Deployment of IoT based smart environment : key issues and challenges

  • Authors

    • Deepti Sehrawat Department of Computer Science and Applications, Maharshi Dayanand University, Rohtak, Haryana (India)
    • Nasib Singh Gill Department of Computer Science and Applications, Maharshi Dayanand University, Rohtak, Haryana (India)
    2018-04-13
    https://doi.org/10.14419/ijet.v7i2.9504
  • , IoT architecture, Key Technologies, Security, Threats, Threats Prevention.
  • The Internet of Things (IoT) is viewed as a dynamic technological revolution representing future communications and computing in several areas. It introduces physical objects in the sphere of cyber world. IoT is not about a single technology but various complementary technological developments which provides ways to bridge the gap between the real world and the virtual world. A number of wireless sensor technologies are implemented in IoT viz. RFID, ZigBee, actuators, WiFi and wireless sensor networks (WSNs). This paper presents various key technologies involved in IoT and its detailed architecture. IoT architecture explains function of each layer with respect to the technologies and the devices that surround each layer. Each layer has its specific security issues. This paper presents various security threats related to each IoT layer and the specific security requirements. Information security, data protection, and user's privacy are among important key areas in IoT. This paper in the nutshell presents new challenges posed by IoT so that further work can be undertaken in creating a robust, efficient and smart environment for IoT based applications.

  • References

    1. [1] Razzak, F., Spamming the Internet of Things: A Possibility and its probable Solution, Procedia computer science, vol. 10 (2012) 658-665. https://doi.org/10.1016/j.procs.2012.06.084.

      [2] Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., Internet of Things (IoT): A vision, architectural elements, and future directions, Future generation computer systems, vol. 29, no. 7 (2013) 1645-1660. https://doi.org/10.1016/j.future.2013.01.010.

      [3] Kumar, J.S. and Patel, D.R., A survey on internet of things: Security and privacy issues, International Journal of Computer Applications, vol. 90, no. 11 (2014).

      [4] Bertino, E., Data Security and Privacy in the IoT, Proc. 19th Int. Conf. Extending Database Technol., (2016) 1-3.

      [5] Qiang, C., Quan, G.R., Yu, B. and Yang, L., Research on security issues of the internet of things, International Journal of Future Generation Communication and Networking, vol. 6, no. 6 (2013) 1-10. http://www.earticle.net/Article.aspx?sn=217332 https://doi.org/10.14257/ijfgcn.2013.6.6.01.

      [6] Khan, R., Khan, S.U., Zaheer, R. and Khan, S., Future internet: the internet of things architecture, possible applications and key challenges, 10th International Conference on Frontiers of Information Technology (FIT), (2012) 257-260. IEEE. https://doi.org/10.1109/FIT.2012.53.

      [7] Sarkar, C., Nambi, S.A.U., Prasad, R.V. and Rahim, A., A scalable distributed architecture towards unifying IoT applications, World Forum Internet of Things (WF-IoT), (2014) 508-513. IEEE. https://doi.org/10.1109/WF-IoT.2014.6803220.

      [8] Ungurean, I., Gaitan, N.C. and Gaitan, V.G., An IoT architecture for things from industrial environment, 10th International Conference on Communications (COMM),(2014) 1-4. IEEE. https://doi.org/10.1109/ICComm.2014.6866713.

      [9] Kulkarni, G., Sutar, R. and Mohite, S., RFID security issues & challenges, International Conference on Electronics and Communication Systems (ICECS), (2014) 1-4. IEEE. https://doi.org/10.1109/ECS.2014.6892730.

      [10] Chen, X.Y. and Jin, Z.G., Research on key technology and applications for internet of things, Physics Procedia, vol. 33 (2012) 561-566. https://doi.org/10.1016/j.phpro.2012.05.104.

      [11] Asplund, M. and Nadjm-Tehrani, S., Attitudes and perceptions of IoT security in critical societal services, IEEE Access, vol. 4 (2016) 2130-2138. https://doi.org/10.1109/ACCESS.2016.2560919.

      [12] Deng, J., Han, R. and Mishra, S., Defending against path-based DoS attacks in wireless sensor networks, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (2005) 89-96. ACM. https://doi.org/10.1145/1102219.1102235.

      [13] Jin, R., Du, X., Deng, Z., Zeng, K. and Xu, J., Practical secret key agreement for full-duplex near field communications, Transactions on Mobile Computing, vol. 15, no. 4 (2016) 938-951. IEEE. https://doi.org/10.1109/ACCESS.2016.2560919.

      [14] Khoo, B., RFID as an Enabler of the Internet of Things: Issues of Security and Privacy, Internet of Things (iThings/CPSCom), 4th International Conference on Cyber, Physical and Social Computing (2011) 709-712. IEEE. https://doi.org/10.1109/iThings/CPSCom.2011.83.

      [15] Garcia-Alfaro, J., Herrera-Joancomarti, J. and Melia-Segui, J., Security and privacy concerns about the RFID layer of EPC Gen2 networks, Advanced research in data privacy(2015) 303-324. Springer, Cham. https://doi.org/10.1007/978-3-319-09885-2_17.

      [16] Kfir, Z. and Wool, A., Picking virtual pockets using relay attacks on contactless smartcard, Proc. - First Int. Conf. Security and Privacy for Emerging Areas in Communications Networks(2005) 47-58. IEEE. https://doi.org/10.1109/SECURECOMM.2005.32.

