Professional Documents
Culture Documents
Thesis Iot Eng 2
Thesis Iot Eng 2
A MINIATURE THESIS
Submitted by
DHARUN KUMAR. M
DEPARTMENT OF ENGLISH
MARCH 2022
DECLARATION
has not been submitted elsewhere for the award of any other degree,
Date:
Dharun Kumar.
Research
Scholar
41
CERTIFICATE
under the guidance and supervision of Mrs. Latha Sharma during the
Research Supervisor
Dharun Kumar. M
Research Scholar
41
ACKNOWLEDGEMENT
41
ABSTRACT
Internet of Things (IoT) is a concept that encompasses various
objects and methods of communication to exchange information.
Nowadays Internet of Things (IoT) gained a great attention from
researchers, since IoT promises a smart human being life, by allowing
a communications between objects, machines and every things
together with peoples. IoT represents a system, which consists things
in the real world, and sensors attached to or combined to these things,
connected to the Internet via wired and wireless network structure.
The IoT sensors can use various types of connections such as RFID,
Wi-Fi, Bluetooth, in addition to allowing wide area connectivity using
many technologies such as 4G, LTE, etc.
41
Table of Contents
1. Introduction.......................................................................................................................9
1.1. IoT Definitions..............................................................................................................9
1.2. Connectivity Models...................................................................................................10
1.3. Transformational Potential........................................................................................10
1.3.1. Security.................................................................................................................11
1.3.2. Privacy..................................................................................................................11
1.3.3. Legal, Regulatory and Rights.............................................................................12
1.3.4. Emerging Economy and Development Issues...................................................13
2. Internet of Things Scope and Architecture.....................................................................14
2.1. Scope of Internet of Things........................................................................................14
2.2. The Architecture of Internet of Things.................................................................16
3. Internet of Things Application......................................................................................18
3.1. Smart Cities..................................................................................................................18
3.2. Smart Home and Buildings....................................................................................19
3.3. Smart Energy and the Smart Grid............................................................................21
3.4. Smart Health................................................................................................................23
3.5. Smart Transportation and Mobility..........................................................................24
3.6. Smart Factory and Smart Manufacturing................................................................26
4. Security Threats and Its Solutions................................................................................28
4.1. Existing Security Threats in IoT Systems.................................................................28
4.1.1. Threats of Perception Layer...............................................................................30
4.1.2 Threats of Network Layer....................................................................................32
4.1.3 Threats of Support Layer......................................................................................34
4.1.4 Threats of Application Layer................................................................................35
4.2 Solutions with Respect to Security in IoT..................................................................36
4.2.1. Security of Perception Layer...........................................................................36
4.2.2. Security of Network Layer..............................................................................38
4.2.3. Security of Support and Application Layers......................................................39
5. Conclusion......................................................................................................................41
41
Synopsis
The Internet of Things (IoT) represents a technologically
optimistic future where objects will be connected to the internet and
make intelligent collaborations with other objects anywhere, anytime.
IoT is such a system that supplies connectivity and
interactive communication for anything. Even though “being
connected” is usually used in term of electronic devices in our daily
life, physical objects that have hardware such as sensors or actuators,
connect to the Internet with unique addresses. Data of physical object
are transmitted continuously through wired/wireless networks to
platforms where it will be interpreted.. The revolutionary advance in
this case is that physical objects begin to be deployed and adopted
widely. In addition, most of them begin to work properly without
human intervention.
Nowadays Internet of Things (IoT) gained a great attention
from researchers, since it becomes an important technology that
promises a smart human being life, by allowing a communications
between objects, machines and every things together with peoples.
IoT represents a system which consists a things in the real world, and
sensors attached to or combined to these things, connected to the
Internet via wired and wireless network structure. So this thesis, gives
a overview of IoT, its application ,challenges and solutions which can
be rectified made in future.
41
LIST OF TABLES
S.N TITLE Pg.No.
o
1. Security requirements 28
2. Security challenges. 29
3. Attacks and related risks on security mechanisms 32
of IoT.
4. Cryptographic algorithms. 37
5. Security of Network Layer on IoT. 39
LIST OF FIGURES
S.No TITLE Pg.No.
