Security Issues and Challenges in Iot: Dr. Kahkashan Tabassum DR Ahmed Ibrahim DR Sahar A. El - Rahman
Security Issues and Challenges in Iot: Dr. Kahkashan Tabassum DR Ahmed Ibrahim DR Sahar A. El - Rahman
Security Issues and Challenges in Iot: Dr. Kahkashan Tabassum DR Ahmed Ibrahim DR Sahar A. El - Rahman
Abstract—The Internet of Things (IoT) supports a wide range of considered to have a fantastic prospective that can fill the gap
applications including smart cities, traffic congestion, waste or barriers which existed within various technologies until
management, structural health, security, emergency services, recently.
logistics, retails, industrial control, and health care. IoT is mega-
technology that can establish connection with anything, anyone, II. BACKGROUND AND RELATED WORK
at any time, place, service on a platform and any network. It has
a great impact on the whole block chain of businesses, smart This section discusses the security issues and challenges
objects and devices, systems and services that are enabled by in IoT in various fields and the survey is organized as
heterogeneous network connectivity and is developed as a smart follows: First part of this section discusses general IoT
pervasive framework of smart devices. IoT devices are in use in security[1], which is followed by a survey[2] based on deeper
many fields, they connect to complex devices, interface with insight on the IoT data transfer in the form of Big data. The
hostile environments and are deployed on various uncontrolled next part is organized from [3][4][5] and deals with the
platforms, therefore faces many security issues and challenges. description about the challenges that are faced by IoT and Big
Since the IoT offers a potential platform for integrating any type
Data security, the final section presents the secure applications
of network and complex system it could encounter vulnerabilities
inherent to the individual systems which are available within the
of IoT business analytics and Health informatics. The survey
integrated network. This research paper is a study of the security in paper [6] expresses the IoT business collaboration, safety,
issues of the individual systems responsible for IoT and confidentiality, the researchers in [7] discuss about IoT
interconnection and their impact towards the integrated IoT business collaboration with financial perspective and
system. highlights its benefits. In [8] the researchers have illustrated a
real-life example about a specific industry and how the IoT
Keywords— Big Data Analytics, Network security, Device security, steps can be applied to a real-life scenario to secure it. In the
Internet of Things. modern age, it is of the utmost importance for any business to
incorporate some features for optimal operation. One of which
I. INTRODUCTION
is security, this links back to the huge size of data that is being
IoT devices are currently used in almost every area may it exchanged between devices. The current technology is striving
be industrial, educational, medical or business. IoT connects to advance towards development of deep learning analysis of
complex devices together, it can interface with a the security architecture and features of IoT. The research
heterogeneous set of environments deployed on various status of key technologies including encryption mechanism,
platforms. Since the IoT provide integration of many types of security layers, cryptographic algorithms are reviewed and
networks and complex systems, it is exposed to security discussed amongst these survey papers . All that was
challenges and issues that are already a part of the individual discussed in [1] has an effect on business in the modern age.
systems involved in its framework or available within its [2] explores the potential impact of large data challenges,
integrated network. This paper targets the real challenges for research efforts directed towards the analysis of IoT data, and
the clients from both the hardware (embedded server) and various tools associated with its analysis. It discusses some
software perspectives. Most of the connected devices that problems and challenges presented by big data, one of which
seem to be functional are at a risk due to reasons that they being the acquisition of knowledge from IoT data. The authors
may be hacked by hackers and the whole business may suffer discussed the relationship between Business Data
drawbacks. These issues explain how critical are the privacy Analytics(BDA) and IoT, examined various research topics,
and security to a system. The solution to these issues could be various opportunities generated by data analysis in the IoT
providing the customer with personalized devices that offer paradigm, challenges and tools used for BDA, and they
the system a high level of security through setting discussed the information security dimension of BDA. In the
personalized IDs, using MAC address security. public/private article, numerous types of analysis techniques were used. The
keys, digital signatures and certificates within the system. authors suggested the use of platforms to explore big data in
Unfortunately, there is no added cost for the system that numerous stages because Big Data platform has its own
chooses to offer security but instead the cost exists only for the individual approach. All types of devices communicate
system. IoT is the only technology in todays’ world which is together in numerous ways. They have to transfer enormous
3. Andreas P. Plageras , Kostas E. Psannis, “Algorithms for Big Data 19. Kevin Ashton, “Internet of Things”, RFiD Journal, 2009.
