23-Submission 362 PP 124-131
23-Submission 362 PP 124-131
Abstract – Nowadays internet of thing is need of every person as it makes life easy and comfortable its
object work with sensors and actuator without involving human. This device gets users personal
information and store it in internet cloud etc. IoT device has limited storage, power consumption and the
capacity of network. Attacker can easily attack and get user information and use its wrong way in this
scenario to maintain and keep secure privacy in IoT devices is also big issues so IoT has major issue of
security. Its need to identify security threats and attacks and purpose solution to prevent from those attacks.
So that every person can use every IoT devices without any kind of fear and hesitation about their privacy
and trust and fear of loss private data. In this paper we focus on the layered architecture of IoT with its
threat and attack also highlight the suitable solution of each layer’s attack and focus on the security goal
which used and must achieve in every IoT devices to secure that devices from any kind of attacks and
threats that can breach the end user vulnerability and get access of end user’s system. We also discuss some
useful and existing techniques with services to prevent from different kind of attack that used worldwide.
124
environment for global connectivity that makes life are susceptible to hacker exploitation because of the
easier by being sensitive to, adaptable to, and IoT devices' extensive accessibility and
responding to, human requirements. Security is not interconnectedness. Finding a cutting-edge security
assured, though. When user signals are cut off or architecture that addresses problems with data
intercepted, users' privacy may be violated and security, data confidentiality, and data integrity is
their personal data may be exposed. therefore necessary [7].
In order to secure the IoT, there are still unresolved
This issue needs to be resolved in order to provide problems and difficulties that must be overcome. 37
users confidence regarding their privacy and As a result, the IoT systems have security flaws and
control over their personal information before the are open to several attacks [8]. The underlying cause
IoT is widely used. Addressing security issues is of these defects or successful assaults is that the
crucial for the growth of the Internet of Things. In controls or the underlining architecture are not
strong enough to safeguard Internet of Things
addition to proposing potential ideas for enhancing
(IoT)based applications [9]. Security measures
the IoT security architecture, this study seeks to
should be taken into account for the entire design
serve as a valuable guidebook of current security because each layer of the IoT architecture has
risks and vulnerabilities of the varied IoT distinct security challenges and interacts with other
environment [2]. layers [10].
II.LITERATURE REVIEW
Several different goods and technologies are used at
The term "Internet of Things" refers to a network every layer, from sensing to the application. At the
made up of "smart objects," which are multiple edge nodes, these include several sensors and
physical objects, sensors, and edge devices that actuators. There are numerous communication
communicate via various Internet resources and are protocols, including Bluetooth, Wi-Fi, IEEE
used for a variety of purposes in a variety of 802.15.4, Insteon, dash7, and cellular networks. All
industries, including apparel, logistics, health care, of these requirements must be met by a handshake
and transportation (IoT). It is among the most mechanism. In addition, multiple communication
significant technological revolutions of our time [4]. technologies, such as ZigBee, 6LOWPAN, wireless
HART, Z-Wave, ISA100, Bluetooth, NFC, RFID,
It is a predecessor to the smart world because it uses etc., are employed at different levels in the same IoT
pervasive computing and networking to simplify application [11].
and provide other services, like the simple
monitoring of many environmental phenomena. With the help of cutting-edge technologies like
With the development of computing and Radio-Frequency Identification (RFID) and
communication technologies, the quality of the Wireless Sensor Networks (WSNs), which are
environment and ordinary items, often known as sensed by the sensor devices and then processed for
things, objects, or machines, is increasing. Although decision-making, on the basis of which an
an IoT architecture may offer a range of solutions automated action is performed, the fundamental
for different industries, its major objective is to goal of the Internet of Things is to enable
create a working, scalable, flexible, maintainable, autonomous exchange of useful information
and affordable IoT ecosystem [5]. between invisibly embedded different uniquely
identifiable real world devices around us [12].
However, because of their limited resources and the
intrinsic IoT environment conditions—basically,
Due to security issues and challenges every source
the dynamic element, the heterogeneity, and the
of internet can exploit and breach the vulnerability.
open and wireless means of communication—
As each architecture layer have some security
connected objects are typically vulnerable. The
problems. In this paper we described the IoT
majority of conventional security mechanisms
elements that purposed different researchers in IoT
created so far for the Internet do not meet IoT
devices. We also highlight security goals that must
security needs, making IoT network security a
achieve to get authenticity, trust and privacy. We
persistently open and difficult problem [6]. Systems
have reviewed on each architecture layer of IoT and
125
suitable techniques and solution to resolve that address. By using Electron Product Code(EPC),
issues and improved layered architecture of IoT IPv6 and ubiquitous code we can provide address.
which have mac layer and data and assets security
Sensing
layer that is called seventh layer architecture of IoT.
Sensing is processing of gathering data from its
III. MATERIALS AND METHOD related environment and after processing get
We reviewed the security goals IoT elements, information and send to the database or cloud.
different layered architecture of IoT and related There are some sensing devices like FRID,
threats that create problem and issue for end users. actuator, and wearable sensing devices.
A. Security Goals of IoT
Communication
In the following section we presented the security
goals that help to make IoT devices secure and It is main element of IoT that help devices to send
trustable. and receive data, files and communicate with each
other. For example, NFC, Bluetooth, and Wi-Fi.
Confidentiality
Computation
Confidentiality ensure that information is available
just for authorized and authentic user and keep all It works like brain of IoT. It controls and manage
information private from unauthorized access and the computation power of IoT. Like Lite OS.
information only share with trusted user it ensure Services
that information cannot be disclose and not share
with illegal user. Four type of services provides for customer.
