0% found this document useful (0 votes)
24 views17 pages

Seminar. Chali Vs Dibora

Uploaded by

chalimitiku803
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views17 pages

Seminar. Chali Vs Dibora

Uploaded by

chalimitiku803
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

MIZAN TEPI UNIVERSITY

TEPI CAMPUS
SCHOOL OF COMPUTING AND INFORMATICS
DEPARTMENT OF INFORMATION SYSTEMS

SEMINAR REPORT

ON

IOT APPLICATION AND SECURITY CHALLENGE

STUDENT NAME ID
CHALO MITIKU NSR/0466/13
DIBORA ENDALU NSR/0562/13

Submitted to:prof Govardhan

Submission date:08/05/2013
IOT APPLICATION AND SECURITY CHALLENGE

Table of Contents
List of figure..................................................................................................................................................i
1. INTRODUCTION.......................................................................................................................................1
2.INTERNET OF THINGS (IOT)......................................................................................................................2
3.CHARACTERISTICS OF INTERNET OF THINGS (IOT)...................................................................................2
4.APPLICATIONS OF INTERNET OF THINGS (IOT).........................................................................................5
5. SECURITY CHALLENGES FACING IOT......................................................................................................10
6.SECURITY CHALLENGES OF IOT APPLICATIONS.......................................................................................12
7. CHALLENGE ADVANTAGE AND DISADVANTAGE OF APPLICATION AND SECURITY...............................13
7.1 ADVANTAGE OF APPLICATION IOT AND SECURITY..........................................................................13
7.2.DISADVANTAGE OF APPLICATION IOT AND SECURITY....................................................................13
8. CONCLUSION.........................................................................................................................................14
9. REFERENCES..........................................................................................................................................15

List of figure
Figure 1 connected health...........................................................................................................................6
Figure 2 smart city.......................................................................................................................................7
Figure 3 connected car................................................................................................................................7
Figure 4 smart city.......................................................................................................................................8
Figure 5 smart farming................................................................................................................................9
Figure 6 smart retail.................................................................................................................................10

Seminar paper i
IOT APPLICATION AND SECURITY CHALLENGE

Abstract:

The Internet of Things (IoT) revolutionized the global network comprising of


people, smart devices, intelligent objects, information, and data.
It is no secret that as more and more devices connect to the internet, the challenges of securing
the data that they transmit and the communications that they initiate are becoming more
profound.
Over the years, we have seen a surge in IoT devices, broadly in 2 areas – in homes and in
manufacturing.
With the former, we have seen an entire ecosystem built around Amazon's Echo devices using
the Alexa Voice Service.
Google, Microsoft, and Apple have followed suit as well.
Since these are independent and closed platforms, the responsibilities of securing the devices rest
with the platform providers.
In this paper, we highlights cyber security in manufacturing and related industries.
Industries such as manufacturing, oil & gas, refining, pharmaceuticals, food &
beverage, water,treatment, and many more are constantly looking to add the right layers of
security, as they bring an increasing number of equipment and devices online.
Device manufacturers and plant operations managers constantly face pressure to protect their
physical assets from cyber threats.
Moreover, for each of these industries, the nature of the data, topologies of IoT devices, and
complexities of threat management and ensuring compliance vary widely.
Keywords-- Internet of Things, Cyber-attack, Security threats.

