Professional Documents
Culture Documents
Seminar Report
On
Security and privacy challenges in IOT
Submitted by
Priyanka Patel [2205112110069]
Bhavesh chandegra [2205112110009]
as
Partial fulfilment of Semester II
of Master of Computer Applications
for A.Y. 2022-2023
Submitted To
Department of MCA
Acknowledging the security and challenges of using the Internet of Things (IoT)
is crucial because IoT devices are becoming increasingly popular and are used in
various industries, including healthcare, transportation, and manufacturing.
While IoT has many benefits, including increased efficiency and productivity,
there are also significant security challenges that need to be addressed.
One of the most significant challenges of IoT is security. IoT devices are
vulnerable to cyber-attacks because they are often connected to the internet and
can be accessed remotely. Hackers can exploit these devices to gain access to
sensitive data or take control of the devices themselves. Additionally, many IoT
devices have weak security measures, making them an easy target for cyber-
attacks.
"We would like to express my sincere gratitude to my professor Dr. Hina Choksi
Ma’am, & Faculty of IT & computer science PIET – MCA PARUL
UNIVERSITY for their invaluable guidance, support, and expertise throughout
the course of this project. Their insightful feedback, encouragement, and
dedication have been instrumental in the success of this project. I am truly
grateful for the opportunity to work with them and for their unwavering
commitment to my academic growth and development. Thank you, Dr. Hina
Choksi ma’am for your guidance and support."
ABSTRACT
This could help developers to write software for the device more easily, without
needing to understand every detail of the hardware.
This could be done using APIs or other software tools that provide a high-level
interface to the device's network capabilities. This would allow developers to
focus on the functionality of their applications, without worrying about the
details of how the device is connected to the network.
3. Methodologies 16
4. Algorithms / Techniques 17
4.1 lack of Encryption Algorithms
4.2 Advantages of Algorithms
5. Tools & Technologies 19
7. Bibliography / References 22
7.1 Books
7.2 Research paper
1.INTRODUCTION
The Internet of Things (IoT) gathers environmental data using sensors and other
hardware components, which is then processed and analysed to produce
informative insights. In a variety of businesses, this data can be used to increase
productivity, cut costs, and improve decision-making.
By enabling more connectivity and automation in our daily lives, the IoT has the
potential to completely change the way we work and live. Wearable technology,
for instance, may track our fitness and health levels, while smart homes can let us
control heating, lighting, and appliances remotely.
Overall, the Internet of Things (IoT) has the potential to transform how we live
and work, but it is critical that we address the security and privacy problems to
guarantee that the advantages of this technology are realised.
Efficiency: IoT devices can streamline and automate tasks, improving overall
efficiency in a wide range of industries.
Cost savings: By automating tasks and improving efficiency, IoT devices can help
reduce costs across various industries.
Convenience: IoT devices can offer greater convenience and control over
everyday tasks and activities.
Improved safety and security: IoT devices can enhance safety and security in
various settings, such as smart homes, industrial plants, and transportation
systems.
1.2 Disadvantages of IoT:
Security risks: As IoT devices collect and transmit large amounts of data, they are
susceptible to hacking and other cyber attacks, which can compromise personal
and sensitive information.
Privacy concerns: The data collected by IoT devices can be highly personal, and
there are concerns that this information could be misused or accessed by
unauthorized parties.
The Internet of Things (IoT) has a wide range of applications in various industries,
and each of these applications presents unique security and privacy challenges.
The common application areas of IoT and the associated security and privacy
challenges:
1. Smart City
2. Wearable device
3. Health monitoring
4. Smart Home
5. Self-driving Car
6. Smart Farming
7. Fitness Trackers
8. Smart Factories
9. Hospitals & Tour
10. Retail IOT
They may also have access to a variety of apps and services, such as music
streaming and voice assistants.
This allows for a more seamless integration with the user's digital life, as well as
the ability to control certain smartphone functions from the watch.
