SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1555
A Study on Smart Way for Securing IoT Devices
Thrisha V.S1, Dr.Anitha T.N2
1M. Tech Student, Dept. of CS&E, S J C Institute of Technology, Chickballapur
2Professor & Head, Dept. of CS&E, S J C Institute of Technology, Chickballapur
------------------------------------------------------------------------***-------------------------------------------------------------------------
Abstract - Usage of Internet has been widelyincreasedinday-
to-day life. Most of the human activities are done through
internet in which the transfer of informationfromoneplace to
another place is also done through internet. The information
which we send from one device to another device is not been
secured. To provide security to all IOT devices, functioning of
security management should be done in a proper way.
Currently security enabled model is developed to secure end-
to-end communication in IOT environment. To overcome all
these security problems in IOT devices a well secured solution
is required. This paper deals with various different techniques
which is used to secure IOT devices.
Key Words: IoT, GSM, RPL, RFID.
1. INTRODUCTION
The amount of persons associated to internet is growing
day-by-day and in the similar entity is also happening to all
the strategies that are linked to internet to discuss the data
and to cooperate with each other. Due to the massive
increase in the population of the world, the usage of smart
devices has also been increased. According to the current
situation more than 100 countriesarelinkedto exchangethe
data opinions through internet. This huge usage of internet
by many people lead to a new problem called security. The
safety administration of IoT policies isachiefproblem which
we are facing in now-a-days. Hackers can attack and get the
information easily due to decrease inthesecuritylevel ofIoT
devices.
IoT is a generous type of Worldwide System that is used to
attach various things that comprises of smart machines,
environmental objects and infrastructures and Radio
Frequency Identification (RFID).
IoT devices are beneficial for many of the actual creation of
applications and amenities and it can alsobeappliedtobuild
a small residence. In future, the major functioning of IoT is
done through IoT. Wireless sensor networks, actuator
networks and vehicular networks play a major role in the
field of industry.
These devices has its applications in many areas like
Industries, Educational Institutions, Hospitalsetc.Thismass
usage of IoT devices in different areas leads to security
problem where many techniques have been applied to
collect, analyze and understand the problem.
1.1 Volume:
It is an extreme task in Bio-Diversity. Thevarietyofsuchsort
of material conservational information therapeutic
information or data and commercial evidence. Facebook or
Instagram, for example products of 500 terra bytesofdata is
utilized in each day and it is recognizedfromthedescription,
the unpackaged counts. We cannot set any of the boundaries
for the and it does not comprise any sort of data.
1.2 Velocity:
As it is stated in the previous filling to multiplicity and
intricacy of the data structure, if more swiftness and large
data is additionally joined, then the operation becomes a
thought-provoking work. Speed is the another feature in
which it is contested. The allowance of high-velocity figures
is more stimulating.
2. RELATED WORKS
[1] Security Model for IoT based devices, in this paper
writer advises a safety model in which the IoT supports the
characteristics for protecting the data from unauthorized
access. Initially perception layer is the main source for
collection of data and all the real time data is thus collected
by Radio Frequency Identification Devices(RFID) and each
layer of IoT structure face challenges for providing security
and privacy. In this security model we also have a massive
foundation of fog computing and storage which helps in
managing the administration of fog objects.
[2] A survey on IoT security challenges, in this paper author
propose challenges for random access mechanisms to
protect IoT devices. The two mainly used mechanisms are
overlapped contention and segmented contention. The
overlapped contention contains twolayersupperbound and
the lower bound in which windowscanshareall thenodesin
zero level which is determined as lower bound. In
segmented contention, Upper bound is the better way to
share all the nodes. The proposed mechanismsareanalyzed,
implemented and evaluated on linux based testing and NS3
simulator.
[3] Security on IoT and its smart Appliances, in this paper
author proposes an idea to provide security for smart
appliances. This can be achieved when the appliances are
connected to MCU/embedded system processor with an
unique ID. Global System for Mobile Communication (GSM)
is also provided to control messageorinformationdisplayed
without showing the location of the user. Further open
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1556
wireless skill such as Bluetooth, Wi-Fi and also the
telephonic information facilities and also embedded sensor
and actuator nodes are made to use in keen appliances.
[4] Ongoing challenges and research opportunities, in this
paper author proposes different challenges and
opportunities given to secure IoT devicesinwhichoneof the
important challenge is technology challenge. By using
advanced technology many people hack the devices to get
information which is keptconfidentiallyandhackingprocess
has become common in many of the private companies and
government agencies. Therefore security should be
increased in these fields to avoid hackers and apart from
these Artificial intelligence, security and privacyarethenew
challenging aspects of IoT devices. Research opportunities
are provided to improve connectivity, architecture and
robustness in all IoT devices.
[5] Effectl ofl IoTl newl featuresl onl securityl andl privacyl,
in this paper author proposes newly introduced features on
security and privacy which developed a great effect on IoT
devices. Intrusionl Detectionl system(IDS)l and Intrusionl
Preventionl Systeml(IPS)l models are used to defend
dissimilar kinds of campaigns at the similar time that are
mostly based on heterogeneous IoT devices and these are
mainly used in the detection of traffic network.IfIoTdevices
are light-weight in size then they will not have memory
management unit(MMU), so Memoryl Isolationl Addressl
Spacel Layoutl Randomizationl(ASLR)l and other security
actions cannot be unswervingly deployed on these
diplomacies. It is a tough mission for the researches to
deploy much multifaceted encryption and authentication
algorithms on minute IoT devices.
[6] Security analysis of Big Data on IoT, in this paper writer
suggests the working of safety and communication in IoT by
using Big Data which contains high volumes of data. The
information system which is based on IoT initially collects
the information from the sensors, RFIDs and other smart
devices to store them in the memory and get processed in
the servers with high ultra strength and power. Google and
Amazon companies support these powerful servers. The
important analysis done between IoT and Big Data is
congregation the environmental data, GIS and stargazing
through the wireless sensors of IoT policies.
[7] Security Issues in IoT, in this paper author proposes a
mechanism to protect personal information. Personal
Medical Devices(PMDs) are used to know the present
condition of the patient. These PMDs contains wireless
interface which is used for communication purposes and to
read status of the device, medical reports and also to update
the status. Personal information can also be stored in smart
homes where all smart devices are connected to internet
environment and then smart home services contains digital
services which can efficiently communicate with each other
by using Internet Protocol(IP) addresses.
[8] A Review on Security in IoT, in this paper author
proposes different layers in which all IoT device scan be
secured. The basic layer is the perception layer(recognition
layer) which is used to recognize the security problem in a
particular device which helps to collect all types of
information by using physical equipment which includes
RFID reader, different sensors GPS etc. The transmission of
information, classification, processing is done through
network layer. For improving the ability to recognize the
problem support layer is used. Data sharing is one of the
most important aspect in application layer and ton solve the
protection problem in application layer authentication and
privacy protection is used where Advanced Encryption
Standard(AES) algorithm is used to maintainconfidentiality.
[9] A Surveyl ofl Securityl challengesl in IoT, in this paper
author proposes abouttheincompatibility whichisa original
contest facing aspects of IoT distressing numerous zones
mainly in the field of security where Privacy Enhancing
Technologies(PET) is developed to attain confidentiality
areas which include Virtual Private Networks(VPN)
Transportl Layerl Securityl(TLS)l and Peer-to –Peerl(P2P)l.
In Order to investigate the safety problems in a better way,
IoT is divided into different layerssuchasdevices,Gateways,
and applications/services. A usual group ofsensorsformthe
network named as “Sensor Network” which helps in the
interaction of devices and Internet Protocol(IP) is used in a
wider range for addressing in IoT.
[10] Design Challenges on Security of IoT systems, in this
paper author proposes Computer Aided Design(CAD)
technique to provide security for IoT devices in which CAD
variable is present for optimization of schemes with a huge
quantity of powerfully cooperatingmachineriesandthis sort
of functioning occurs internally in many of the significant
evolving schemes such as information centers and podiums.
The main aim is to provide hardwarebased security whichis
suitable to answer all the requirements of IoT security and
also to provide efficient solutions to solve many unsolved
problems of cryptography in which one of the problem is
security problem.
Table -1: COMPARISON OF DIFFERENT TECHNOLOGIES
SL
No
Technology Advantage Disadvantage
1 RFID
High level
security, quick
response
Cost effective,
low range
coverage
2 NS3
Simulator
Improves the
network
performance
Problem occurs
due to large
scale devices
3
Embedded
processor,
GSM
Open source,
queries are
answered
quickly
High cost,
requires more
staff
4
Artificial
Intelligence
Efficiency is
improved, low
Storage is
expensive
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1557
error rate
5 IDS,IPS
High level
protection
Low latency
6 Big Data
High volumes of
information is
stored
Light-Weight
devices are not
processed
7 PMD,IP
Data
authentication,
end-to-end
protection
Loss of services,
physical security
risk
8 RFID,GPS
High security,
easy installation
Low speed
9 Network
sensors
Organizing
capability, high
scalability
Risk in securing
Wi-Fi network
10
Ultrasonic
sensors
Can sense all
materials
Highly sensitive
to external
environment
3. CONCLUSION
In this paper we have discussed different techniques to
secure IoT devices. The best and shortest solution which we
have obtained to solve the problem of securityinIoTdevices
is providing security enabled model to secure end-to-end
communication in IoT environment. Apart from this various
solutions have been provided to solve different security
issues.
REFERENCES
1. Z. Safdar, S. Farid, M. Pasha, K. Safdar, “ A Security
Model for IoT based Systems” in Technicall Journall,
Universityl ofl Engineeringllandll Technologyl(UET)
Taxilal, Pakistanl vol.22l No. 4-2017l ISSN:1813l-
1786l(print) l2313l-7770l(online)ll
2. Shubhalika Dihulial, Tanveer Farooquil, “ A Surveyl
onl IoT Securityl Challengesl” in Internationall
Journall of /.mputer Appliancesl(0975-8887)
volumel 169 – No.4, July 2017l
3. Vandanal Sharmal, Ravil Tiwari “ Securityl on IoTl
and itsl Smartl Appliancesl” in Internationall
Journall of Sciencel, Engineering andl Technologyl
Researchl(IJSETR), volume 5, Issue 2, February
2016l
4. Sachinl Upadhyayl “Ongoingl Challengesl andl
Researchl Opportunitiesl” in Internationall Journall
ofl Engineeringl Technologiesl andl Managementl
Research,5(2:SE),216-222l.
DOL:10.6281/Zenodo.1195065l
5. Wei Zhoul, Yuqingl Zhangl, Pengl Liul “Effectl ofIoTl
newl featuresl onl securityl and privacyl” in The
Collegel of Information Sciences and Tcehnology,
Thel Pennsylvanial Statel Universityl,PA16802,USA
6. Saeedl Banaeianl Farl,Azadehl Imanil Radl “Security
analysisl of Bigl Datal onl IoTl” in IEEEl
transactionsl in Industriall informaticsl 12.3(2016):
1232-1242l
7. Mirzal Abdurl Razzaql, Muhammadl Alil Qureshil,
Sajidl Habibl Gilll, Saleeml Ullahl “Securityl Issuesl
inl IoTl” inl (IJASCA)l Internationall Journall ofl
Advancedl Computerl Sciencel andl Appliancesl,
volumel 8, No.6,2017l
8. Huil Suol, Jiaful Wanl, Caifengl Zoul, Jianqil Liu “A
Reviewl onl Securityl in IoTl” in 2012l Intenationall
Conferencel onl Computerl Sciencel andl
Electronicsl Engineeringl
9. Anassl Sedratil, Abdellatifl Mezriouil “A Surveyl of
Securityl Challengesl in IoTl” in Advancesl in
Sciencel, Technologyl andl Engineeringl Systemsl
Journall volume 3l, No 1,274-280(2018)l
10. Teng Xul, Jamesl Bl Wendtl, Miodragl Potkonjakl
“Designl Challengesl on Securityl of IoTl Sytemsl”in
IEEEl Journall onl Selectedl Areasl in
Communicationsl, volume 24, No2,381-394(2014)l

Weitere ähnliche Inhalte

Was ist angesagt?

A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
Aki Koivu
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
 

Was ist angesagt? (19)

A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
Internet of Things Forensics
Internet of Things ForensicsInternet of Things Forensics
Internet of Things Forensics
 
General Overview of IOT Empower Technology
General Overview of IOT Empower TechnologyGeneral Overview of IOT Empower Technology
General Overview of IOT Empower Technology
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Lecture 16
Lecture 16Lecture 16
Lecture 16
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
 

Ähnlich wie IRJET - A Study on Smart Way for Securing IoT Devices

INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
vrickens
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
Samir SEHIL
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 

Ähnlich wie IRJET - A Study on Smart Way for Securing IoT Devices (20)

Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
sample assignment
sample assignmentsample assignment
sample assignment
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
A Study on Internet of Things
A Study on Internet of ThingsA Study on Internet of Things
A Study on Internet of Things
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
Security Issues in IoT-Based Environments
Security Issues in IoT-Based EnvironmentsSecurity Issues in IoT-Based Environments
Security Issues in IoT-Based Environments
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Privacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor networkPrivacy-aware secured discrete framework in wireless sensor network
Privacy-aware secured discrete framework in wireless sensor network
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Kürzlich hochgeladen (20)

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 

IRJET - A Study on Smart Way for Securing IoT Devices

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1555 A Study on Smart Way for Securing IoT Devices Thrisha V.S1, Dr.Anitha T.N2 1M. Tech Student, Dept. of CS&E, S J C Institute of Technology, Chickballapur 2Professor & Head, Dept. of CS&E, S J C Institute of Technology, Chickballapur ------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract - Usage of Internet has been widelyincreasedinday- to-day life. Most of the human activities are done through internet in which the transfer of informationfromoneplace to another place is also done through internet. The information which we send from one device to another device is not been secured. To provide security to all IOT devices, functioning of security management should be done in a proper way. Currently security enabled model is developed to secure end- to-end communication in IOT environment. To overcome all these security problems in IOT devices a well secured solution is required. This paper deals with various different techniques which is used to secure IOT devices. Key Words: IoT, GSM, RPL, RFID. 1. INTRODUCTION The amount of persons associated to internet is growing day-by-day and in the similar entity is also happening to all the strategies that are linked to internet to discuss the data and to cooperate with each other. Due to the massive increase in the population of the world, the usage of smart devices has also been increased. According to the current situation more than 100 countriesarelinkedto exchangethe data opinions through internet. This huge usage of internet by many people lead to a new problem called security. The safety administration of IoT policies isachiefproblem which we are facing in now-a-days. Hackers can attack and get the information easily due to decrease inthesecuritylevel ofIoT devices. IoT is a generous type of Worldwide System that is used to attach various things that comprises of smart machines, environmental objects and infrastructures and Radio Frequency Identification (RFID). IoT devices are beneficial for many of the actual creation of applications and amenities and it can alsobeappliedtobuild a small residence. In future, the major functioning of IoT is done through IoT. Wireless sensor networks, actuator networks and vehicular networks play a major role in the field of industry. These devices has its applications in many areas like Industries, Educational Institutions, Hospitalsetc.Thismass usage of IoT devices in different areas leads to security problem where many techniques have been applied to collect, analyze and understand the problem. 1.1 Volume: It is an extreme task in Bio-Diversity. Thevarietyofsuchsort of material conservational information therapeutic information or data and commercial evidence. Facebook or Instagram, for example products of 500 terra bytesofdata is utilized in each day and it is recognizedfromthedescription, the unpackaged counts. We cannot set any of the boundaries for the and it does not comprise any sort of data. 1.2 Velocity: As it is stated in the previous filling to multiplicity and intricacy of the data structure, if more swiftness and large data is additionally joined, then the operation becomes a thought-provoking work. Speed is the another feature in which it is contested. The allowance of high-velocity figures is more stimulating. 2. RELATED WORKS [1] Security Model for IoT based devices, in this paper writer advises a safety model in which the IoT supports the characteristics for protecting the data from unauthorized access. Initially perception layer is the main source for collection of data and all the real time data is thus collected by Radio Frequency Identification Devices(RFID) and each layer of IoT structure face challenges for providing security and privacy. In this security model we also have a massive foundation of fog computing and storage which helps in managing the administration of fog objects. [2] A survey on IoT security challenges, in this paper author propose challenges for random access mechanisms to protect IoT devices. The two mainly used mechanisms are overlapped contention and segmented contention. The overlapped contention contains twolayersupperbound and the lower bound in which windowscanshareall thenodesin zero level which is determined as lower bound. In segmented contention, Upper bound is the better way to share all the nodes. The proposed mechanismsareanalyzed, implemented and evaluated on linux based testing and NS3 simulator. [3] Security on IoT and its smart Appliances, in this paper author proposes an idea to provide security for smart appliances. This can be achieved when the appliances are connected to MCU/embedded system processor with an unique ID. Global System for Mobile Communication (GSM) is also provided to control messageorinformationdisplayed without showing the location of the user. Further open
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1556 wireless skill such as Bluetooth, Wi-Fi and also the telephonic information facilities and also embedded sensor and actuator nodes are made to use in keen appliances. [4] Ongoing challenges and research opportunities, in this paper author proposes different challenges and opportunities given to secure IoT devicesinwhichoneof the important challenge is technology challenge. By using advanced technology many people hack the devices to get information which is keptconfidentiallyandhackingprocess has become common in many of the private companies and government agencies. Therefore security should be increased in these fields to avoid hackers and apart from these Artificial intelligence, security and privacyarethenew challenging aspects of IoT devices. Research opportunities are provided to improve connectivity, architecture and robustness in all IoT devices. [5] Effectl ofl IoTl newl featuresl onl securityl andl privacyl, in this paper author proposes newly introduced features on security and privacy which developed a great effect on IoT devices. Intrusionl Detectionl system(IDS)l and Intrusionl Preventionl Systeml(IPS)l models are used to defend dissimilar kinds of campaigns at the similar time that are mostly based on heterogeneous IoT devices and these are mainly used in the detection of traffic network.IfIoTdevices are light-weight in size then they will not have memory management unit(MMU), so Memoryl Isolationl Addressl Spacel Layoutl Randomizationl(ASLR)l and other security actions cannot be unswervingly deployed on these diplomacies. It is a tough mission for the researches to deploy much multifaceted encryption and authentication algorithms on minute IoT devices. [6] Security analysis of Big Data on IoT, in this paper writer suggests the working of safety and communication in IoT by using Big Data which contains high volumes of data. The information system which is based on IoT initially collects the information from the sensors, RFIDs and other smart devices to store them in the memory and get processed in the servers with high ultra strength and power. Google and Amazon companies support these powerful servers. The important analysis done between IoT and Big Data is congregation the environmental data, GIS and stargazing through the wireless sensors of IoT policies. [7] Security Issues in IoT, in this paper author proposes a mechanism to protect personal information. Personal Medical Devices(PMDs) are used to know the present condition of the patient. These PMDs contains wireless interface which is used for communication purposes and to read status of the device, medical reports and also to update the status. Personal information can also be stored in smart homes where all smart devices are connected to internet environment and then smart home services contains digital services which can efficiently communicate with each other by using Internet Protocol(IP) addresses. [8] A Review on Security in IoT, in this paper author proposes different layers in which all IoT device scan be secured. The basic layer is the perception layer(recognition layer) which is used to recognize the security problem in a particular device which helps to collect all types of information by using physical equipment which includes RFID reader, different sensors GPS etc. The transmission of information, classification, processing is done through network layer. For improving the ability to recognize the problem support layer is used. Data sharing is one of the most important aspect in application layer and ton solve the protection problem in application layer authentication and privacy protection is used where Advanced Encryption Standard(AES) algorithm is used to maintainconfidentiality. [9] A Surveyl ofl Securityl challengesl in IoT, in this paper author proposes abouttheincompatibility whichisa original contest facing aspects of IoT distressing numerous zones mainly in the field of security where Privacy Enhancing Technologies(PET) is developed to attain confidentiality areas which include Virtual Private Networks(VPN) Transportl Layerl Securityl(TLS)l and Peer-to –Peerl(P2P)l. In Order to investigate the safety problems in a better way, IoT is divided into different layerssuchasdevices,Gateways, and applications/services. A usual group ofsensorsformthe network named as “Sensor Network” which helps in the interaction of devices and Internet Protocol(IP) is used in a wider range for addressing in IoT. [10] Design Challenges on Security of IoT systems, in this paper author proposes Computer Aided Design(CAD) technique to provide security for IoT devices in which CAD variable is present for optimization of schemes with a huge quantity of powerfully cooperatingmachineriesandthis sort of functioning occurs internally in many of the significant evolving schemes such as information centers and podiums. The main aim is to provide hardwarebased security whichis suitable to answer all the requirements of IoT security and also to provide efficient solutions to solve many unsolved problems of cryptography in which one of the problem is security problem. Table -1: COMPARISON OF DIFFERENT TECHNOLOGIES SL No Technology Advantage Disadvantage 1 RFID High level security, quick response Cost effective, low range coverage 2 NS3 Simulator Improves the network performance Problem occurs due to large scale devices 3 Embedded processor, GSM Open source, queries are answered quickly High cost, requires more staff 4 Artificial Intelligence Efficiency is improved, low Storage is expensive
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1557 error rate 5 IDS,IPS High level protection Low latency 6 Big Data High volumes of information is stored Light-Weight devices are not processed 7 PMD,IP Data authentication, end-to-end protection Loss of services, physical security risk 8 RFID,GPS High security, easy installation Low speed 9 Network sensors Organizing capability, high scalability Risk in securing Wi-Fi network 10 Ultrasonic sensors Can sense all materials Highly sensitive to external environment 3. CONCLUSION In this paper we have discussed different techniques to secure IoT devices. The best and shortest solution which we have obtained to solve the problem of securityinIoTdevices is providing security enabled model to secure end-to-end communication in IoT environment. Apart from this various solutions have been provided to solve different security issues. REFERENCES 1. Z. Safdar, S. Farid, M. Pasha, K. Safdar, “ A Security Model for IoT based Systems” in Technicall Journall, Universityl ofl Engineeringllandll Technologyl(UET) Taxilal, Pakistanl vol.22l No. 4-2017l ISSN:1813l- 1786l(print) l2313l-7770l(online)ll 2. Shubhalika Dihulial, Tanveer Farooquil, “ A Surveyl onl IoT Securityl Challengesl” in Internationall Journall of /.mputer Appliancesl(0975-8887) volumel 169 – No.4, July 2017l 3. Vandanal Sharmal, Ravil Tiwari “ Securityl on IoTl and itsl Smartl Appliancesl” in Internationall Journall of Sciencel, Engineering andl Technologyl Researchl(IJSETR), volume 5, Issue 2, February 2016l 4. Sachinl Upadhyayl “Ongoingl Challengesl andl Researchl Opportunitiesl” in Internationall Journall ofl Engineeringl Technologiesl andl Managementl Research,5(2:SE),216-222l. DOL:10.6281/Zenodo.1195065l 5. Wei Zhoul, Yuqingl Zhangl, Pengl Liul “Effectl ofIoTl newl featuresl onl securityl and privacyl” in The Collegel of Information Sciences and Tcehnology, Thel Pennsylvanial Statel Universityl,PA16802,USA 6. Saeedl Banaeianl Farl,Azadehl Imanil Radl “Security analysisl of Bigl Datal onl IoTl” in IEEEl transactionsl in Industriall informaticsl 12.3(2016): 1232-1242l 7. Mirzal Abdurl Razzaql, Muhammadl Alil Qureshil, Sajidl Habibl Gilll, Saleeml Ullahl “Securityl Issuesl inl IoTl” inl (IJASCA)l Internationall Journall ofl Advancedl Computerl Sciencel andl Appliancesl, volumel 8, No.6,2017l 8. Huil Suol, Jiaful Wanl, Caifengl Zoul, Jianqil Liu “A Reviewl onl Securityl in IoTl” in 2012l Intenationall Conferencel onl Computerl Sciencel andl Electronicsl Engineeringl 9. Anassl Sedratil, Abdellatifl Mezriouil “A Surveyl of Securityl Challengesl in IoTl” in Advancesl in Sciencel, Technologyl andl Engineeringl Systemsl Journall volume 3l, No 1,274-280(2018)l 10. Teng Xul, Jamesl Bl Wendtl, Miodragl Potkonjakl “Designl Challengesl on Securityl of IoTl Sytemsl”in IEEEl Journall onl Selectedl Areasl in Communicationsl, volume 24, No2,381-394(2014)l