Security Issues of IoT

Security Issues of IoT

Neha Gupta
Copyright: © 2021 |Pages: 22
DOI: 10.4018/978-1-7998-2414-5.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Wireless communication networks are highly prone to security threats. The major applications of wireless communication networks are in military, business, healthcare, retail, and transportations. These systems use wired, cellular, or adhoc networks. Wireless sensor networks, actuator networks, and vehicular networks have received a great attention in society and industry. In recent years, the internet of things (IoT) has received considerable research attention. The IoT is considered as future of the internet. In the future, IoT will play a vital role and will change our living styles, standards, as well as business models. The usage of IoT in different applications is expected to rise rapidly in the coming years. The IoT allows billions of devices, peoples, and services to connect with others and exchange information. Due to the increased usage of IoT devices, the IoT networks are prone to various security attacks.
Chapter Preview
Top

1.1 Challenges

Beyond costs and the ubiquity of devices, other security issues plague IoT:

  • i.

    Unpredictable Behaviour – The sheer volume of deployed devices and their long list of enabling technologies means their behaviour in the field can be unpredictable. A specific system may be well designed and within administration control, but there are no guarantees about how it will interact with others.

  • ii.

    Device Similarity – IoT devices are fairly uniform. They utilize the same connection technology and components. If one system or device suffers from a vulnerability, many more have the same issue.

  • iii.

    Problematic Deployment – One of the main goals of IoT remains to place advanced networks and analytics where they previously could not go. Unfortunately, this creates the problem of physically securing the devices in these strange or easily accessed places.

  • iv.

    Long Device Life and Expired Support – One of the benefits of IoT devices is longevity, however, that long life also means they may outlive their device support. Compare this to traditional systems which typically have support and upgrades long after many have stopped using them. Orphaned devices and abandon ware lack the same security hardening of other systems due to the evolution of technology over time (Weyrich & Ebert, 2015).

  • v.

    No Upgrade Support – Many IoT devices, like many mobile and small devices, are not designed to allow upgrades or any modifications. Others offer inconvenient upgrades, which many owners ignore, or fail to notice.

  • vi.

    Poor or No Transparency – Many IoT devices fail to provide transparency with regard to their functionality. Users cannot observe or access their processes, and are left to assume how devices behave. They have no control over unwanted functions or data collection; furthermore, when a manufacturer updates the device, it may bring more unwanted functions (Weyrich & Ebert, 2015).

  • vii.

    No Alerts – Another goal of IoT remains to provide its incredible functionality without being obtrusive. This introduces the problem of user awareness. Users do not monitor the devices or know when something goes wrong. Security breaches can persist over long periods without detection.

Top

2. Security Requirements In Iot

All the devices and people are connected with each other to provide services at any time and at any place. Most of the devices connected to the internet are not equipped with efficient security mechanisms and are vulnerable to various privacy and security issues e.g., confidentiality, integrity, and authenticity, etc. For the IoT, some security requirements must be fulfilled to prevent the network from malicious attacks. Here, some of the most required capabilities of a secure network are briefly discussed.

Complete Chapter List

Search this Book:
Reset