An Overview of The Internet of Things (Iot) and Iot Security
An Overview of The Internet of Things (Iot) and Iot Security
An Overview of The Internet of Things (Iot) and Iot Security
net/publication/342052404
CITATIONS READS
0 123
1 author:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Performance Investigation of three Precoding Methods for Massive MIMO technique in Wireless Communication System View project
All content following this page was uploaded by Md. Humayun Kabir on 09 June 2020.
Introduction:
The internet of things (IoT) is a computing concept that describes the idea of everyday physical objects being
connected to the internet and being able to identify themselves to other devices. The term is closely identified
with RFID as the method of communication, although it also may include other sensor technologies, wireless
technologies or QR codes.
The IoT is significant because an object that can represent itself digitally becomes something greater than the
object by itself. No longer does the object relate just to its user, but it is now connected to surrounding objects
and database data. When many objects act in unison, they are known as having "ambient intelligence."
Page 1 of 7
Internet of Things Security (IoT Security) comprises protecting the internet-enabled devices that connect on
wireless networks. IoT security is the safety component tied to the Internet of Things, and it strives to protect
IoT devices and networks against cybercrime.
The data collected from IoT sensors contain a large amount of private information and needs to be preserved.
There are two key issues privacy and security that need attention when it comes to IoT security.
Figure 1: The security architecture comprises of four fundamental layers for security analysis.
1. Perceptual Layer
This layer is also referred to as the recognition layer, is the most basic level, which gathers all types of
information with the help of physical equipment(sensors) and identifies and reads the external world. The
information from the device's sensors includes the properties of the objects, or the things, the environment
condition, and more. The physical equipment like RFID reader, GPS, all kinds of sensors, and other
equipment comes under this layer. Though there are different components involved, the critical component
in this layer is the sensors that use for capturing and representing the physical world, i.e., the data given by
sensors connect to this layer.
Page 2 of 7
2. Network Layer
The layer connected to broadcast data and data collected on numerous essential networks like mobile
communication network, or the WiFi network, satellite network, and more. This layer is responsible for
providing the dependable broadcast of data that we get from the previous layer. Most importantly, the data
gathered from sensors broadcasts to the next level for it to be processed. The initial handling of data collected
through the sensors, cataloguing, and polymerization.
3. Support Layer
The layers act as the mediator between the upper layer and the lower layer. Consider it as the platform for
setting up a proper application layer as it helps with merging the application layer upward and network
layer downward. Grid and cloud computing use all kinds of creative computing powers.
4. Application Layers
In this layer, the personalized delivery of application happens, whatever application the user wants,
whatever application the user is presented with is taken care of in this layer. It can be from smart water,
smart transportation, smart environment support, smart air system, and more. It can be done through
computers, mobile devices, television and more.
Challenges in IoT Security:
Page 3 of 7
3. Device updates need to be managed effectively as well. Security patches to firmware or software
would have several challenges, so they need to be updated effectively. Air updates may not be
possible with all kinds of IoT devices. Device owners as well may not show much interest in applying
an update to the system.
4. The communication channel needs to be secured, as well. Using transport encryption and adopting
standards like TLS is better than encrypting messages before transfer.
5. The sensor data should be stored and proceed securely. Data integrity, including checksums or
signatures, can help to make sure that the original raw data does not modify during transmission.
Data that is not required should be disposed of or detected in a better way and should not be retained
in any part of the system. Maintaining complaints about legal and regulatory frameworks is another
challenge in this project.
6. All applications and services should also be secured as the manager, process access IoT devices along
with the sensor data.
Security vulnerabilities and breaches are inevitable, but measures need to be taken as much as possible to
avoid conflicts of interest.
Best IoT Security Technologies:
Mentioned below are the most popular IoT security technologies based on Forrester's analysis
1. IoT Network Security
IoT network security is challenging than traditional network security as communication protocols, standards,
and device capabilities have a more extensive range, all of which pose significant issues and increased
complexity. It involves securing the network connection that connects the IoT devices with the back-end
systems on the internet. Capabilities include traditional endpoint security features like antivirus and
antimalware as well as firewalls and intrusion prevention and detection systems. Sample vendors are Cisco,
Darktrace, and Senior.
2. IoT authentication
It grants users to authenticate IoT devices, including managing multiple users for a single device, ranging
from multiple static passwords to more robust authentication mechanisms like two-factor authentication,
digital certificates, and biometrics. Unlike most enterprise networks where authentication processes involve
a human being entering a credential, many IoT authentication scenarios ar M2M based and do not involve
any human intervention. Sample vendors: Baimos Technologies, Covisint, Entrust Datacard, and Gemalto.
3. IoT Encryption
Encrypting data at rest and transit between IoT edge devices and back-end systems using standard
cryptographic algorithms, maintaining data integrity, and preventing data sniffing by hackers. Several IoT
devices and hardware profiles limit the ability to have standard encryption processes and protocols. Further,
all IoT encryption must be accompanied by equivalent full encryption key lifecycle management processes,
since poor key management would reduce overall security. Sample vendors: Cisco, HPE.