Delivery over the Internet of Things”, IEEE 19th Conference on
Business Informatics (CBI), IEEE Xplore Digital Library, 2017. 20. Huansheng Ning ; Ziou Wang, “Future Internet of Things Architecture:
Like Mankind Neural System or Social Organization Framework?”,
4. Sachchidanand Singh , Nirmala Singh, “Internet of Things (IoT): IEEE Communications Letters, Vol. 15 , No. 4 , 2011, pp. 461–463.
Security challenges, business opportunities & reference architecture for
E-commerce”, International Conference on Green Computing and 21. Hugh Boyes, Bil Hallaq, Joe Cunningham, Tim Watson, “The industrial
Internet of Things (ICGCIoT), IEEE Xplore Digital Library, 2015. internet of things (IIoT): An analysis framework”, Computers in
Industry Jornal, Vol. 101, 2018, pp. 1–12.
5. Layth Sliman , Hachemi Nabil Dellys, “Security, Safety and 22. Arbia Riahi Sfar, Enrico Natalizio, Yacine Challal, Zied Chtourou, “A
Confidentiality in IoT for Collaborative Business Technologies (SSCIoT roadmap for security challenges in the Internet of Things “, Digital
Track of WETICE 2018)”, IEEE 27th International Conference on Communications and Networks, Vol. 4, 2018, pp. 118–137.
Enabling Technologies: Infrastructure for Collaborative Enterprises
(WETICE), IEEE Xplore Digital Library, 2018. 23. Luigi Atzori, Antonio Iera, Giacomo Morabitoc, “The Internet of
Things: A survey”, Computer Networks Journal, Vol. 54, No. 15, 2010,
6. Hwaiyu Geng, “IoT Business Models”, Internet of Things and Data pp. 2787-2805.
Analytics Handbook, IEEE Xplore Digital Library, 2017.
24. Ira S. Rubinstein, “Big Data: The End of Privacy or a New Beginning?”
7. Zahraa Marafie , Kwei-Jay Lin , Yanlong Zhai , Jing Li, “ProActive International Data Privacy Law, Vol. 3, No. 2, 2013, pp. 74–87.
Fintech: Using Intelligent IoT to Deliver Positive InsurTech Feedback”,
25. Christos Stergioua, Kostas E. Psannisa, Brij B. Guptab, Yutaka
IEEE 20th Conference on Business Informatics (CBI), IEEE Xplore
Ishibashic, “Security, privacy & efficiency of sustainable Cloud
Digital Library, 2018.
Computing for Big Data and IoT”, Sustainable Computing: Informatics
and Systems, Vol. 19, 2018, pp. 174–184.
8. Cristian TOMA, Marius POPA, “IoT Security Approaches in Oil & Gas
Solution Industry 4.0”, Informatica Economica Academic Journal, vol. 26. Xavier Caron, Rachelle Bosua, Sean B. Maynard, Atif Ahmad, “The
22, no. 3/2018. Internet of Things (IoT) and its impact on individual privacy: An
Australian perspective”, Computer Law & Security Review Journal,
Vol. 32, 2016, pp. 4–15.
9. Aakanksha Tewari, B.B. Gupta, “Security, privacy and trust of different
layers in Internet of Things (IoTs) framework”, Future Generation 27. Dr. Kahkashan Tabassum, Dr. A. Damodaram and S.V.S. Rama
Computer Systems, May 2018. Available [Online] Krishnam Raju, “An Energy-Efficient New Hierarchical Stable Election
https://doi.org/10.1016/j.future.2018.04.027 Protocol for Wireless Sensor Networks”, Proceedings of 2nd
International Conference on Recent Advances in Design, Development
10. Jianwei Hou, Leilei Qu, Wenchang Shi, “A survey on internet of things and Control of Micro-Air-Vehicles IC-RA-MAV-2013.
security from data perspectives”, Computer Networks Journal, in press,
Dec 2018. https://doi.org/10.1016/j.comnet.2018.11.026
11. Miao Wu, Ting-Jie Lu, Fei-Yang Ling, Jing Sun, Hui-Ying Du,
“Research on the architecture of Internet of Things”, in: Proceeding of
2010 3rd International Conference on Advanced Computer Theory and
Engineering(ICACTE), 2010, pp. 484-487.
12. Zhihong Yang, Yingzhao Yue, Yu Yang, Yufeng Peng, Xiaobo Wang,
Wenji Liu, “Study and application on the architecture and key
technologies for IoT”, in Proceeding of 2011 International Conference
on Multimedia Technology ( ICMT), 2011, pp. 747-751.