You are on page 1of 3

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017

RESEARCH ARTICLE OPEN ACCESS

A Study on Data Security in Internet of Things


G. Ambika [1], Dr.P.Srivaramangai [2]
PG & Research Scholar [1], Assistant Professor [2], Director,
Department of Computer Science
Srimad Andavan Arts & Science College, Tiruchirappalli
Tamil Nadu - India

ABSTRACT
The main aim of this paper is to enhance the security in Internet of things and services, which have the potential
scope and benefits not only for the end users but also for the service providers and adaptors. Due to the invention of
IPv6 and the development of Wifi networks, digitally connected devices are being developed in all the fields. Since
there is an intervention of internet there are many security issues. Internet of things and data mining is the primary
interest of many information researchers worldwide due to the fast booming information technology sector. This
paper provides a high level review of the fundamentals of Internet of Things, a few of the key problems and issues,
that can be raised from the user perspective.
Keywords:- Internet of Things, Data security, IPv6, Wifi networks, Internet of Things revolution, Information
technology, Privacy, etc.

I. INTRODUCTION
providers have potential threats from the hackers and
The Internet of Things is a very important topic spies. More research work has to be conducted in the
on Information technology business, policy, and data security area in order to protect the privacy of
engineering circles. This technology is embodied the consumers and the functionality of the corporate
with a wide spectrum of networked merchandise, companies. According to the HP Enterprises security
systems, security and sensors that make the most of products company research, 70 % of the most
the advancements in computing power. Science commonly used Internet of Things devices have
conferences, reports, and news articles discuss and vulnerability such as password security, encryption,
analyse the possible impact of the Internet of etc.,
Things revolution. Internet of Things has the The number of connected devices increases
potential to develop new market opportunities and and their usage becomes an important part of day to
business models. At the same time security, privacy, day life, security, confidential and individual safety
and technical feasibility issues should also be issues will arise. Many security issues are seen to
addressed. take up in the Internet of Things environment for
sensitive information. The variety of sources manage
According to a research report, there will be 40 and secure these vast changes the security issues.
million wireless connected devices by 2020. More Security of Personal information is a major concern
connected devices lead more attacks by hackers. in the Internet of Things environment. Through
Digitally connected devices such as mobile phones, cloud services available data security is provided.
cars and all other products have potential threats
through the hackers, attack vectors and cyber
II. REVIEW OF LITERATURE
criminals. Internet of Things security has many issues
of high concern. Many researches are going on in According to Dong Chen et al. heterogeneous
and around the world in the field of Internet of entities, security communication, security system and
Things security through devices using smart mobile other security issues are complex and difficult. A
phones. Huge repositories of Internet of Things data novel security architecture for Internet of Things has
related to consumers, manufacturers, service