Fig. 1 IoT Architecture 16
Fig. 0.1 Smart Cities Aspects 18
41
IoT- Internet of Things
(An Overview)
1. Introduction
The Internet of Things engages a broad set of ideas that are complex
and intertwined from different perspectives. Key concepts that serve
as a foundation for exploring the opportunities and challenges of IoT
include:
1.1. IoT Definitions
The term Internet of Things generally refers to
scenarios where network connectivity and computing capability
extends to objects, sensors and everyday items not normally
considered computers, allowing these devices to generate, exchange
and consume data with minimal human intervention. There is,
however, no single, universal definition.
41
1.2. Connectivity Models
IoT implementations use different technical
communications models, each with its own characteristics. Four
common communications models described by the Internet
Architecture Board include: Device-to-Device, Device-to-Cloud,
Device-to-Gateway, and Back-End Data-Sharing. These models
highlight the flexibility in the ways that IoT devices can connect and
provide value to the user.
1.3.1. Security
41
Users need to trust that IoT devices and related data services
are secure from vulnerabilities, especially as this technology become
more pervasive and integrated into our daily lives. Poorly secured IoT
devices and services can serve as potential entry points for cyber
attack and expose user data to theft by leaving data streams
inadequately protected. The interconnected nature of IoT devices
means that every poorly secured device that is connected online
potentially affects the security and resilience of the Internet globally.
This challenge is amplified by other considerations like the mass-
scale deployment of homogenous IoT devices, the ability of some
devices to automatically connect to other devices, and the likelihood
of fielding these devices in unsecure environments. Accordingly, a
collaborative approach to security will be needed to develop effective
and appropriate solutions to IoT security challenges that are well
suited to the scale and complexity of the issues.
1.3.2. Privacy
41
Indeed, the Internet of Things is redefining the debate about privacy
issues, as many implementations can dramatically change the ways
personal data is collected, analyzed, used, and protected.
41
1.3.4. Emerging Economy and Development Issues
41
2. Internet of Things Scope and Architecture
41
c) Presentation: There are visualization and interpretation tools in
presentation level. These tools are designed for various
applications and can be accessed from any platform.
Bringing objects into the digital world and identifying them by using
their Internet addresses are supplied with different tagging
technologies such as RFID and QR Codes. RFID, intelligence
embedded technology, sensor technology and nano-technology are
pioneer technologies for the development of IoT.
41
2.2. The Architecture of Internet of Things
41
From Fig 1,we can see the following Layers:
1) Perception Layer:
The sensor technology, intelligence embedded
technology, nano technology and tagging technology are located
in this layer. Main purpose of the layer is the identification of
unique objects and the collection of information from the
physical world with the help of its sensors.
2) Network Layer:
It contains WSN, optical fiber communication
networks, broad television networks, 2G/3G
communications networks, fixed telephone networks and closed
IP data networks for each carrier.
3) Support Layer:
The layer involves information processing systems
which takes information in one form and processes
(transforms) it into another form. This processed data is stored
in a database and will be available when there is a demand. This
layer works very closely with applications. Therefore,
researchers prefer to place it in application layer.
4) Application Layer:
In this layer, there are practical and useful applications
which are developed based on user requirements or industry
specifications such as smart traffic, precise agriculture, smart
home, mining monitor, etc
41
3. Internet of Things Application
41
citizens to implement the internet of things technology in every
aspects.
By the IoT, cities can be improved in many levels, by
improving infrastructure, enhancing public transportation by
reducing traffic congestion, and keeping citizens safe, healthy
and more engaged in the community as shown in Fig. 0.1.
41
monitoring and wireless sensor monitoring in the home and
building environments.
By the concept of the internet of things, homes and
buildings may operate many devices and objects smartly, of the
most interesting application of IoT in smart homes and
buildings are smart lighting, smart environmental and media, air
control and central heating, energy management and security as
shown in Fig. 0.2 below.
41
access a buildings’ energy information and control systems
from a laptop or a smartphone placed anywhere in the world.
