A Security Framework For IOT Devices Against Wireless Threats
A Security Framework For IOT Devices Against Wireless Threats
A Security Framework For IOT Devices Against Wireless Threats
Abstract—Everyday number of smart devices or IOT devices which is connected to the smart-hub. If successfully access is
either it be a smart phone, tablet, smart home device or any gained by the attacker of our wireless network this will allow
wearable technology are being connected to the internet. These the cyber criminals to spot the smart-hubs which they can
IOT devices have become an essential part of our everyday life. hack easily giving them access to our house security devices
We use them in many forms without being aware that we have
resulting in compromising our security or may be these
started depending on them like for security purpose we use
security systems in our house, or the smarts locks on our doors to moonlighters could walk up to our front door as a trespasser.
keep our self-safe from the moon lighters. But do we really
II.CIA TRIAD
consider our security that seriously. Today IOT device security
has become one of the major concern of the IT Industry. In this CIA triad known as confidentiality, integrity and availability.
paper, we are using the block chain technique to develop a These are basically the guidelines which are set for the
framework for security and management of data on the internet. information security in an organization.
We have developed a framework which shows how smart devices
communicate with each other with block chain posing as the
backbone. The framework serves as a scalable and robust
solution, in order to address identity and security concerns of
IOT. The proposed framework is further compared to existing
models.
For easier access, most of the smart devices in our house are • Availability: Availability means that the data is accessible to
connected to the smart-hub. But unfortunately, most of these authorized users only. It is best practiced by strictly
smart-hubs contain serious vulnerabilities which can allow the maintaining the hardware, performing timely hardware repairs
attacker to come to our front door and can unlock the lock and maintaining a properly working operating-system
2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)
circumstances which is free from software frays. It is also blockchain that limits to the access of data to read and
important to keep the system timely upgraded. write only. Example Bitcoin where anyone can write
the data.
III.CHALLENGES FOR IOT • Private blockchain: in private block chain, all the
nodes that are participating in the system chain are
We can consider internet of things as system of systems since trusted and known.
various technologies and physical factors make the ecosystem
of internet of things. As the IOT system is the integrated result
of different applications, sensor, chips, devices, analytical V. CENTRALIZED AND DECENTALIZED
capabilities and protocols, this complex architecture ARCHITECTURE
introduces to many challenges for IOT such as securing of
IOT and making sure that none of the IOT bridge can be used The Centralized Architecture
as a breach point and compromise the security of the user.
Some of the IOT challenges are: Currently IOT systems use the centralized communication
model that is also called as client-server communication. The
• Scalability- Since there are several types of devices working IOT devices are connected to servers on cloud which have
together on the IOT platform it is very difficult to provide huge storage capacity and support large amount of processing
same security level among the entire network. power. These centralized systems used by IOT devices use
SSL or TSL or public key cryptography to communicate
• Manageability- It is a daunting task to govern the access of between the devices and identify the participants in the
all the devices, which leads to may authority issues. network.
• Reliability – As IOT consist of diverse network it is difficult Because of the enormous growth of the IOT devices there are
to authorize reliability of all the sources of data such as in case many challenges that have occurred for the centralized system
of data attacks like man in middle attack. such as:
• Entire system could be affected because of single
• Capability – Availability limited size of memory and limited server failure.
amount of computing resources makes it tough to implement
• Enormous number of devices depending upon a
any security algorithm.
single network require higher processing capabilities.
• Privacy - Protecting the data of participants from the • Setup cost is high
exposure and falling of data in the hands of unwanted parties. • Cannot cater to the localized specifications.
• Running lower application results in underutilization
IV. TECHNIQUE USED IN FRAMEWORK of the resources.
Development of a solution for IOT requires connectivity, As there are many diverse types of smart devices running in
collaboration and coordination for every device in the system the environment with several types of cloud-infrastructure
and for the complete system must work as one single system. supporting these devices make machine to machine
All the devices must communicate and integrate with each communication difficult. Since the number of IOT devices is
other in a secure way. As the analysis of information for increasing day by day it increases the load on the centralized
internet of things is very important. It is very important to network and it also makes centralized network more
protect the data through its entire-lifecycle. Block chain uses vulnerable as single point failure will result in the downtime
the decentralized method to secure the data rather than having and security threat of the entire network.
a dedicated system.
It is a database which maintains the continuous records of data
Decentralized Architecture
set which are always growing. Blockchain does not have any
master system which holds the entire-chain, it is like a The decentralized network does not depend on the central
distributed ledger. Every time a new data record is added as it architecture and it follows the peer to peer communication
is always growing and each node that is participating in the model which reduces the risk of single server failure which
chain has a copy of the chain. The decentralized approach of
can bring the entire system to shut down for a period of time
block chain eliminates the single point failure and creating
more flexible environment for the devices to run. Block chain and also reduces the cost of the network setup and
uses cryptographic algorithms which make the data more maintenance as well as it distributes the storage and
secure. computational needs of the network. It also solves many
problems of the centralized network.
There are two types of block chain.
• Public blockchain: In this blockchain anyone can read Decentralized architecture approach support three fundamental
and write the data. But there are some public functions:
• Peer to peer communication
2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)
• Distributed data sharing less and ii) permissioned. Since the public ledger is prone to
• Autonomous device coordination anonymous attacks it is advisable to use permissioned to ensure
security, scalability and performance for real time objects.