Seminar paper ii
IOT APPLICATION AND SECURITY CHALLENGE

1. INTRODUCTION
The recent rapid development of the Internet of Things(IoT) and its ability to offer different
types of services have made it the fastest growing technology, with huge impact on social life
and business environments.
Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are
becoming pervasive.
Their success has not gone unnoticed and the number of threats and attacks against IoT devices
and services are on the increase as well.
The Internet of Things (IoT) is an idea that could radically alter our relationship with technology.
The promise of a world in which all of the electronic devices around us are part of a single,
interconnected network was once a thing of science fiction.
IoT devices are no longer a niche market.
They have started to move from our workspaces into our (smart) homes, where IoT devices
are expected to have the most significant impact on our daily lives.
Most smart home devices will be benign, everyday appliances like kettles and toasters.
Even if these devices are hacked and compromised, short of ruining your breakfast, there’s not a
lot a hacker can do to cause you grief.
The market is currently focusing on the vertical domains of IoT since it is in relatively early
phases of development.
But IoT cannot be treated as a single thing, or single platform, or even a single technology.
Plant and energy optimization, health and safety control and security management are now
increasingly being provided by advanced sensors, networked with sophisticated microcomputers.
Exponential improvement in digital infrastructure and the next generation of IoT enabled
products could further lead the growth of the financial sector, with innovations, such as smart
wearable and smart monitoring devices, helping customers to keep better track of their money
and investments.

Seminar paper 1
IOT APPLICATION AND SECURITY CHALLENGE

While the possibilities of these new technologies are mind-boggling, they also reveal severe IoT
cybersecurity challenges.
In this paper discussed various security challenges in IOT.
The main contribution of this paper is to provide an overview of the current state of IoT security
challenges

2.INTERNET OF THINGS (IOT)


The internet of things, or IoT, is a system of interrelated computing devices, mechanical and
digital machines,objects, animals or people that are provided with unique identifiers (UIDs) and
the ability to transfer data over a network without requiring human-to-human or human
to computer interaction a thing in the internet of things can be a person with a heart monitor
, a farm animal with a biochip transponder, an automobile that has built in sensors to alert
the driver when tire pressure is low or any other natural or man-made object that can be assigned
an IP address and is able to transfer data over a network.
Increasingly, organizations in a variety of industries are using IoT to operate more efficiently,
better understand customers to deliver enhanced customer service, improve
decision making and increase the value of the business .
The internet of things (IoT) is a computing concept that describes the idea of everyday physical
objects being connected to the internet and being able to identify themselves to other devices.
The term is closely identified with RFID as the method of communication, although it
also may include other sensor technologies, wireless technologies or QR codes.

3.CHARACTERISTICS OF INTERNET OF THINGS (IOT)


Some most popular characteristics of Internet of things are:
a. Intelligence
b. Connectivity
c. Dynamic Nature
d. Enormous scale
e. Sensing
f.Heterogeneity
g.security

Seminar paper 2
IOT APPLICATION AND SECURITY CHALLENGE

a.Intelligence

IoT comes with the combination of algorithms and computation, software & hardware that
makes it smart.
Ambient intelligence in IoT enhances its capabilities which facilitate the things to respond in an
intelligent way to a particular situation and supports them in carrying out specific tasks.
Together algorithms and compute (i.e. software & hardware) provide the “intelligent spark” that
makes a product experience smart.
b.Connectivity

Connectivity empowers Internet of Things by bringing together everyday objects.


Connectivity of these objects is pivotal because simple object level interactions contribute
towards collective intelligence in IoT network.
It enables network accessibility and compatibility in the things.
Connectivity in the IoT is more than slapping on a WiFi module and calling it a day.
Connectivity enables network accessibility and compatibility.
Accessibility is getting on a network while compatibility provides the common ability to
consume and produce data.
c.Dynamic Nature

The primary activity of Internet of Things is to collect data from its environment, this is achieved
with the dynamic changes that take place around the devices.
The state of these devices change dynamically, example sleeping and waking up, connected
And or disconnected as well as the context of devices including temperature, location and speed.
d. Enormous scale

The number of devices that need to be managed and that communicate with each other will be
much larger than the devices connected to the current Internet.
The management of data generated from these devices and their interpretation for application
purposes becomes more critical.
The number of devices that need to be managed and that communicate with each other will be at
least an order of magnitude larger than the devices connected to the current Internet.
.
Seminar paper 3
IOT APPLICATION AND SECURITY CHALLENGE

e.Sensing

IoT wouldn’t be possible without sensors which will detect or measure any changes in the
environment to generate data that can report on their status or even interact with the
environment.
Sensing technologies provide the means to create capabilities that reflect a true awareness of the
physical world and the people in it.
The sensing information is simply the analogue input from the physical world, but it can provide
the rich understanding of our complex world .
f.Heterogeneity

Heterogeneity in Internet of Things as one of the key characteristics.


