IoT_c paper 2
IoT_c paper 2
IoT_c paper 2
Sreelatha Malempati
Prof.& Head, Department of Computer Science & Engineering, R.V.R & J.C College of
Engineering, Guntur, Andhra Pradesh, India
lathamoturicse@gmail.com
S J R K Padminivalli V
Assistant Professor, Department of Computer Science & Engineering, R.V.R & J.C College
of Engineering, Guntur, Andhra Pradesh, India
srivallivasantham@gmail.com
Abstract— Many IoT devices lack basic security requirements. The small
size and limited processing power of many connected devices could inhibit
encryption and other robust security measures, People need understanding of
limitations of devices due to their size and the approaches for providing security.
The challenges for implementing the security of embedded devices and
providing end-to –end security are the outcomes of this study.
Keywords— Internet of Things, IoT Security, Embedded devices, Hardware
security
1 Introduction
The Internet of things (IoT) is the network of physical devices, vehicles, home
appliances, and other items embedded with electronics, software, sensors, actuators,
and connectivity which enables these things to connect, collect and exchange data.
The number of IoT devices increased 31% year-over-year to 8.4 billion in the year
2017 and it is estimated that there will be 30 billion devices by 2020. Security is
essential for the safe and reliable operation of IoT connected devices.
1.2 Applications
Today, Internet of Things is used in many applications like Home automation:
Personal Health Monitoring, Building automation, Industrial automation and Smart
cities. The first and most obvious advantage of Smart Homes is comfort and
convenience, as more gadgets can deal with more operations which in turn frees up
the resident to perform other tasks. In Personal health monitoring, it increase the
relationship between consumer/ patient and healthcare providers and payers. Patient
engagement and consumer consciousness play an important role here and in the
relationship with healthcare payers. Building Automation processes related to energy
efficiency, temperature control, security, and even sanitation can improve operations
in ways that directly impact the production cost and maintenance cost. In Industrial
Sensors Actuators
Transceiver
Microcontroller
Power Supply
IoT devices can communicate with the Internet. The End device send information
to the gateway with the help of communication protocol. The information then send to
a cloud where the information will be processed and the respective actions will be
sent to the receiver device. The following figure illustrates the how Iot devices
connect to the internet.
2 Methodology
IPv6 with 2 to the 128th power addresses, is for all practical purposes
inexhaustible. This represents about 340 trillion, trillion, trillion addresses, which is
more than the demand of the estimated 100 billion IoT devices going into service in
the coming decades. Enables direct connection of physical objects to the Internet
using microcontrollers which are constrained in computational power, memory and
in power consumption. The main goals are Confidentiality, Integrity and availability.
The main threats are Snooping, Traffic Analysis, Spoofing, Replaying, Repudiation,
modification, Denial of service.
IoT involves extending Internet connectivity beyond standard devices, such as
desktops, laptops, smart phones and tablets, to any range of traditionally dumb or
non-internet-enabled physical devices and everyday objects. Embedded devices are
designed for low power consumption, and have limited connectivity. They typically
have only as much processing capacity and memory as needed for their tasks.
Generally people overlook the risks of internet connected devices without taking
proper security measures. The level of security required for an embedded device
There are many Issues in addressing. They are Compound Object in which an
object consists of many objects. The Object Lifetime might range from years or
decades down to days or minutes. The ownership & identity relationship between
objects. The authentication & authorization procedure in use. The support for mobility
in which dynamic objects connect from one network to another. There are many
security issues will be there. The main concern is on Protection of Devices, Protection
of Data, Secure communication, Secure applications. The Secure communication
require use of confidentiality and data integrity mechanisms. To protect the devices
against various attacks we have to use a secure operating system environment. We
have to choose only those applications where security is a major concern. If we use all
of them then the Internet of Things will a good solution for many problems. For
addressing we may use IPv6 as it can connect up to 26 billion devices. The non IP
interfaces can also be connected to the Internet with the help of the gateways.
Plan
Deploy
Manage
Monitor
& Detect
Remediate
Dispose
To protect the devices we can use Code signing and run-time protection.
Cryptographically ensure code hasn‟t been tampered after being “signed” as safe for
the device, it can be done at “application” and “firmware” levels. All critical devices
should be configured to only run signed code and never run unsigned code. Be sure
malicious attacks don‟t overwrite code after it is loaded. OS hardening, lockdown,
white listing, sandboxing, network facing intrusion prevention, behavioral and
reputation based security, including blocking, logging, and alerting .Many chipmakers
already build “secure boot” capabilities into their chips. Open-source, and client-side
libraries like OpenSSL can be used to check signatures of code. Challenge is
“managing the keys,” and “controlling access to the keys” for code signing and
protection of embedded software. Some Cas offer hosted services that make it easy to
safely and securely administer code-signing. Sign and update individual blocks or
chunks of updates and not force anyone to sign entire monolithic images, or even an
entire binary file. Software signed at the block or chunk levels can enable updates to
be done with much finer granularity without sacrificing security and without having
to sacrifice the battery for security. When the devices are reverse engineered,
vulnerabilities are discovered and exploited, they need to be patched as quickly as
For Data at Rest Encryption, protect information in case of device theft/loss. For
Data in Transit Confidentiality, Integrity, Authentication is required. For Data in Use
Trusted execution environment, Trust Zone- ARM is used. For Data Loss Prevention
Sensitive data not to be distributed outside of the user base or network.
Facilities should have adequate physical security such as security guards, access
cards, visitor logs, CCTV cameras, secure zones, etc. for preventing unauthorized
access. Appropriate security mechanisms should be leveraged for isolating sensitive
information bearing segments such as IDS/IPS, firewalls, network ACLs, etc. Service
provider should obtain and produce assurance certifications such as ISO 27001
SSAE/ISAE SOC reports, privacy seals, etc. Allow only strong authentication (e.g.
MFA) for remote access to privileged users like administrators, clinicians,
maintenance personnel for logging in securely from outside the company network.
Usage of secure communication channels such as VPNs-S2S, C2S for regular
employees accessing the company network from branch offices or outside locations
and disabling that access when no longer needed .
IoT security is complicated by the fact that many „things‟ use simple processors
and operating systems that may not support sophisticated security approaches.
Awareness is required in the public about IoT security challenges and the proposed
solutions. We are thinking to enhance the security policies for the IoT communication
so that an attacker may not have a chance to do attacks.
5 References