You are on page 1of 5

this paper analyzes the security problems that occur in the layers: perception layer, network layer and

application layer, including the security measures for each layer separately

IoT security can be explained as: handling information securely, reliable transmission of data, and
awareness of information security

Perception layer:

1. RFID security
2. RSN security, WSNs security

Network layer:

1. core system security


2. access network security
3. security of local network.
4. WiFi security
5. security of Ad-Hoc network, 3G access network security

Application layer

1. cloud computing platform security


2. service support platform security
3. information development platform security
Perception Layer Security Problems and Measures:
The perception layer for the most part incorporates zigbee, RFID and all
sorts of sensors. Basically for transmission of collected data, wireless
network transmission media is used. As the sensors are deployed in
unmanned observing locales and are exposed publically, signals will be
disturbed, and intercepted easily in the event that it needs insurance
measures [6]. The attacker can physically damage or control the equipment
by gaining access easily. DPA (Differential Power Analysis) is quite
powerful assault, for instance. Some certain types of attacks are as follows:
1) Denial of Service Attack: In internet and WSN, DOS assault is most
regular assault. It leaves network resources unreachable and services
unavailable. 2) Node Capture: The attacker can control key hubs for
example gateway node, easily which may leaks matching key, radio key,
group communication key, and threaten the security. 3) Timing Attack:
This attack obtains key data by investigating the time required for executing
encryption calculation. 4) Counterfeit Attack: Attacker can add a fake
node, which has malicious data or code in it, which stops the real data from
transmission and expose the identification tag.
[6]. Fake node is basically unauthorized replica of original node. 5) Side
Channel Attack: Attacker through the side channel spillage attack encryption
devices. Based on data such as traffic analysis, fault analysis of the device
etc. private data can be inferred [9]. 6) Routing Threats: Attacker can resist
network communication, make error messages, increase delay, can amplify
or shorten source path, and can create routing loops etc. by tampering,
cheating or resending routing information. 7) Replay Attack: Destination
host receives package sent by the attacker to obtain system’s trust. It mainly
destroys the validity of certification and is used in authentication processing.
Network Layer Security Problems and Measure:
As it is combination of a various heterogeneous networks, network layer can
be divided into three layers by its functionality: the core network, the access
network and local area.
Access Network Security Issue:
WiFi security risks
1. network trap
2. network attack
example, back to the scenario described as the first example in the last paragraph,
the hackers do not need to attack the automatic window control or thermometer.
However, he could compromise the smart plug that connected to the public
network to turn off the air-conditioner in a room and trigger a temperature
increase, which would result in the windows to open and create a physical security
breach.
The majority of the researchers do not realize the effect of interdependence
behaviors on IoT security. Researchers generally protect the single device itself.
However, it is difficult to make a clear defensive boundary of IoT devices or use
static access control methods and privilege management to them because of their
interdependent behaviors.
JoyLink protocol of JD, such as device hijacking:
THREATS:
For example, lightweight IoT devices do not have the memory management unit
(MMU).
Moreover, much complicated encryption and authentication algorithms like public
cryptography implement on such devices, they occupy too much computing
resource and causes a long delay, which affects the normal operation of these
devices and reduces performance especially for real-time IoT devices.
Consequently, it is easy for attackers to use memory vulnerabilities to compromise
these devices.
due to limit resource many IoT devices even communicate with the server without
encryption or use SSL encryption without checking the server's certificate.
Attackers could easily intercept communication or launch man-in-the-middle
attacks.
Furthermore, more and more new IoT botnet like IoTroop [47]. The IoT Botnet
was made mostly of unsecured IoT devices rather than computers, and their speed
is much faster and would launch large-scale distributed denial of service (DDoS)
attacks.
Some researchers [57] show that attackers can infer whether the home is occupied
with more than 90 percent accuracy just by analyzing smoke and carbon dioxide
sensors data.
These sensitive data collected by IoT devices will be shared with service providers.
Driven by profit, service providers also keep these data forever and even shared
these data with other advertising agency without the user's consent.
Because mobile IoT devices are more likely to join more networks, hackers tend to
inject the malicious code into mobile IoT devices to accelerate the spread of
malicious code:
[6]
Wei Zhou, Yuqing Zhang, and Peng Liu.” The Effect of IoT New Features on Security and
Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved” January, 2018

CHALLENGES:
1. Mostly designers don’t notice the interdependence between IOT devices. They
usually work on single system, making It easy for attackers.
2. Providing more privilege to anyone has also become embarrassing with respect to
permission of excess.
3. There are a lot of IOT devices available today, so it is very difficult to make a defense
system that will work for all.
4. How we can gain protection with less software and hardware resources, on
lightweight devices.
5. IOT botnet virus is a great challenge. How can we prevent from it?
6. Most IOT devices don’t have virus detection or any malicious detection software.
7. There is always a tradeoff between getting benefits, and privacy of information.
8. When devices switch from one network to another and from one domain to another,
data is passed which is a threat to integrity of data.
[8]
Ashvini Kamble and Sonali Bhutad .” SURVEY ON INTERNET OF THINGS (IOT) SECURITY
ISSUES & SOLUTIONS”: Proceedings of the Second International Conference on Inventive
Systems and Control (ICISC 2018)
CHALLENGES:
PERCEPTION LAYER CHALLENGES:
1. Poor authorization mechanism in RFID
2. Creating a copy of tags:
Attacker create a copy of tags, such that creator cannot recognize them.
3. Injecting the fake data on any captured node or device:
Attacker can inject the fake piece of information in regular piece of information.
4. Counter Node attack:
Counter node is added, which prevents data from being transferred over network.
5. Replay attack:
A destination node get a packet sent by attacker to gain trust of the user, which is used
for authentication later.
NETWORK LAYER CHALLENGES:
1. Spoofing:
Attacker get the complete right and then send the legal tag identification.
2. Packets drop:
A node is made attractive, so that data flow towards that node, resulting in packets drop.
3. Nodes inside network are provided with less life time batteries, and nodes are kept
wakeful to reduce battery life time.
4. Poor security of protocols:
IP based IOT devices are have a greater chances of revealing the address to internet
world causing problems.
APPLICATION LAYER CHALLENGES:
1. Phishing
With the help of inflamed emails and spoofing adversary gets the authorization
credentials of user.
2. Malicious worms help attacker achieve private data, which is tempered or used for self-
benefit.
3. Sniffing
Attacker send a sniffer to network causing a lot of information gain, like username and
password.
4. Software vulnerabilities:
Programmers write code, without following any standard. There is no any memory
management used, resource management and threads management used in code written.
5. Data Protection:
Since, there non fool proof algorithms used, there can be chances of important data loss.
6. Cloud Computing issue:
DDOS attack make system shutdown and data center offline cause the network to use a
lot of bandwidth and disk space.
SOLUTION PROTOCOLS:
1. Link Layer Security:
For a secure communication between two nodes, security at each node is needed to be
implemented. One solution to secure key is that, the session key is made between
server and client. And TLS is preferable because TCP is used by TLS.
2.

You might also like