Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Volume 8, Issue 12, December 2017, pp. 760–767, Article ID: IJMET_08_12_083
Available online at http://www.iaeme.com/IJMET/issues.asp?JType=IJMET&VType=8&IType=12
ISSN Print: 0976-6340 and ISSN Online: 0976-6359
ABSTRACT
Modern embedded systems, IoT devices and mobile systems are highly exposed to
security issues. These devices must be protected from unauthorized access in order to
protect the data regarding the sensitive assets. The high design complexity, aggressive
time–to–market, increase in the computational power of devices are the main causes
for introduction of security attacks, errors, vulnerabilities and security backdoors for
on-field compromising of device. Organizations need to be concerned about security,
which includes theft or loss of mobiles, possible virus infection, possible unauthorized
traffic interception and much more. In the same way the IoT devices allows a huge
number of people, servers and networks to connect mutually and share information.
As the usage of these devices is increasing, the prone to security attacks have also
increased. The IoT devices needed confidentiality, authentication, access control,
integrity in order to prevent some attacks. In this paper, we provide a brief of the
existing security challenges on mobile devices and IoT devices.
Key words: IoT, Security, Privacy,Threats, SDN.
Cite this Article: Mohan Kumar Ch, Neha Shikha, S.L. Sowndarya, N.A. Ramarao,
Comparative Study on Security Threats in Mobiles and IoT Devices, International
Journal of Mechanical Engineering and Technology 8(12), 2017, pp. 760–767.
http://www.iaeme.com/IJMET/issues.asp?JType=IJMET&VType=8&IType=12
1. INTRODUCTION
The term “Internet of Things” means connecting the devices with one another it was
introduced by Kevin Ashton in the year 1982. The word “Things” in IoT can be referred to a
wide variety of devices such as mobile phones, remote, cars, etc. The internet which we called
as World Wide Web is now not only the network of computers but now we connect the
devices together which are able to send and receive the data all over the network created. In
IoT we can connect devices with one another and can create a huge network among them and
the work is done without any human interference. IoT allows the object to sense and control
the network infrastructure, for this we make use of actuators and sensors. With the help of the
IoT system we can embed all our ordinary objects such as household gadgets, remotes, cars to
work for as the IoT system. Basically Internet of Things is a revolution allowing to build
connection among various that we come across in our day to day life and their everyday
interaction with the network with help of no human. We have millions of IoT systems today
and the count is supposed to be 50 billion in the year 2050. The world will be connected over
a network. Now also we are aware of the IoT system in home automation, mobile security,
agricultural irrigation, etc.
Security attack and system vulnerabilities: Framework security for the most part
concentrates on general IoT framework to distinguish distinctive security challenges, to plan
diverse security structures and to give appropriate security rules keeping in mind the end goal
to keep up the security of a system. Framework security essentially concentrates on general
IoT framework to distinguish diverse security challenges, to outline distinctive security
systems and to give legitimate security rules so as to keep up the security of a system.
Application Security works for IoT application to deal with security issues as per situation
necessities. System security manages securing the IoT correspondence organize for
correspondence of various IoT gadgets.
Data privacy and security: A few producers of keen TVs gather information about their
clients to investigate their review propensities so the information gathered by the brilliant TVs
may have a test for information security amid transmission. Information security is likewise
an incredible test. While transmitting information consistently, it is critical to escape watching
gadgets on the web.
Hardware/Software challenges
Security solution for the modern computing devices is the tight coupling between hardware
and software components. Generally the programmable computing systems were built upon
standard hardware architecture like X86, MIPS, SPARC, etc with a standardized publishing
instruction set. These devices are highly complex, programmable and have high computing
power more than a general purpose computer few years back. Many security vulnerabilities
arise because of errors or misconfiguration at the inner face of hardware and software
components. The breach of contact between hardware and software results in such
vulnerabilities, which cannot be detected during hardware or software
Validation and a valid co-robust validation is required to detect such problems.
The key challenge existing is “How can we validate software that is being developed to
execute on a hardware platform whose design itself is undergoing change at the same time?”
to address this issue, current industrial practise includes developing prototypes like
Virtual platforms, an abstract model of the hardware platform
Emulation and FPGA models
Adapting previous generation silicon as a platform for testing the next generation software .
Specification Challenges
Improved efficiency, increased capability to access data anytime or anywhere are advantages
of the highly smart mobiles, but these advantages do not come without shortcomings. The
increase in the user requirements from time-to-time made the mobile devices highly
computable and accessing. New challenges are taking birth while building new features in the
mobiles. These challenges are on both the sides of clients and servers. Some of these
challenges in the mobile devices are:
Theft or loss of the mobile: the personal information stored in the mobile like personal email
messages, personal data could fall into wrong hands.
Unauthorized persons can take advantage of small size and powerful capabilities of mobile
such as storage space and camera functions.
Mobile devices can be easily effected by viruses.
The GPRS/GMS communication protocol can be easliy intercepted to traffic since strong
signal protection is missing.
2. Spreading parameters
3. User mobility models
Avoiding downloads of infected files from the internet, sending and receiving infected
files using Bluetooth devices, using an infected memory card, reacting to the infected files
attached to MMS messages and pairing a device with an infected computer are the preferred
solution to avoid worms regarding transmission channel.
A worm attached to a bluetooth has ability to spread very quickly. To defend this
condition, monitoring points should be located in high traffic a location is suggested as a
solution.
