoS Extremely High Malicious user may modify the packets or resend a packet again Apply cryptographic techniques to ensure security of network.
and again on network. User can also send bulk messages to Apply authenticity to detect the malicious user and block
devices in order to disturb the normal functionalities of devices. them permanently. In this way, the network is prevented from
damage.

R EFERENCES [9] S. Yoon, H. Park, and H. S. Yoo, “Security issues on smarthome in


iot environment,” in Computer Science and its Applications. Springer,
[1] J. S. Kumar and D. R. Patel, “A survey on internet of things: Security 2015, pp. 691–696.
and privacy issues,” International Journal of Computer Applications,
vol. 90, no. 11, 2014. [10] R. H. Weber, “Internet of things–new security and privacy challenges,”
Computer law & security review, vol. 26, no. 1, pp. 23–30, 2010.
[2] M. Abomhara and G. M. Køien, “Security and privacy in the internet
of things: Current status and open issues,” in Privacy and Security in [11] S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, “Proposed
Mobile Systems (PRISMS), International Conference on. IEEE, 2014, security model and threat taxonomy for the internet of things (iot),”
pp. 1–8. in International Conference on Network Security and Applications.
Springer, 2010, pp. 420–429.
[3] S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, “A vision of iot:
Applications, challenges, and opportunities with china perspective,” [12] Y. H. Hwang, “Iot security & privacy: threats and challenges,” in
IEEE Internet of Things journal, vol. 1, no. 4, pp. 349–359, 2014. Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and
Security. ACM, 2015, pp. 1–1.
[4] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,”
Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct 2010. [13] M. A. Qureshi, A. Aziz, B. Ahmed, A. Khalid, and H. Munir, “Com-
parative analysis and implementation of efficientdigital image water-
[5] M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis of marking schemes,” International Journal of Computer and Electrical
security issues, challenges, and open problems in the internet of things,” Engineering, vol. 4, no. 4, p. 558, 2012.
in Services (SERVICES), 2015 IEEE World Congress on. IEEE, 2015,
pp. 21–28. [14] M. Abdur Razzaq, R. A. Sheikh, A. Baig, and A. Ahmad, “Digital im-
age security: Fusion of encryption, steganography and watermarking,”
[6] L. Da Xu, W. He, and S. Li, “Internet of things in industries: A survey,” International Journal of Advanced Computer Science and Applications
IEEE Transactions on industrial informatics, vol. 10, no. 4, pp. 2233– (IJACSA), vol. 8, no. 5, 2017.
2243, 2014.
[15] S. Singh and N. Singh, “Internet of things (iot): Security challenges,
[7] L. M. R. Tarouco, L. M. Bertholdo, L. Z. Granville, L. M. R. Arbiza, business opportunities & reference architecture for e-commerce,” in
F. Carbone, M. Marotta, and J. J. C. de Santanna, “Internet of things Green Computing and Internet of Things (ICGCIoT), 2015 International
in healthcare: Interoperatibility and security issues,” in Communications Conference on. IEEE, 2015, pp. 1577–1581.
(ICC), IEEE International Conference on. IEEE, 2012, pp. 6121–6125.
[16] K. Rose, S. Eldridge, and L. Chapin, “The internet of things: An
[8] A. Mohan, “Cyber security for personal medical devices internet of overview,” The Internet Society (ISOC), pp. 1–50, 2015.
things,” in Distributed Computing in Sensor Systems (DCOSS), 2014
IEEE International Conference on. IEEE, 2014, pp. 372–374. [17] H. Ning, H. Liu, and L. T. Yang, “Cyberentity security in the internet
of things,” Computer, vol. 46, no. 4, pp. 46–53, 2013.

www.ijacsa.thesai.org 388 | P a g e

View publication stats

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy