TheSecurity Problems Relating to IOT
Thesecurity problems relating to IOT in the disciple
Internetof Things (IOT) has been a critical subject research for close to adecade now IOT has examined how physical objects are connected toexisting technologies. However, IOT functional ability has not beenwithout challenges its operation faces various limitations which cansometimes pose a threat.
Thispaper examines the challenges and security problems relating to theapplicability of IOT. IOT is network system where the real worldsystem and real-time system interact. It involves machine to machinecommunication, deployment of context as well as the use ofsubscriptions. It is through this kind of system that it has made itpossible for most devices to operate unattended for an extendedperiod with the aid of wireless area network (WAN) or WLAN. ThoughIOT has provided an immediate improvement in areas of socialefficiency, it also created a similar set of the new problemsespecially concerning the privacy and the information security (Jiang& ShiWei, 2010). The security issue of IOT affects areas offront-end sensor and equipment, network and back-end of IT system.
Frontend sensor and computer system
Throughthis kind of threat, the front end sensor, and equipment receive datavia the built-in sensor. It is from this that the data is transmittedto the module hence achieving the network service of the multiplesensors. However, since the module operates with an absence ofmonitoring scenarios this expose it to certain problems likeunauthorized access to the tags. Due to weaker authenticationmechanism in the various system of IOT, it is usually presented toease access by anyone without authorization. The intruder can easilyread data or can even quickly delete the data. (Uttarkar &Kulkarni, 2014)
Additionally,IOT is prone to tag cloning. Since most tags are in different andvisible data can easily be traced, modified and easily captured bycyber criminals who can easily create a replica of tag thuscompromising the authenticity where one cannot differentiate betweenthe original and the fake tags.
Mostof the IOT systems are wireless hence they can easily be attacked,and the confidential information leaked. The password can easily bestolen thus making the system vulnerable to attackers (Khoo, 2011).
Inmost of the IOT set up, it uses the wireless system as a platform tobroadcast attackers can quickly capitalize on this weakness bycreating false information on the system and assume the originalityof the system hence this make it vulnerable a lot.
Networkplays a very significant role in IOT operation it provides theinterconnection capability as well as thriftiness of its connectionplus the authentic quality of service of IOT. However, since themachine is sending data to network elements, data congestion areinevitable. Such congestion exposes these platforms to securityproblems such as Sybil attacks. Under Sybil attack, the attackersmanipulate the nodes present multiple identities of a single nodethus resulting to compromising the result hence falsify theinformation relayed (Douceur, 2002).
Besides,IOT is also prone to sinkhole attack, where the attacker alter thenode so that they look attractive hence allowing all data to flowfrom one particular node to the compromised node leading to packetdrop .i.e., the system is manipulated to perceive the data as beingretrieved from the other side. Sinkhole makes the system to consume alot of energy hence causing DoS attack.
Thesensor is a node in any wireless network powered by batteries whichdo not possess good life. This often makes the system to suffer asleep routine so as to extend the life of the IOT. However, sleeproutine attack usually makes the node to be awake hence leading tomore battery consumption hence minimizing the lifetime of the batteryresulting to shutdown of the system (Bhattasali et al., 2012).
Anotherproblem that faces IOT is flooding of the network with uselesstraffic by an attacker hence leading to exhaustion of the targetsystem making the system to lose credibility to other users.
SinceIOT backbone of operation is a node, usually it very easy for theattacker compromise the node by injecting malicious code which inturn create the system to completely shut down or giving the attackeropportunity to have full control of the network (Priyanka, 2011).
Anysystem which operates on the network is exposed to none authorizedparty taking control over it or even monitors its operation. It canallow the intruder to control the private communication between twoparties. These cyber criminals can easily fake the identity a personand communicate to the other party regularly hence gaininginformation of the targeted individual.
Finally,the last security concern in IoT is its effectiveness on the back endof the system. Here, the back-end IT system forms the gateway,middleware which contains high-end security requirement andgathering. Back-end IT system examines the sensor data in a real-timeor pseudo real-time hence increasing the overall businessintelligence. This business intelligence usually is pegged on theseven primary standards. However, all these are exposed tounauthorized access, Dos attack or invent insider tampering with thedata for personal benefit or the benefit of the 3rd party.
Inconclusion, therefore, it is critical to note that even though IoTplays an important role in various technologies, it presentschallenges that can have adverse implications if not well managed.
Jiang,D., & ShiWei, C. (2010). A Study of Information Security for M2Mof IoT," The3rd Advanced Computer Theory and Engineering International Conferencepp.576-579
Uttarkar,R., & Kulkarni, R. (2014). "Internet of Things: Architectureand Security," in InternationalJournal of Computer Application,Volume 3, Issue 4
Khoo,B. (2011) The RFID as an Enabler of the Internet of Things in areasof Security and Privacy within IEEE. International Conferences onInternet of Things, and Cyber, Physical and Social Computing(ICIOTCPSC)
Douceur,J. (2002). Sybil Attack, within Peer-to-Peer Systems, pp. 251-260.
Bhattasali,T., Sanyal, S., & Chaki, R. (2012). The Sleep Prevention AttackDetection in Wireless Sensor Network. InternationalJournal of Computer Applications,Volume 40, Number 15
Priyanka,S., & Chavhan, N. (2011). The False Data Detection in WirelessSensor Network with Secure Communication.InternationalJournal of Smart Sensors and AdHoc Networks (IJSSAN),Volume-1, Issue-1