Devices in IoT are based on different hardware platforms and networks and can interact with
other devices or service platforms through different networks.
IoT architecture should support direct network connectivity between heterogeneous networks.
The key design requirements for heterogeneous things and their environments in IoT are
scalabilities, modularity, extensibility and interoperability.
g. Security

IoT devices are naturally vulnerable to security threats.


As we gain efficiencies, novel experiences, and other benefits from the IoT, it would be a
mistake to forget about security concerns associated with it.
There is a high level of transparency and privacy issues with IoT.
It is important to secure the endpoints, the networks, and the data that is transferred across all of
it means creating a security paradigm.

4.APPLICATIONS OF INTERNET OF THINGS (IOT)


Some useful applications of Internet of Things (IOT) are:

Seminar paper 4
IOT APPLICATION AND SECURITY CHALLENGE

a.Connected Health
b.Smart City
c.Connected Cars
d.Smart Home
e.Smart Farming
f.Smart Retail

a.Connected Health (Digital Health/Tele health/Telemedicine


IoT has various applications in healthcare, which are from remote monitoring equipment to
advance & smart sensors to equipment integration.
It has the potential to improve how physicians deliver care and also keep patients safe and
healthy.
Healthcare IoT can allow patients to spend more time interacting with their doctors by which it
can boost patient engagement and satisfaction.
From personal fitness sensors to surgical robots, IoT in healthcare brings new tools updated with
the latest technology in the ecosystem that helps in developing better healthcare.
IoT helps in revolutionizing healthcare and provides pocket-friendly solutions for the patient and
healthcare professional.

Figure 1 connected health

Seminar paper 5
IOT APPLICATION AND SECURITY CHALLENGE

Connected healthcare yet remains the sleeping giant of the Internet of Things applications.
The concept of connected healthcare system and smart medical devices bears enormous potential
not just for companies, but also for the well-being of people in general.
Research shows IoT in healthcare will be massive in coming years.
IoT in healthcare is aimed at empowering people to live healthier life by wearing connected
devices

b. Smart City
Smart city is another powerful application of IoT generating curiosity among world’s population.
Smart surveillance, smarter energy management systems, automated transportation, water
distribution, urban security and environmental monitoring all are examples of internet of things
applications for smart cities.
IoT will solve major problems faced by the people living in cities like pollution, traffic
congestion and shortage of energy supplies etc. Products like cellular communication enabled
Smart Belly trash will send alerts to municipal services when a bin needs to be emptied.

Figure 2 smart city

By installing sensors and using web applications, citizens can find free available parking slots
across the city.
Also, the sensors can detect meter tampering issues, general malfunctions and any installation
issues in the electricity system.

Seminar paper 6
IOT APPLICATION AND SECURITY CHALLENGE

c. Connected Cars
A connected car is a vehicle which is able to optimize its own operation, maintenance as well as
comfort of passengers using onboard sensors and internet connectivity.
Most large auto makers as well as some brave startups are working on connected car solutions.
Major brands like Tesla, Apple, and Google are working on bringing the next revolution in
Automobiles

Figure 3 connected car

Connected car technology is a vast and an extensive network of multiple sensors, antennas,
embedded software, and technologies that assist in communication to navigate in our complex
world.
These requirements will become even more critical when humans give up entirely the control of
the steering wheel and brakes to the autonomous or automated vehicles that are being
successfully tested on our highways right now.
D . Smart Home
Smart Home has become the revolutionary ladder of success in the residential spaces and it is
predicted Smart homes will become as common as smartphones Whenever we think of IoT
systems, the most important and efficient application that stands out every time is Smart Home
ranking as highest IOT application on all channels.
Wouldn’t you love if you could switch on air conditioning before reaching home or switch off
lights even after you have left home? Or unlock the doors to friends for temporary access even
when you are not at home.

