Mobile Computing For IoT Device Security Analysis
Mobile Computing For IoT Device Security Analysis
Mobile Computing For IoT Device Security Analysis
ISSN No:-2456-2165
Abstract:- One of the most cutting-edge technologies is authenticate using a smartphone via QR-code authentication,
the Internet of Things (IOT).Various fea tures provided and the smartphone can also be used as a controller in a
by the IOT by connecting smart objects through the home automation system[2]. These paper highlight the
internet. IOT is refers as the connecting various devices threats, vulnerabilities,attacks and then approaches based on
to each other by means of internet hence there is no mobile computing.
human interaction. The IOT components like sensor,
cloud, Bluetooth, wifi, etc. are connected through A. Motivation:
network, it may be wired or wireless to make smart The Internet of Thing is the phenomenon that will be
system or smart devices. This devices are transferring the experiencing the rapid growth in coming years. Because of
plenty amount of personal data over the network. Due to the rapid development of IoT devices, security concerns are
that humans day to day life becomes an easier therefore becoming important challenges that have piqued people’s
it is necessary to make sure that the technology should be interest. The Internet of Things has a wide range of
secured as much as possible. In the IOT environment, the applications in a variety of fields and application domains.
data can be malfunction by various attacks and threats. There is a significant impact of use of IoT technologies such
Therefore the strong security mechanism is required to as e-learning, internet banking, blogs, mobile devices, IoT
deal with different types of attacks and security applications, urban technologies, teaching technologies. The
challenges. Every electronic gadget will become a smart motivation comes from IoT security using mobile
device in the future, and it will be able to register with computing. This is becoming a future study trend in which
handheld equipment. Because the majority of IoT devices the security of the IoT system is assessed using mobile
are battery-powered and consume little power, IoT computing.
security is a serious concern. The most critical security
and protection challenges in IoT are identification and B. Objectives:
authentication. To ensure the safety of IoT network topology.
The study of IoT security challenges in real world.
Keywords:- IOT, Privacy, Security, Threats, Sensors, To enhance the inter connection between different
Raspberry Pi. devices by increasing the speed of communication
process.
I. INTRODUCTION To provide secure access to the UI layer to prevent
unauthorized access.
The privacy and security of the internet of things has
become a very serious concern due to the different nature of II. LITERATURE SURVEY
large scale devices and its vulnerabilities. The applications of
IoT are transportation, environmental monitoring, home In the digital world IOT plays an very important role of
automation, medical and healthcare systems, teaching, etc. the information. The IOT net works are used in various
[1]. IoT devices faces the problems like computational cities of smart city network. Therefore the security of the
processing, limited memory and low power. IoT system is IOT network is very big issue.E. Shaikh et al [1] perform
consist of three components first is sensing unit which has Internet of Things (IOT): Security and Privacy Threats
number of sensors, mobile terminals and actuators. This unit which discuss two technologies which are used WSN and
detect the physical environments. Because of its simple RFID which creates direct communication by using Internet.
structure, IoT is more ex posed to security issues with IoT B. Liao et al [2] perform security analysis of IOT devices by
devices. Many more security risks and challenges face IoT using Mobile Computing which provides both hardware as
devices. Different authors took different approaches to these well as soft ware based solutions to provide IOT security.
security difficulties and challengesUsing the notions of Towards secure authenticating of cache in the reader for
mobile computing, we give a security analysis of IoT-based RFID-based IOT systems introduced by C.-T. Li et al [3] and
devices. The mobile computing provide both hardware as The LRMAPC protocol is a lightweight RFID mutual
well as software security. Many devices can be connected to authentication protocol with a cache in the reader that
IoT devices, providing security such as the ability to achieves higher security and privacy requirements. A
A. Establishing Network
Fig. 15: Providing Host name Fig. 19: Unauthenticated Request (FTP)
Fig. 16: Sending Request (VNC) Generally, whenever attacker attacks over the system
that time system behaves in two different ways. One is the
system is intimating to the attackers or whoever is trying to
malfunctioning. The another approach is the system is not
intimating attackers or user, whoever is trying for
malfunction. We are going with second approach. Since in
first approach, attacker may get alert or may use different
approach for attacking or masking his information. That is
the reason we are going with second approach where we are
not intimating user by any chance or we are monitoring his
activity over server.
REFERENCES