Industrial Internet of Things (IIoT). Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Industrial Internet of Things (IIoT) - Группа авторов страница 19

Industrial Internet of Things (IIoT) - Группа авторов

Скачать книгу

pp. 555–572, Springer, Cham, 2016.

      58. Patel, P., Ali, M.I., Sheth, A., On using the intelligent edge for IoT analytics. IEEE Intelligent Syst., 32, 5, 64–69, 2017.

      59. Mobley, R.K., An introduction to predictive maintenance, Elsevier, Amsterdam, Netherlands, 2002.

      60. Selcuk, S., Predictive maintenance, its implementation and latest trends. Proc. Inst. Mech. Eng. Part B: J. Eng. Manuf., 231, 9, 1670–1679, 2017.

      1 *Corresponding author: [email protected]

      2

      Analysis on Security in IoT Devices—An Overview

       T. Nalini1* and T. Murali Krishna2†

       1 Dept. of CSE, Dr. M.G.R. Educational and Research Institute, Chennai, India

       2 Dept. of CSE, Srinivasa Ramanujan Institute of Technology, Ananthapuramu, India

       Abstract

      Internet of Things (IoT) is becoming an evolving technology being a part of day-to-day activities of human life. The number of IoT devices is expected to rise up to 30–35 billion by 2022. As the connectivity to World Wide Web is highly available at affordable price, which leads to more number of internet users. Therefore, an enormous number of electronic gadgets that are connected to Internet are producing huge amount of data. This creates a biggest challenge in IoT sector such as securing the IoT devices and data that is been exchanged over the network.

      The user’s private information is transferred among the gadgets, and several security challenges such as privacy, confidentiality, integrity, and reliability issues need to be addressed. Several industries are manufacturing different IoT devices at various standards. Incorrectly configured IoT device (faulty apps on mobile device) can cause excessive data traffic over Internet Protocol and device batteries are getting drained faster. This research is mainly focused on different issues such as analysis of present research in IoT security, and this analyzes the communications behavior of IoT devices and mobile apps, security threats on IoT technology, various IoT tools, IoT manufacturers, and the simulators that are currently used.

      Keywords: IoT technology, authenticity, confidentiality, privacy, simulation

      The promising IoT connects various kinds of devices through the Internet so as to reap data formulated by sensor(s), end devices connected at longer distance, buildings, vehicles, etc. [1]. In the last year, IoT devices have radically increased in number with variations and nearly 50 billion of them being connected to web by end of 2020 [2]. IoT devices are distributed across all environments and several kinds like “smart cities, grids, health, retail, watches, supply chain, farming, TVs, and so forth”. While designing IoT, important aspects to consider are security and privacy services. Unfortunately, there is a chance for the IoT devices to be inadequate or deficiently structured security systems. Moreover, security assaults can infiltrate into IoT devices and destroy the communications; hence, such security dangers must be aware of in IoT network.

      In order to evade cyber assaults, during IoT devices design, security must be looked upon as a vital segment [3]. But, the various types of IoT constituents interrupt unfolding of well recognized techniques for reassuring Security in IoT systems [4, 5]. The foremost challenging aspects of IoT devices are quantification, energy, storage, and communication capabilities. Just about, it is very delicate to build cyber-security among the IoT end users and manufacturers. Incidentally, most of the IoT equipment companies hold lowered cost for actuator and sensors in the market. Such devices were primarily intended to operate in disconnected networks, where the security threats are substantially less prevalent.

      As a consequence, some of the designer are not capable enough on cyber security and might be ignorant of the security dangers relevant to their real world devices. Hence, with the need to lower expenses and the time on advertisements related to IoT networks commercialization, security is overlooked [6].

      The objective of this paper is therefore to focus on current IoT cyber security issues and get familiarized with the dangers posed by IoT devices. The paper discusses about the characteristics of such dangers and the possible infringements. The issues recognized with IoT related cyber security have been presented in various works in the literature as in, e.g., [7–9]. As compared to such papers, here, we address the theme from an increasingly down to earth viewpoint. Commonly, “Zigbee, 6Lo-WPAN, LoRa-WAN, and Bluetooth Low Energy” are eventually utilized as communication protocols in IoT devices.

      Security is an inevitable issue that must be addressed in anything we do, anyplace we do, and whenever we do. There is a digital information about individuals and about what individuals do, what individuals talk, and where they go, and details about their arrangements and so on and so forth. What is more, with a plan to go ahead with IoT, the aggregates of this information will be augmented comprising sensitive data about user’s conducts and behaviors. So, it might lead to undesirable outcomes on account of unprotected information.

      For data protection, the major concept is that of security policy—it combines several services like confidentiality, integrity, as well as accessibility. These notions collect the elementary security objectives for both data and computational services. Furthermore, authenticity, non-reputation, and then privacy are security services, too [10].

      1 Confidentiality: This denotes protecting exchanged content acquired by IoT devices.

      2 Integrity: When anticipated recipients must be able to verify if the exchanged things have been modified or not within themselves.

      3 Availability: The data must be available to authorized parties at all point of time. Partial resources, functionalities, or other services produced or attained by the network may be endangered and it is not accessible within the peers of the network.

      4 Authenticity: This indicates that the system is not accessed by unauthorized users. Authentication mechanism helps establishing proof of identities without which fabrication is possible.

      5 Non-repudiation: It does not permit the sender of a specific message to refute the claim of not directing that message.

      There are three classes of IoT related risks encompassing the risks that are as follows:

      1 Characteristic

Скачать книгу