Seminar paper 7
IOT APPLICATION AND SECURITY CHALLENGE

Figure 4 smart city

Smart Home products are promised to save time, energy and money. With Smart home
companies like Nest, Ecobee, Ring and August, to name a few, will become household brands
and are planning to deliver a never seen before experience

e. Smart Farming
Smart farming is an often overlooked IoT application.
However, because the number of farming operations is usually remote and the large number of
livestock that farmers work on, all of this can be monitored by the Internet of Things and can
also revolutionize the way farmers work.
Smart farming has the potential to become an important application field specifically in the
Agricultural product exporting countries.

Seminar paper 8
IOT APPLICATION AND SECURITY CHALLENGE

Figure 5 smart farming

f. Smart Retail
Retailers have started adopting IoT solutions and using IoT embedded systems across a number
of applications that improve store operations such as increasing purchases, reducing theft,
enabling inventory management, and enhancing the consumer’s shopping experience.
Through IoT physical retailers can compete against online challengers more strongly.
They can regain their lost market share and attract consumers into the store, thus making it easier
for them to buy more while saving money

Figure 6 smart retail

IoT provides an opportunity to retailers to connect with the customers to enhance the in-store
experience.
Smartphones will be the way for retailers to remain connected with their consumers even out of
store.
Interacting through Smartphones and using Beacon technology can help retailers serve their
consumers better.

5. SECURITY CHALLENGES FACING IOT


IoT security is the protection of Internet of Things devices from attack.

Seminar paper 9
IOT APPLICATION AND SECURITY CHALLENGE

While many business owners are aware that they need to protect computers and phones with
antivirus, the security risks related to IoT devices are less well known and their protection is too
often neglected.
Internet of Things devices are everywhere.
From cars and fridges to monitoring devices on assembly lines, object around us are increasingly
being connected to the internet.
While consumer IoT devices allow lifestyle benefits, businesses are quickly adopting IoT
devices due to high potential for savings.
a.Data Integrity
Billions of devices come under the umbrella of an interlinked ecosystem that is connected
through IoT. Manipulating even a single data point will result in manipulation of the entire data
which is exchanged and shared back and forth from the sensor to the main server.
b.Encryption Capabilities
Data encryption and decryption is a continuous process.
The IoT network’s sensors still lack the capability to process.
The brute force attempts can be prevented by firewalls and segregating the devices into separate
networks.
c. Privacy Issues
IoT is all about the exchange of data among various platforms, devices, and consumers.
The smart devices gather data for a number of reasons, like, improving efficiency and
experience, decision making, providing better service, etc.; thus, the end point of data shall be
completely secured and safeguarded.
d. Automation
Eventually, enterprises will have to deal with more and more number of IoT devices.
This enormous amount of user data can be difficult to manage.
The fact cannot be denied that it requires a single error or trespassing a single algorithm to bring
down the entire infrastructure of the data

e.Updations
Managing the update of millions of devices needs to be adhered to, respectively.

Seminar paper 10
IOT APPLICATION AND SECURITY CHALLENGE

Not all the devices support over the air update and hence it requires manually updating the
devices.
One will need to keep a track of the available updates and apply the same to all the varied
devices.
This process becomes time-consuming and complicated and if any mistake happens in the
process than this shall lead to loopholes in the security later.
Security Investment in securing infrastructure and network should be the first priority, which is
not the case now.
IoT involves the use of millions of data points and each point should be secured.
Indeed, the need is for the multi-layer security, i.e., security at each and every level. From end
point devices, cloud platforms, embedded software to web and mobile applications that leverage
IoT (Internet of Things), each layer should be security intact. With the set of heterogeneous
devices, security becomes complex.

6.SECURITY CHALLENGES OF IOT APPLICATIONS


1. Data Privacy: IoT applications collect and transmit sensitive data, making them vulnerable
to cyberattacks and data breaches.
2. Device Security: IoT devices are often connected to the internet and lack adequate security
measures, making them easy targets for hackers.
3. Network Security: IoT applications rely on network connectivity, making them
susceptible to network-based attacks such as DDoS attacks.
4. Lack of Standardization: There is a lack of standardization in IoT security protocols,
making it difficult to ensure consistent security across devices and networks.
5. HumanError:Human error, such as weak passwords or failure to update software, can
compromise the security of IoT applications.