The future Internet of Things, will provide an intelligent
building management systems which can be considered as a part
of a much larger information system used by facilities managers
in buildings to manage energy use and energy procurement and
to maintain buildings systems
41
Fig. 0.3 shows the most important application may be enabled by the
internet of things as in smart grid aspect.
Today’s grid is very reliable and can deal with normal electricity
fluctuations and it will take a step further towards using a low carbon
energy system, by allowing integration between the renewable energy
and green technologies, and offering many benefits to customer in
cost savings through efficient energy use at home.
41
3.4. Smart Health
41
Fig. 0.4 Smart healthcare concept
Many peoples around the worlds are suffering from the bad
health because they don’t have ready access to effective health
monitoring and may be a suspected to be as critical situation patients.
But with small, powerful wireless solutions connected
through the IoT are now making possible for monitoring to come to
these patients. These solutions can be used to securely capture patient
health data from a variety of sensors, apply complex algorithms to
analyze the data and then share it through wireless connectivity with
medical professionals who can make appropriate health
recommendations.
41
transportation and mobility is to apply the principles of crowd
sourcing and participatory sensing. The process began with user
identified the route wishes and marked some points as pothole in the
smart phone's application.
The smart transportation is deal with three main conceptions
as shown in Figure 0.5, they are transportation analytic, transportation
control, and vehicle connectivity.
The transportation analytic represents the analysis of demand
prediction and anomaly detection. The routing of vehicles and speed
control in addition to traffic management are all known as
transportation control which they actually tightly related to the way of
the vehicles connectivity (V2X communication), and overall
governed by multi-technology dissemination.
41
IoT can also be used in transportation is an electric vehicles,
an important means to reduce both the fuel cost and the impact of
global warming have also gained considerable attention from drivers.
Government in many countries has supported researches on
systems to monitor performance of Lithium-ion (Li-on) battery for
electric vehicle as explored. The system presented was designed to
detect the functions of Li-on power battery by deriving the driving
situation from the realistic working conditions for driver so that the
driver was able to get the idea of the route status.
This solution was embedded with many essential
functions such as dynamic performance test of the Li-on battery,
remote monitoring with on-line debugging and error correction that
could significantly reduce the maintenance cost.
For example, Tesla is a leading electronic car company which
uses IoT and AI (Artificial Intelligence).
41
communications enabled by the “industrial” internet of things will
provides a full meaning of smart factory and smart manufacturing by
the way of Big Data concept which in this context, refers to the
analytical possibilities offered by the volume and variety of data that
is generated by a networked economy to optimize the industrial
processes to implying less maintenance downtime, fewer outages and
much reduced energy consumption.
Industries and manufacturing revolution became one of
the most developed technologies nowadays, the growth of the
industry evolution taken many generations. The first generation
related to the mechanical machines in addition to water and stream
power. The second industry generation deal with mass production,
assembly lines and electricity. In the end of the last century, industries
operated under control of computers and automation, which
recognized as third generation of industries.
41
Fig 0.6. Smart Factory (Industry 4)
41
Information transmission between the nodes should
Confidentiality:
be protected from intruders.
Integrity: Related information should not be tampered.
41
suitable authentication mechanism, anyone can tracks
tags and find the identity of the objects carrying them.
protection:
Intruders can not only read the data, but can also
modify or even delete data as well.
The IoT network consists of a large number of nodes.
Scalability: The proposed security mechanism on IoT should be
scalable.
Traditional computers need users to configure and
adapt them to different application domains and
different communication environments. However,
objects in IoT network should establish connections
Autonomic
spontaneously, and organize themselves for adapting
control:
to the platform they are operating in. This kind of
control also involves some techniques and
mechanisms such as self-configuring, self-optimizing,
self-management, self-healing and self-protecting.
Table 2. Security challenges.
In this section, existing threats in IoT systems are examined
in four categories based on IoT architecture which have been
addressed in Section 2.
The examination is summarized in Figure 2.
41
Fig. 2. Threats on layers of IoT.
Signal/Radio Jamming:
It is a type of DoS attack that it occupies the
communication channel between the nodes and hinders them from
communicating with each other.