ISSN: 2347-8578 www.ijcstjournal.org Page 467


International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017

been proposed to solve complexity issues.[1]. Sachin problem in Internet of Things perception, network
Babar et al, have proposed an embedded security and application on the environment and proposed
framework to solve the security issues with Internet security strategies frameworks for Internet of Things.
of Things and integrating the conventional security The theoretical basis to build up the reliable security
systems and embedded security system in the device system developed [8]. According to Marica et al, the
itself for the better security services and also Named Data Networking has the potential as a
proposed a security model for the Internet of Things secured content retrieval solution both in wired and
[2]. Wu He et al, have proposed a novel multi- wireless networks. Its elements such as name based
layered vehicular data cloud platform. This paper content, named routing and in-network caching are
deals about the vehicular data cloud services, suitable for the heterogeneous nature of the Internet
intelligent parking cloud service and vehicular data of Things [9].
mining cloud service in the Internet of Things
environment. This paper also analyzed the Naive III. USER NEED FOR SECURITY IN
Bayes model and a Logistic Regression model for the IOT
Internet of Things environment [3].
Internet generates a large volumes of data which
Chang Lu et al, have analyzed the security of needs scalable, huge, storing & processing capacity
Internet of Things based on authenticator-based data specifically for varied devices. Users need their data
integrity verification techniques for cloud. This paper to be secured while accessing or storing or processing
also focuses multiple aspects of the security problem their data thro devices. Data authentication of the
and proposed security verification technique for source of data is required in Internet of Things
Internet of Things [4]. Zhao et al, proposed ISSAP- environment. M2M and the Internet of Things has
Intelligence Service Security Application Protocol, huge potential, but currently comprises a
which has a standard packet structure named smart heterogeneous collection of established and
business security, Internet of Things application emerging, often competing, technologies and
Protocol used a custom data packet encapsulation standards. Thus data security of internet of things
mechanism which helped to reduce the overhead of devices is to be addressed to make sure that the client
data resources. This author also used another cross- devices are secured for easy access & usage.
platform communication which has a combination of
secure encryption and decryption, signature and IV. ISSUES & CHALLANGES IN DATA
authentication algorithms. Finally developed the
secure communication system for Internet of Things
SECURITY
[5].
Many devies are IOT connects things there
Liang et al. studied the security of multimedia will be various challenges to organize and
applications on the Internet of Things, analyzed the manage Individual devices.
security issues in wired, wireless sensor and actuator
networks. An efficient multimedia-aware security Personal data protection is required in Data
framework for transmitting various multimedia retrieval and processing of large volumes of
applications in the Internet of Things are framed. A data in Internet of Things environment.
novel multimedia traffic classification, analysis
method and also proposed multimedia-aware traffic Data authentication for source of data is
security architecture based on classification. The required in Internet of Things environment.
flexibility and efficiency of the security architecture,
the characteristics of multimedia traffic, security Data usage through the security channel
service and the Internet of Things were studied [6]. attack need to be addressed.
Dukas et al, presented a system to solve security
To improve performance of Internet of
issues using digital certificates and PKI data
Things environment through increasing
encryption [7]. Quandeng Gou studied the security
latency and capacity

ISSN: 2347-8578 www.ijcstjournal.org Page 468


International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017

V. CONCLUSION [5]. Y. L. Zhao, "Research on Data Security


Technology in Internet of Things", Applied
Data security in Internet of Things is already Mechanics and Materials, Vols. 433-435, pp.
seen as inhibiting the adoption of services for variety 1752-1755, 2013
of organizations. Internet of Things are designed with
[6]. Liang Zhou et al, Multimedia traffic security
protection with so much of data with less thought
architecture for the internet of things, IEEE
given to sharing. A promising approach is providing
Xplore, 2011,
each information protection and sharing is to enhance
centered access management technologies with [7]. Doukas et al, Enabling data protection through
people who specialize in the properties of the PKI encryption in Internet of Things m-Health
information. Providing controlled information devices Bioinformatics HYPERLINK
sharing is often supported by public cloud services "http://ieeexplore.ieee.org/xpl/mostRecentIssue.
via secured networks. jsp?punumber= HYPERLINK
"http://ieeexplore.ieee.org/xpl/mostRecentIssue.
VI. REFERENCES jsp?punumber=6387371" HYPERLINK
"http://ieeexplore.ieee.org/xpl/mostRecentIssue.
[1]. Dong Chen, et al, A novel secure architecture
jsp?punumber=6387371"6387371
for the Internet of Things, IGEC, 5th
conference, IEEE Xplore, 2011 [8]. Quanden Gou, Construction and Strategies in
Internet of Things Security System, Green
[2]. Sachin babar et al, Proposed embedded security
Computing and Communications (GreenCom),
framework for Internet of Things, Wireless
2013 IEEE and Internet of Things
communication, 2nd conference, IEEE Xplore,
(iThings/CPSCom), IEEE International
2011
Conference on and IEEE Cyber, Physical and
[3]. Wu He et al, Developing vehicular Data cloud Social ComputingIEEE Xplore, 2013,
services in the Internet of Things environment,
Transactions on informatics, IEEE Xplore, [9]. Marica et al, Named data networking for
2014 Internet of Things: An architectural
perspective, Networks and Communications
[4]. Chang Lu et al, External integrity verification (EuCNC), 2014 European Conference onIEEE
for outsourced big data in cloud and Internet of Xplore, 2014.
Things: A big picture, future generation
computer system, ELSEVIER, 2015

ISSN: 2347-8578 www.ijcstjournal.org Page 469

You might also like