Seminar paper 11
IOT APPLICATION AND SECURITY CHALLENGE

7. CHALLENGE ADVANTAGE AND DISADVANTAGE OF APPLICATION AND


SECURITY

7.1 ADVANTAGE OF APPLICATION IOT AND SECURITY

1. Improved Efficiency: IoT applications can automate processes, reduce manual


intervention, and increase productivity, leading to improved efficiency.
2. Cost Savings: IoT applications can help businesses save money by reducing operational
costs, improving asset utilization, and optimizing supply chains.
3. Enhanced Customer Experience: IoT applications can provide customers with
personalized experiences and real-time insights, leading to increased satisfaction and loyalty.
4. Better Decision Making: IoT applications can provide businesses with real-time data
insights, enabling better decision-making and informed strategic planning.
5. Increased Safety: IoT applications can enhance safety in industries such as
manufacturing, healthcare, and transportation by monitoring equipment and detecting potential
hazards.

7.2.DISADVANTAGE OF APPLICATION IOT AND SECURITY


The disadvantage of IoT applications is that they can be expensive to implement and require
significant investment in hardware, software, and infrastructure.
Additionally, IoT devices may have limited battery life or connectivity issues, which can affect
their reliability.

The security challenges of IoT applications include data privacy, device security, network
security, lack of standardization, and human error.
These challenges can lead to cyber attacks, data breaches, and other security incidents that can
compromise the integrity and availability of sensitive information.

Seminar paper 12
IOT APPLICATION AND SECURITY CHALLENGE

8. CONCLUSION
The IoT framework is vulnerable to attacks at each layer.
Therefore, there are many security threats and requirements that need to be dispatched.
Current state of research in IoT is mainly concentrated on authentication and access control
protocols, but with the rapid growth of technology it is essential to consolidate new networking
protocols like IPv6 and 5G to achieve the progressive mash up of IoT topology The main
emphasis of this chapter was to highlight major security issues of IoT particularly, focusing the
security attacks and their countermeasures.
Due to lack of security mechanism in IoT devices, many IoT devices become soft targets and
even this is not in the victim’s knowledge of being infected.
In this chapter, the security requirements are discussed such as confidentiality, integrity, and
authentication, etc.
In this paper, different applications of IOT are discussed.
We hope this paper will be useful to researchers in the security field by helping identify the
major issues in IoT security and providing better understanding of the threats and their attributes
originating from various intruders like organizations and intelligence agencies.

This Research paper is original and not published in any conferences or in any journal.

Seminar paper 13
IOT APPLICATION AND SECURITY CHALLENGE

9. REFERENCES
R.Vignesh and 2A.Samydurai ans1 Student, 2Associate Professor Security on Internet of Things
(IOT) with Challenges and Countermeasures in 2017 IJEDR | Volume 5, Issue 1 | ISSN: 2321-
9939.
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of computation, vol. 48, 203-209,1987.
J.-Y. Lee, W.-C.Lin, and Y.-H. Huang, "A lightweight authentication protocol for internet of
things," in Int'l Symposium on Next-Generation Electronics (ISNE), 1-2, 2014.
Y. Xie and D. Wang, "An Item-Level Access Control Framework for Inter-System Security in
the Internet of Things," in Applied Mechanics and Materials, 1430-1432, 2014.
B. Anggorojati, P. N. Mahalle, N. R. Prasad, and R. Prasad, "Capability-based access control
delegation model on the federated IoT network," in Int'l Symposium on Wireless Personal
Multimedia Communications (WPMC), 604-608, 2012.
M. Castrucci, A. Neri, F. Caldeira, J. Aubert, D. Khadraoui, M. Aubigny, et al., "Design and
implementation of a mediation system enabling secure communication among Critical
Infrastructures," Int'l Journal of Critical Infrastructure Protection,
vol. 5,86-97, 2012.

Seminar paper 14

You might also like