      [17] Cvitić, I., Vujić, M. and Husnjak, S., Classification of security risks in the IoT environment, 26th Daaam International Symposium on Intelligent Manufacturing and Automation (2016) 0731-0740.

      [18] Mitrokotsa, A., Rieback, M.R. and Tanenbaum, A.S., Classifying RFID attacks and defenses, Information Systems Frontiers, vol. 12, no. 5 (2010) 491-505. https://doi.org/10.1007/s10796-009-9210-z.

      [19] Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H. and Qureshi, K.N., Security issues and attacks in wireless sensor network, World Applied Sciences Journal, vol. 30, no. 10 (2014) 1224-1227.

      [20] Eun, H., Lee, H. and Oh, H., Conditional privacy preserving security protocol for NFC applications, Transactions on Consumer Electronics, vol. 59, no. 1 (2013) 153-160. IEEE. https://doi.org/10.1109/TCE.2013.6490254.

      [21] Sharma, P., Saluja, M. and Saluja, K.K., A review of selective forwarding attacks in wireless sensor networks, International Journal of Advanced Smart Sensor Network Systems, vol. 2, no. 3 (2012) 37-42. https://doi.org/10.5121/ijassn.2012.2304.

      [22] Pooja, M. and Singh, D.Y., Security issues and sybil attack in wireless sensor networks, International Journal of P2P Network Trends and Technology, vol. 3, no. 1 (2013) 7-13.

      [23] Ahmed, N., Kanhere, S.S. and Jha, S., The holes problem in wireless sensor networks: a survey, ACM SIGMOBILE Mobile Computing and Communications Review, vol. 9, no. 2 (2005) 4-18. https://doi.org/10.1145/1072989.1072992.

      [24] Karlof, C. and Wagner, D., Secure routing in wireless sensor networks: Attacks and countermeasures, Ad hoc networks, vol. 1, no. 2-3 (2003) 293-315. https://doi.org/10.1016/S1570-8705(03)00008-8.

      [25] Farooq, M.U., Waseem, M., Khairi, A. and Mazhar, S., A critical analysis on the security concerns of internet of things (IoT), International Journal of Computer Applications, vol. 111, no. 7 (2015) 1–6.

      [26] Borgohain, T., Kumar, U. and Sanyal, S., Survey of security and privacy issues of Internet of Things. arXiv preprint arXiv:1501.02211. (2015).

      [27] Shi, E. and Perrig, A., Designing secure sensor networks, IEEE Wireless Communications, vol. 11, no. 6 (2004) 38-43. https://doi.org/10.1109/MWC.2004.1368895.

      [28] Tyagi, S., Darwish, A. and Khan, M.Y., Managing computing infrastructure for IoT data, Advances in Internet of Things, vol. 4, no. 3 (2014) 29–35. https://doi.org/10.4236/ait.2014.43005.

      [29] Suo, H., Wan, J., Zou, C. and Liu, J., Security in the internet of things: a review, International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3 (2012) 648-651. IEEE. https://doi.org/10.1109/ICCSEE.2012.373.

      [30] Leloglu, E., A review of security concerns in Internet of Things, Journal of Computer and Communications, vol. 5, no.1 (2016) 121-136. https://doi.org/10.4236/jcc.2017.51010.

      [31] Autili, M., Inverardi, P., Tivoli, M. and Garlan, D., Synthesis of correct adaptors for protocol enhancement in component-based systems, Specif. Verif. Component-Based Syst. (2004).

      [32] Weber, R.H., Internet of Things–New security and privacy challenges, Computer law & security review, vol. 26, no.1 (2010) 23-30. https://doi.org/10.1016/j.clsr.2009.11.008.

      [33] Roman, R., Alcaraz, C., Lopez, J. and Sklavos, N., Key management systems for sensor networks in the context of the Internet of Things, Computers & Electrical Engineering, vol. 37, no. 2 (2011) 147-159. https://doi.org/10.1016/j.compeleceng.2011.01.009.

      [34] Yousuf, T., Mahmoud, R., Aloul, F. and Zualkernan, I., Internet of Things (IoT) Security: Current status, challenges and countermeasures, International Journal for Information Security Research, vol. 5, no. 4 (2015) 608-616. https://doi.org/10.20533/ijisr.2042.4639.2015.0070.

      [35] Babar, S., Mahalle, P., Stango, A., Prasad, N. and Prasad, R., Proposed security model and threat taxonomy for the Internet of Things (IoT), International Conference on Network Security and Applications (2010) 420-429. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_42.

      [36] Pescatore, J. and Shpantzer, G., Securing the internet of things survey, SANS Institute (2014) 1-22.

      [37] Botta, A., De Donato, W., Persico, V. and Pescapé, A., Integration of cloud computing and internet of things: a survey, Future Generation Computer Systems, vol. 56 (2016) 684-700. https://doi.org/10.1016/j.future.2015.09.021.

      [38] Lindell, Y. and Pinkas, B., Secure multiparty computation for privacy-preserving data mining, Journal of Privacy and Confidentiality, vol. 1, no. 1 (2009) 59-98. https://doi.org/10.29012/jpc.v1i1.566.

  • Downloads

  • How to Cite

    Sehrawat, D., & Gill, N. S. (2018). Deployment of IoT based smart environment : key issues and challenges. International Journal of Engineering & Technology, 7(2), 544-550. https://doi.org/10.14419/ijet.v7i2.9504