Professional Documents
Culture Documents
application layer, including the security measures for each layer separately
IoT security can be explained as: handling information securely, reliable transmission of data, and
awareness of information security
Perception layer:
1. RFID security
2. RSN security, WSNs security
Network layer:
Application layer
CHALLENGES:
1. Mostly designers don’t notice the interdependence between IOT devices. They
usually work on single system, making It easy for attackers.
2. Providing more privilege to anyone has also become embarrassing with respect to
permission of excess.
3. There are a lot of IOT devices available today, so it is very difficult to make a defense
system that will work for all.
4. How we can gain protection with less software and hardware resources, on
lightweight devices.
5. IOT botnet virus is a great challenge. How can we prevent from it?
6. Most IOT devices don’t have virus detection or any malicious detection software.
7. There is always a tradeoff between getting benefits, and privacy of information.
8. When devices switch from one network to another and from one domain to another,
data is passed which is a threat to integrity of data.
[8]
Ashvini Kamble and Sonali Bhutad .” SURVEY ON INTERNET OF THINGS (IOT) SECURITY
ISSUES & SOLUTIONS”: Proceedings of the Second International Conference on Inventive
Systems and Control (ICISC 2018)
CHALLENGES:
PERCEPTION LAYER CHALLENGES:
1. Poor authorization mechanism in RFID
2. Creating a copy of tags:
Attacker create a copy of tags, such that creator cannot recognize them.
3. Injecting the fake data on any captured node or device:
Attacker can inject the fake piece of information in regular piece of information.
4. Counter Node attack:
Counter node is added, which prevents data from being transferred over network.
5. Replay attack:
A destination node get a packet sent by attacker to gain trust of the user, which is used
for authentication later.
NETWORK LAYER CHALLENGES:
1. Spoofing:
Attacker get the complete right and then send the legal tag identification.
2. Packets drop:
A node is made attractive, so that data flow towards that node, resulting in packets drop.
3. Nodes inside network are provided with less life time batteries, and nodes are kept
wakeful to reduce battery life time.
4. Poor security of protocols:
IP based IOT devices are have a greater chances of revealing the address to internet
world causing problems.
APPLICATION LAYER CHALLENGES:
1. Phishing
With the help of inflamed emails and spoofing adversary gets the authorization
credentials of user.
2. Malicious worms help attacker achieve private data, which is tempered or used for self-
benefit.
3. Sniffing
Attacker send a sniffer to network causing a lot of information gain, like username and
password.
4. Software vulnerabilities:
Programmers write code, without following any standard. There is no any memory
management used, resource management and threads management used in code written.
5. Data Protection:
Since, there non fool proof algorithms used, there can be chances of important data loss.
6. Cloud Computing issue:
DDOS attack make system shutdown and data center offline cause the network to use a
lot of bandwidth and disk space.
SOLUTION PROTOCOLS:
1. Link Layer Security:
For a secure communication between two nodes, security at each node is needed to be
implemented. One solution to secure key is that, the session key is made between
server and client. And TLS is preferable because TCP is used by TLS.
2.