41
Device-tampering/Node-capturing:
The attacker captures the sensor node physically
replaces the node with their malicious node. This type of attack
usually results in the attacker gaining total control over the captured
node and harms the network.
Node Outage:
The attack is applied logically or physically to the
network and it stops the functionality of network components. Node
services such as reading, collecting and initiating operations are
stopped because of this attack.
Eavesdropping:
Wireless characteristics of RFID system make it
possible that attacker sniffs out the confidential information such as
password or any other data flowing from tag-to-reader or reader-to-
tag making the system vulnerable.
Various kinds of perception layer attacks are listed below with related
risks on security mechanisms of IoT in Table 3.
Attacks Risks
Spoofing Authenticity, integrity and
41
confidentiality.
Signal/Radio
Availability and integrity.
Jamming
Device-tampering/ Availability, integrity, authenticity
Node-capturing and confidentiality.
Path-based
Availability and authenticity.
DoSAttack
Node Outage Availability and authenticity.
Eavesdropping Confidentiality.
Selective Forwarding:
In such attacks, malicious nodes do not forward some
messages and selectively drop them, ensuring that they cannot
propagate later on.
41
Sybil Attack: It is clarified as a malicious device illegitimately taking
on multiple identities. Sybil attack, an attacker can “be in more than
one place at once” as a single malicious node. It presents multiple
identities to other nodes in the network reducing the effectiveness of
fault tolerant schemes.
41
Target of threats in support layer are mainly data storage
technologies. These threats are discussed below:
Unauthorized Access:
The attacker can easily infiltrate into the system and
damage the system by preventing the access to the related services of
IoT or deleting sensitive data. Hence, an unauthorized access can be
fatal for the system.
The personalized services based on the needs of the users are included
in the application layer; e.g. the interface that user can control devices
in IoT. Threats in this layer mainly target these services as mentioned
below:
Sniffer/Loggers:
41
Attackers can introduce sniffer/logger programs into the
system that take important information from the network traffic. The
main goal of the sniffer is to steal passwords, files (FTP files, E-mail
files), and E-mail text. Many protocols are prone to sniffing .
Injection:
Attackers may enter code directly into the application that is
executed on the server. This is a very common attack, easy to exploit,
and can cause some bad results such as data loss, data corruption and
lack of accountability .
Session Hijacking:
This attack reveals personal identities by exploiting security
flaws in authentication and session management. This type of attack is
very common and effects of attack are really important. With the
identity of someone else, attacker can do anything the real user can
do.
41
Taking security measures for the perception layer dates back times
before IoT.
41
Type Algorithm Purpose
Asymmetric
Diffie-hellman (DH) Key Agreement
Key Agreement
Hashing SHA-1/SHA-256 Integrality
41
Key distribution mechanism of those studies are
demonstrated in order to use in lightweight communication channels
in resource-constrained networks. These improvements make
cryptographic mechanisms in the context of WSNs more applicable.
However, unique customized solutions are created and still there has
been no standardized way of implementing services.
41
The wired security sub-layer is concerned with devices, which
communicate with other devices on the IoT system using wired
channels. Common security techniques are applied in wired type
networks are firewalls and Intrusion Prevention System (IPS). If the
network has firewall or IPS, it can inspect network packets deeply
that are destined towards the destination. However, existing IoT has
no ability in terms of packet inspection and packet filtering.
41
The second sublayer corresponds to national applications and their
security systems, ensuring that sent and received data are secure.
Therefore, various security techniques are applied in these systems
based on the scope of each system such as authentication,
authorization, access control list, selective disclosure, intrusion
detection, firewall, and antivirus.
41
5. Conclusion
REFERENCES
41
https://www.internetsociety.org/
https://www.scirp.org/journal/paperinformation.aspx?
paperid=73675#ref1
https://www.sciencedirect.com/science/article/pii/
S0166361517307285
https://www.sciencedirect.com/science/article/pii/
S0167404820304211
https://www.mdpi.com/2624-831X/2/1/9
https://ieeexplore.ieee.org/abstract/document/8972389
https://www.aylanetworks.com/iot-technical-articles
41