1 They're Expensive.
2 Potential Risks of Smartwatches.
3 Smartwatches Need Regular Charging.
4 Not Convenient for Calling.
5 Never-Ending Notifications Can Be a Curse.
6 You Still Need to Have Your Phone With You.
7 Smartwatch Screens Have Limited Functionality
1. Data privacy
2. Authentication
3. Encryption
4. Malware
5. Physical security
6. Third-party app vulnerabilities
7. Firmware and software vulnerabilities
User awareness: Users should be educated on how to recognize and avoid social
engineering attacks. This includes not clicking on suspicious links or downloading
apps from untrusted sources.
Physical security: Users should keep their smartwatches secure, such as by using
a password or PIN to lock the device, and avoiding leaving the device unattended
in public places.
3.METHODOLOGIES
Smartwatches are a popular category of IoT devices that combine various sensors,
connectivity technologies, and computing capabilities to provide a range of useful
functions to users.
The lack of encryption in these algorithms could potentially leave the data vulnerable
to interception or unauthorized access. For example, an attacker may be able to
intercept the data being transmitted from the smart watch to a mobile app or server
and read the data in plain text. This could potentially allow the attacker to view
sensitive information such as the wearer's location, activity patterns, and health data.
It's important to note that the lack of encryption in smart watch algorithms is not a
universal problem. Many smart watch manufacturers take security seriously and
implement encryption and other security measures in their devices and software.
Additionally, the risk of data interception or unauthorized access may be low in
many cases, especially if the data is only stored locally on the smart watch and not
transmitted over the internet.
It's important for smart watch manufacturers to prioritize security and implement
strong encryption and other security measures in their devices and software to protect
user data. Consumers should also take steps to protect their smartwatches, such as
setting strong passwords and keeping their devices and software up-to-date with the
latest security patches.
Ease of use: The code encapsulates the encryption and decryption operations within
separate functions, making it easy to implement and use. You can simply call the
encrypt function to encrypt your data and the decrypt function to decrypt it.
Data integrity: Fernet automatically verifies the integrity of the encrypted data
during the decryption process. If the data has been tampered with or modified, the
decryption operation will fail, providing an additional layer of security.
Smartwatches are wearable devices that offer a variety of functions beyond just
telling time. They can be connected to a smartphone or other devices and can
perform a wide range of functions, from tracking fitness to making phone calls and
sending messages.
Sensors: Smartwatches often come with sensors such as heart rate sensors, GPS,
accelerometer, gyroscope, and barometer, which allow them to track fitness,
monitor activities, and provide health-related data.
Voice assistants: Many smartwatches have voice assistants such as Siri, Google
Assistant, or Amazon Alexa, which allows users to control their smartwatch with
voice commands.
WiFi and Bluetooth: Smartwatches use WiFi and Bluetooth to connect to other
devices, such as smartphones, headphones, and smart home devices.
Apps: Smartwatches often come with a variety of apps, including fitness tracking
apps, music streaming apps, weather apps, and messaging apps.
Battery life: Smartwatches have different battery life ranges, which can vary from
a few hours to several days depending on the usage and features.
Wearable sensors: Researchers are exploring new wearable sensors that can be
integrated into smartwatches to track various physiological and environmental
parameters, such as temperature, humidity, and air quality. These sensors can
provide users with personalized and real-time feedback on their health and
environment.
Extended battery life: One of the major challenges of smartwatches is battery life,
and many researchers are working on developing new energy-efficient components
and technologies to extend the battery life of these devices. Some examples include
using solar cells, energy harvesting technologies, and low-power chips.
Machine learning and AI: Researchers are using machine learning and artificial
intelligence (AI) to improve the accuracy of smartwatch sensors and algorithms.
These technologies can analyze vast amounts of data and provide personalized
insights to users, such as predicting health risks and suggesting personalized
workouts.
Security and privacy: With the growing concerns around data privacy and
security, researchers are developing new technologies and protocols to secure
smartwatches and protect user data. Some examples include using biometric
authentication, encryption, and decentralized data storage.
Figure 6: Current work in Smart Watch
7. BIBLIOGRAPHY/ REFERENCE
7.1 Books