A_Review_on_Security_Challenges_in_Internet_of.pptx

abeeralmarboa134 7 views 12 slides Sep 26, 2024
Slide 1
Slide 1 of 12
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12

About This Presentation

internet of things


Slide Content

A Review on Security Challenges in Internet of Things ( IoT ) By: Abeer Ali

Abstract Internet of Things ( IoT ) is the emerging new technology and is generating big data at the moment . IoT is a major vision that dictates that everything should be connected via the Internet , and this will be the basis for future development as it brings new opportunities for services . IoT is used in many applications such as healthcare , home control , smart cars , and industrial automation . While IoT features provide convenience , they also introduce security challenges such as securing devices, protecting information , and preventing unauthorized access . The paper discusses the security challenges faced by IoT , the solutions th e have been provided so far , and the open challenges .

I. INTRODUCTION 1. The idea of ​​the Internet of Things ( IoT ) appeared in the 1980s and has developed significantly over the past decades with the increase in the number of devices and application fields . 2. With this development, security challenges have emerged related to ensuring IoT security and managing risks related to security, trust, privacy, and identity management. 3. IoT technology is applied in multiple fields such as healthcare, industrial automation, and energy, and the number of connected devices is expected to reach 75 billion by 2025. 4. With the advantages provided by IoT , this technology faces challenges related to design, interoperability, controls, legal issues, and commercial and security challenges. 5. The IoT witnessed major security attacks that exploited security vulnerabilities in devices, due to the absence of security updates and patches and the failure to implement comprehensive security measures. 6. Although companies try to improve the quality of products, the priority is often “quick to market” at the expense of adequate security of devices and networks

II. BACKGROUND IMany computational approaches have been employed in business [13, 14] and healthcare [15, 16]. Adel Alkhalil et al. [17] used reference statement techniques to mitigate security issues in IoT frameworks. The development stage of IoT is still at the beginning of the improvement period, as many problems and difficulties have not been fully addressed yet. Using an information reference statement is an essential tool that can enhance the security and protection of IoT frameworks. However, information datum procedures are difficult to use in IoT frameworks, and seven issues are examined, including multi-consumer, big data, datum security, indexing, transformation, interoperability, and querying. Burhanuddin et al. [5] also discussed these challenges related to information datum in IoT frameworks. The four basic security requirements for wireless sensor networks (WSNs) are reviewed and each is clarified to give a foundation for the opportunities of WSNs in IoT applications. Krishna et al [10] have depicted a vision of IoT that brings extraordinary risks and assaults towards protection or safety. Laxman et al. [18] restricted the hardware and software assets and physical capabilities of these devices making them vulnerable to attacks

II. BACKGROUND The text discusses the need for higher and appropriate encryption algorithms that are consistent with hardware, software, and network constraints to ensure a comfortable conversation between most devices and their clients. Intrusion detection techniques can be implemented to make IoT infrastructure secure and robust. Modeling the progress of recent IoT security queries roughly, explaining the background, and how IoT takes into account modern research. Tkaczyk et al. [19] categorized software design patterns that occur in the context of interoperability within IoT ecosystems. An analysis of potential security challenges and their solutions is presented in Table 1

ANALYSIS OF POSSIBLE SECURITY CHALLENGES AND THEIR SOLUTIONS Solutions Security challenges Authors • Encryption and digital signatures • Distributed provenance system compared to Centralised provenance system • Secure the data provenance using different auditors access privileges on the data provenance • Security of provenance data • Provenance indexing • Transformation issues • Provenance query tools • Interoperability Alkhalil et al. [17] • Data Encryption. • Sending and receiving nodes share secret keys to verify the resource identity. • Data integrity is essential to ensure that any transmitted data within the WSNs have not been transformed or destroyed in transit • Availability of WSN can be achieved through the modicum presence of benign node failures or compromised nodes. • Confidentiality and Authentication • Service Integrity • Denial of Service ( DoS ) attacks. • Availability Burhanuddin et al. [5]

Solutions Security challenges Authors • Key distribution policies. • Data backup and recovery mechanism • Data privacy techniques are SSL, TLS and DNS • Encryption algorithms. • Physical layer security • Network layer security • Middleware layer security for processing information • Application layer security Krishna et al. [10] • Encryption and decryption • Temper resistant design • Replay, fabrication, interruption, denial of service attacks. Hardware Issues: • Computational and energy • Memory Software Issues: • Embedded software • Dynamic security Network Issues: Mobility, Scalability, Multiplicity, Multi-Protocol and Dynamic network. Sayana et al. [18] ANALYSIS OF POSSIBLE SECURITY CHALLENGES AND THEIR SOLUTIONS

Solutions Security challenges Authors • Homomorphic encryption. • Dynamic configuration • Context-based permission • Anonymous protocols • Fragmented. • Privilege Management and Access Control • Protocols and Lightweight defenses. • Intrusion detection and prevention. • Remote verification. • Privacy protection. Zhou et al. [8] ANALYSIS OF POSSIBLE SECURITY CHALLENGES AND THEIR SOLUTIONS

III. THE IMPORTANCE OF SECURITY FOR IOT   The paragraph highlights the importance of security in Internet of Things ( IoT ) devices that are widely used in various sectors . Key points include Device proliferatio : IoT devices are connected to the Internet , from household items to industrial systems . Security vulnerabilities: Many devices lack strong security measures , making them vulnerable to attacks . Technical challenges : The diversity of devices increases the difficulty of securing them . Attack Ris : Compromised devices can be exploited in attacks such as DDoS . Power limitations : Many devices operate on limited power , which limits their security capabilities . The need for enhanced security : It is necessary to develop strong security protocols to protect devices and networks .

III. THE IMPORTANCE OF SECURITY FOR IOT Channel attacks : and the presence of components in public places , which increases the need for security Interesting targets for IoT devices, as demonstrated by significant attacks Lack of securit and ease of hacking , making devices ideal targets Expectations that IoT will represent 25% of attacks on enterprises by 2020, despite low security budgets Privacy concerns that affect trust in systems . In general , security should be a major focus in the development of IoT systems

IV. EFFECT OF IOT FEATURES ON SECURITY AND PRIVACY

V. CONCLUSION In this paper, we analyzed and discussed security challenges and various features of the IoT. Furthermore, we also discussed the multiple solutions provided by the different authors. Young researchers should develop new protocols to address security issues in IoT. IoT systems ordinarily work in highly dynamic conditions and should have the ability to evolve and adapt. By analyzing the current state-of-the-art security patterns and architectures for IoT, we concluded that there are deficiencies in the number of existing security patterns, testing of security patterns architectures, examples of usage areas, and documentation in some cases. The security flaws identified in the paper will help the researchers to pay attention to a specific area that may more vulnerable to attacks.