4. IoT Security Analytics
This technology involves collecting, aggregating, monitoring, and normalizing data from IoT devices and
providing actionable reporting and alerting on suspicious activity or when activity falls outside established
policies.
These solutions add sophisticated machine learning, artificial intelligence, and big data techniques providing
more predictive modeling and anomaly detection, but such capabilities are still emerging. IoT security
analytics would increasingly be required to detect IoT-specific attacks and intrusions that are not identified
by traditional network security solutions such as firewalls. Sample vendors: Cisco, Indegy, Kaspersky Lab,
SAP, and Senrio.
Page 4 of 7
5. IoT API Security
This technology enables us to authenticate and authorize data movement between IoT devices, back-end
systems, and applications using documented REST-based APIs. API security protects the integrity of data
transiting between edge devices and back-end systems, and applications using documented rested APIs as
well as detecting potential threats and attacks against APIs. Sample vendors: Akana, Apigee/Google, Axway,
CA Technologies, Mashery/TIBCO, MuleSoft, and more.
Page 5 of 7
The short version is that TKIP is an older encryption standard used by the WPA standard. AES is a newer
Wi-Fi encryption solution used by the new-and-secure WPA2 standard. In theory, that’s the end of it. But,
depending on your router, just choosing WPA2 may not be good enough.
While WPA2 is supposed to use AES for optimal security, it can also use TKIP where backward compatibility
with legacy devices is needed. In such a state, devices that support WPA2 will connect with WPA2 and
devices that support WPA will connect with WPA. So “WPA2” doesn’t always mean WPA2-AES. However,
on devices without a visible “TKIP” or “AES” option, WPA2 is generally synonymous with WPA2-AES.
And in case you’re wondering, the “PSK” in those names stands for “pre-shared key” — the pre-shared key
is generally your encryption passphrase. This distinguishes it from WPA-Enterprise, which uses a RADIUS
server to hand out unique keys on larger corporate or government Wi-Fi networks.
Page 6 of 7
➢ WPA2-PSK (TKIP): This uses the modern WPA2 standard with older TKIP encryption. This
isn’t secure, and is only a good idea if you have older devices that can’t connect to a WPA2-
PSK (AES) network.
➢ WPA2-PSK (AES): This is the most secure option. It uses WPA2, the latest Wi-Fi encryption
standard, and the latest AES encryption protocol. You should be using this option. On some
devices, you’ll just see the option “WPA2” or “WPA2-PSK.” If you do, it will probably just
use AES, as that’s a common-sense choice.
Conclusion:
No doubt, IoT would change the development services process. Although moving with the latest technology
is encouraged, but it's also advisable to study and analyze the negative aspect and be prepared for the
outcome. Digital businesses need to understand that though the IoT-connected products provide effortless
support, the same devices have become an attractive attack plane for hackers and cybercriminals seeking to
cause disruption and exfiltrate sensitive data.
Acknowledgement
In this report, I was just collecting the IoT and IoT Security-related information and data following the
website [1-7]. After collect, the information, and data here I summarize that information and data.
Reference:
[1]. What is the Internet of Things (IoT)? - Definition from Techopedia. (2020). Retrieved 1 March 2020,
from https://www.techopedia.com/definition/28247/internet-of-things-iot
[2]. Internet of things (IoT): definition. (2020). Retrieved 2 March 2020, from
https://www.strate.education/gallery/news/iot-definition
[3]. Finn, S. (2020). The Criticality of the Network in Securing IoT and Critical Infrastructure - Cisco Blogs.
Retrieved 5 March 2020, from https://blogs.cisco.com/security/the-criticality-of-the-network-in-
securing-iot-and-critical-infrastructure
[4]. What is IoT Security (Internet of Things)? - Tools & Technologies. (2020). Retrieved 6 March 2020,
from https://hackr.io/blog/what-is-iot-security-technologies
[5]. Szigeti, T. (2020). Unpacking IoT, a series: The security challenge and what you can do about it - Cisco
Blogs. Retrieved 10 March 2020, from https://blogs.cisco.com/internet-of-things/unpacking-iot-a-
series-the-security-challenge-and-what-you-can-do-about-it
[6]. WPA vs WPA2: Which WiFi Security Should You Use? - Panda Security Mediacenter. (2020).
Retrieved 16 April 2020, from https://www.pandasecurity.com/mediacenter/security/wpa-vs-
wpa2/#:~:text=WPA2%20is%20an%20updated%20version,or%20not%20work%20at%20all.
[7]. Wi-Fi Security: Should You Use WPA2-AES, WPA2-TKIP, or Both?. (2020). Retrieved 20 May 2020,
from https://www.howtogeek.com/204697/wi-fi-security-should-you-use-wpa2-aes-wpa2-tkip-or-
both/
Page 7 of 7