126
1. Three Layered Architectures and Security Issues attacker get cryptographic keys and know about the
password of user.
Network Layer
This layer act like a bridge between perception
layer and application layer. It gets information from
perception layer and send it to application layer
using different kind of protocol. Its basic purpose
to transmit information.
Security Threats
Denial of service: It is kind of attack in which
attacker create a traffic on particular network to
create difficulty for authentic user on that network.
So that original user does not get access easily on
network.
Figure 1. Three-layers IoT [8]
127
Malicious Code: In this attacker injected a part of
malicious code that create unexpected impact and
issues that may damage the system.
Unauthorized access data: Attacker attack and gain
access on whole network then use it data illegal
way.
2. Four Layered Architectures and Security Issues
129
In architecture first we discuss three layered
architecture utilizes wired or wireless methods to
carry and/or transmit the data gathered by the
sensors. Additionally, it is in charge of establishing
connections between the various networks, "smart,"
and network devices. As a result, it has numerous
security problems with information integrity and
authentication.
Then the purpose of fourth layered architecture that
is security in the IoT architecture is the justification
for adding a fourth layer. In a three layer
architecture, data is routed straight to the network
layer. Sending data straight to the network layer
increases the likelihood of encountering attacks. But
in four layered architectures there is some security
issues then five layered architectures are discussed
which have two extra layer business and processing
layer. We purposed seventh layered architecture that
help to secure data before any malicious action
Figure 4. Improved layer architecture of IoT
perform and secure that data in storage devices and
mac layer provide authentication and help to
IV. RESULTS achieve main IoT security goals.
We discussed the different kind of techniques and VI. CONCLUSION
protocol and that reviewed services related
Due to security issues and challenges every
security, privacy and authenticity. source of internet can exploit and breach the
Table 1. Techniques and Services vulnerability. As each architecture layer have some
No Techniques Services security problems. In this paper we highlight the IoT
elements that must have in IoT devices. We also
1 Encryption Confidentiality
mentioned security goals that must achieve to get
2 Hash Function Integrity authenticity, trust and privacy. We have reviewed
3 MAC Authenticity on each architecture layer of IoT and purposed
Integrity, Non- suitable techniques and solution to resolve that
4 Digital Signature Repudiation, and issues and reviewed improved layered architecture
Authenticity of IoT which have mac layer and data and assets
security layer that is called seventh layer
5 Kerberos Authentication
architecture of IoT.
ACKNOWLEDGMENT
V. DISCUSSION
Thankfully, we are aware of our parents' affection
We reviewed this pervasive computing for us. Last but not least, we would like to thank our
environment where sensors and actuators will be family and friends whose prayers made it possible
connected to both living and non-living "things" and for us to finish this project.
will all be a part of the Internet, in addition to
computers and smartphones. IoT security issues and REFERENCES
related technologies play a significant part in its [1] Kumar, S. A., Vealey, T., & Srivastava, H. (2016,
implementation. The purpose of IoT security, IoT January). Security in internet of things: Challenges,
components, and a security-based study of IoT solutions and future directions. In 2016 49th Hawaii
International Conference on System Sciences (HICSS)
architecture have all been covered in this paper. We
(pp. 5772-5781). IEEE.
have discussed and examined the security threats [2] Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi,
related to key IoT technologies and the F. (2017). Internet of Things security: A survey. Journal
architecture's security [13]. of Network and Computer Applications, 88, 10-28.
130
[3] Burhan, M., Rehman, R. A., Khan, B., & Kim, B. S.
(2018). IoT elements, layered architectures and security
issues: A comprehensive survey. Sensors, 18(9), 2796.
[4] Gupta, S., Gabrani, G., & Arya, P. K. (2022). Intrusion
Detection System with Layered Approach to Internet of
Things—A Business Paradigm. In Internet of
Things (pp. 117-132). Springer, Singapore.
[5] Punia, A., Tiwari, M., & Verma, S. S. (2023). The IoT in
Security Architecture, Challenges, and Solutions. In
International Conference on Optical and Wireless
Technologies (pp. 405-416). Springer, Singapore.
[6] Swessi, D., & Idoudi, H. (2022). A survey on internet-
ofthings security: threats and emerging countermeasures.
Wireless Personal
Communications, 124(2), 1557-1592.
[7] Ali, A., Mateen, A., Hanan, A., & Amin, F. (2022).
Advanced Security Framework for Internet of Things
(IoT). Technologies, 10(3), 60.
[8] Deep, S., Zheng, X., Jolfaei, A., Yu, D., Ostovari, P., &
Kashif Bashir, A. (2022). A survey of security and
privacy issues in the Internet of Things from the layered
context. Transactions on Emerging Telecommunications
Technologies, 33(6), e3935.
[9] Aryavalli, S. N. G., & Kumar, H. (2023). Top 12
layerwise security challenges and a secure architectural
solution for Internet of Things. Computers and Electrical
Engineering, 105, 108487.
[10] Lee, I. (2020). Internet of Things (IoT) cybersecurity:
Literature review and IoT cyber risk management.
Future Internet, 12(9), 157.
[11] Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P.,
& Sikdar, B. (2019). A survey on IoT security:
application areas, security threats, and solution
architectures. IEEE Access, 7, 82721-82743.
[12] Farooq, M. U., Waseem, M., Mazhar, S., Khairi, A., &
Kamal, T. (2015). A review on internet of things (IoT).
International journal of computer applications, 113(1),
1-7.
[13] Adat, V., & Gupta, B. B. (2018). Security in Internet of
Things: issues, challenges, taxonomy, and architecture.
Telecommunication Systems, 67(3), 423441.
131