Block chain technology which uses decentralized architecture 4.Interface Layer: This layer contains number of devices that
can track billions of IOT devices. The decentralized approach communicate with each other and transfer data. For example:
eliminates the risk of single point failure and creates more Controlling your refrigerator from your mobile phone or
secure environment for the IOT devices. accessing your homes security camera through your mobile
phone. The major thing to keep in mind that the applications or
VI. THE FRAMEWORK the devices must be integrated carefully so that it does not give
access to the intruders.
We propose to extend the use of Block chain in IOT Securing IOT using Blockchain
infrastructure using layer approach. We are taking an example
of smart house for explaining our security frame work Fig-2 Handling a huge volume of the data which is increasing day
show the proposed framework. by day is very difficult and keeping track of every device is a
daunting task. Turning the large amount of data into valuable
information is also a challenging task. The existing
technologies used for security purpose are important for risk
mitigation of IOT but are not enough. Many companies have
tailored their securities according to each IOT device and its
unique capabilities but this has also introduced the risks that
are involved with the devices.
Such as:
good morning == 896c751c8c45b39f6cb0eh9eghd4567
Good morning == 0567fgtd457hv563423d5b6m90xc89
Now the participant in the block-chain network who are
known as miners validate the information and add the
Fig.4: Dataflow in the Network information to their memory pool. The block is hashed by
using SHA256.
Step 1: When a device requests for the transaction of The newly produced hash is then organized in the tree
information over the internet the information block is created, structure, which consist of block header known as block hash.
which is then broadcasted to the cluster of blockchains over A single block consists of hundreds and thousands of
the internet.
2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)
transactions. After which theses block are ready to join the [3] Qi Jing, Athanasios V. Vasilakos, Jiafu Wan, JingweiLu, Dechao Qiu,
“Security of the Internet of Things: perspectives and challenges”, Journal
entire block-chain.
Wireless Networks archive Volume 20 Issue Pages 2481-2501 Springer-
Verlag New York, Inc. Secaucus, NJ, USA,8 November 2014
Step 4: when the data is validated by the participating parties
in the network the information block is added to the [4] Cristina Alcaraz, Pablo Najera, Javier Lopez, Rodrigo Roman, “Wireless
Sensor Networks and the Internet of Things: Do We Need a Complete
blockchain and is sent to all the node of the network from
Integration?”, 1st International Workshop on the Security of the Internet of
where the requester can retrieve the data. Things (SecIoT10), pp. xxxx, 2010
VII. COMPARISION BETWEEN PROPOSED AND [5] Hero Modares1, Amirhossein Moravejosharieh, Rosli Salleh, Jaime Lloret,
“Security Overview of Wireless Sensor Network”, Life Science Journal 2013;
EXISTING MODEL 10(2):1627-1632. (ISSN:1097-8135),2013
Comparison Proposed Model Existing Model [6] Konstantinos Christids, and Michael Devetsikiotis,“ Blockchains and Smart
Points Contracts for the Internet of Things”, Special Section on the Plethora of
Research in Internet of Things (IoT), 2016
Database Distributed Centralized
Used
[7] Dorottya Papp, Zhendong Ma, Levente Buttyan, “Embedded Systems
Hosts Blockchain Cloud or private Security: Threats,Vulnerabilities, and Attack Taxonomy”, Privacy, Security
vendors and Trust (PST),13th Annual Conference,2015
Thus, the framework gives the clear picture how decentralized [15] VV Singh, Kunwar Kuldeep; Gupta Himanshu, "A New Approach for
architecture network such as block chain technology can be the Security of VPN”, Proceeding of ACM Second International Conference
more beneficial and cost effective. on Information and Communication Technology for Competitive Strategies
(ICTCS-2016), ACM and CSI Udaipur Chapter, Udaipur, India on March 4 -
5, 2016.
REFRENCES
[16] Jebadurai, N Immanuel; Gupta, Himanshu, “Automated Verification in
[1] Md Husamuddin and Mohammed Qayyum, “Internet of Things: A study
Cryptography System”, Proceeding of ACMSecond International Conference
on security and privacy threats”, Anti-Cyber Crimes (ICACC) 2nd
on Information and Communication Technology for Competitive Strategies
International Conference on 2017
(ICTCS-2016) organized by ACM and CSI Udaipur Chapter at Hotel Inder
Residency, Udaipur, India on March 4 - 5, 2016.
[2] Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusicng, and
Marimuthu Palaniswami “Security in Wireless Sensor Networks: Issues and
[17] Singh, Gurjeet; Gupta, Himanshu,“ID Based Encryption in Modern
ChallengesInternet of Things (IoT): A vision, architectural elements, and
Cryptography”, Proceeding of ACM Second International Conference on
future directions”, Future Generation Computer Systems Pages 1645–1660,
Information and Communication Technology for Competitive Strategies
Volume 29, Issue 7, September 2013,
2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)
(ICTCS-2016), ACM and CSI Udaipur Chapter, Udaipur, India on March 4 - [20] Gupta, Himanshu; Sharma, Vinod Kumar; "Multiphase Encryption: A
5, 2016. New Concept in Modern Cryptography", International Journal of Computer
Theory and Engineering, pp: 638-641 , Aug 2013
[18] Kumar, Sunil; Gupta, Himanshu, “Agent based Security Model for Cloud
Big Data”, Proceeding of ACM Second International Conference on
Information and Communication Technology for Competitive Strategies
(ICTCS-2016), ACM and CSI Udaipur Chapter, Udaipur, India on March 4 -
5, 2016.