Battery Life
Since now the devices are made small and convenient to handle they don’t have any extra
room for battery. They are made to be light in weight and small in size but this comes as a
challenge in privacy and security in the IoT devices. Because some IoT devices are deployed
in the environment where charging is not available, they have only a limited energy to execute
the designed functionality and may not provide the heavy security that is needed by the
device. The first we can do is to reduce security requirements if it is not too sensitive.
Secondly we can go for the harvest energy from the natural resources like light, wind, heat,
etc. But this approach requires an upgrade to the hardware and also there will high increase in
the cost.
Lightweight computation
The gadgets have restricted memory space so it is somewhat hard to deal with the figuring
and capacity prerequisites of propel cryptography calculations. There is a procedure called
Encrypted Query Processing calculation for IoT. This approach permits to safely store the
encoded IoT data on the cloud, and it underpins proficient database question preparing over
scrambled information. The proposed way to deal with lessen the inactivity for IoT while
playing out the question handling over the scrambled information by applying idleness
concealing procedure, this comprise of breaking the inquiry aftereffects of substantial size
into littler one. This enables the computational work to be performed on the arrangement of
information.
6. CONCLUSIONS
On the premise of the examination, keeping in mind the end goal to avoid physical assault the
gadget should utilize the protected booting by applying a cryptographic hash calculations and
advanced mark to confirm the confirmation and honesty of the product. Another gadget must
validation itself to the system it will use before any transmission or gathering of information.
A gadget should likewise convey a blunder location framework, and all the data that is
conveyed by the gadget must be encoded to keep up the information respectability and
privacy. Validation and point-to-point encryption is utilized to guarantee information
protection and establishing security at arrange layer. The application layer can likewise give
the security by methods for encryption, trustworthiness check, validation that permits just the
verification client to utilize the information and keep the gadget assault free.
7. FUTURE SCOPE
We consider Software Defined Networking (SDN) and Cloud/Edge computing as the
promising technologies to address some of these challenges. SDN provides the capabilities to
configure policies and rules along the whole network in a consistent way. SDN, separating
control and data planes, is vital to enable dynamic access policies (as well as for the
consistency verification and monitoring tasks). Integrating the mentioned enabling
technologies, our architecture is composed of six layers: the device layer, the access network
layer, the access control layer, the core network layer, the core control layer, and the
application layer. Being SDN controlled, this network is not intended to be fully centralized.
However, we resort to a hierarchical design to overcome the complexity of a single control
level in this highly scalable network. Besides, IoT (along with 5G) is depicted to be the
“nervous system” of the digital society. Thus, we tried in this architecture to imitate the
human nervous system, which is composed of two levels of control: central (brain and spinal
cord) and peripheral (network of nerves), to build an architecture characterized by a
hierarchical control design.
REFERENCES
[1] Ruchika Thukral, Gulshan Kumar, Ankit Gupta, Nilesh kumar Verma, Shivanchal
Asthana, Microcontroller Based Solar Power Inverter . International Journal of Electrical
Engineering & Technology, 7(5), 2016, pp. 70–78.
[2] J. S. Kumar and D. R. Patel, “A survey on internet of things: Security and privacy issues”
International Journal of Computer Applications, vol. 90, no. 11, 2014.
[3] S. Yoon, H. Park, and H. S. Yoo, “Security issues on smart home in iot environment," in
Computer Science and its Applications. Springer, 2015, pp.691-696.
[4] Y. H. Hwang, “Iot security & privacy: threats and challenges,” in Proceedings of the 1st
ACM Workshop on IoT Privacy, Trust, and Security. ACM, 2015, pp. 1–1.
[5] S. Singh and N. Singh, “Internet of things (iot): Security challenges, business
opportunities & reference architecture for e-commerce,” in Green Computing and Internet
of Things (ICGCIoT), 2015 International Conference on. IEEE, 2015, pp. 1577–1581.
[6] “A Survey on Security for Mobile Devices” Mariantonietta La Polla, Fabio Martinelli, and
Daniele Sgandurra.
[7] A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “Survey of Mobile Malware in
the Wild,” 2011.
[8] Norton, “Norton Mobile Security Lite,” 2011.
[9] Techie Buzz, “Android Data Theft Vulnerability Detailed,” 2011.
[10] BullGuard Ltd, “BullGuard Mobile Security 10,” 2011.
[11] I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: behavior-based malware
detection system for Android,” in Proceedings of the 1st ACM workshop on Security and
privacy in smartphones and mobile devices, ser. SPSM ’11. New York, NY, USA: ACM,
2011, pp. 15–26.
[12] Ashlesha A. Patil and Dr. S. R. Suralkar. Review on -IOT Based Smart Healthcare
System. International Journal of Advanced Research in Engineering and Technology,
8(3), 2017, pp 37–42.
[13] Venkata Siva Rao. A, M. Srinivasa Rao and K. Push pa Rani, Shrewd Street Dividers
Driven By IOT Technology, International Journal of Civil Engineering and Technology,
8(7), 2017, pp. 385–389.
[14] Hariharr C Punjabi, Sanket Agarwal, Vivek Khithani, Venkatesh Muddaliar and
Mrugendra Vasmatkar , Smart Farming Using IoT , International Journal of Electronics
and Communication Engineering and Technology , 8(1), 2017 , pp. 58–66.
[15] S. Nithya, Lalitha Shree, Kiruthika and Krishnaveni, Solar Based Smart Garbage
Monitoring System Using IOT, International Journal of Electronics and Communication
Engineering and Technology, 8(2), 2017, pp. 75–80.