IoT Security: Issues, the Best Practices and Open Challenges

[{“box”:0,”content”:”

n

Year : October 30, 2023 | Volume : 01 | Issue : 02 | Page : 8-15

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    Srikanta Kolay, Tryambak Hiwarkar

  1. [/foreach]

    n

n

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Research Scholar, Professor & Dean, Department of Computer Science & Engineering, Sardar Patel University Balaghat, Department of Computer Science & Engineering, Sardar Patel University Balaghat, MP, MP, India, India
  2. n[/if 1175][/foreach]

n

n

Abstract

nThe Internet of Things (IoT) provides the facility to connect different devices and communicate and share information over the internet. The Internet of Things (IoT) has emerged as a transformative and pervasive technological paradigm, revolutionizing how we interact with our environment and infusing intelligence into everyday objects and devices. This interconnected ecosystem has unleashed a wave of innovative applications across diverse domains, including healthcare, transportation, agriculture, industrial automation, and smart cities. However, as the IoT footprint expands rapidly, it also brings to the forefront a multitude of complex and pressing security challenges that demand immediate attention and resolution. One of the primary security concerns in the IoT ecosystem is weak authentication and authorization mechanisms. Insufficient encryption measures can lead to data interception and manipulation, exposing confidential information to potential attackers. The lack of automated update mechanisms leaves numerous IoT devices susceptible to known exploits, necessitating the establishment of efficient update processes. With IoT devices deployed in the physical world, they become susceptible to tampering and theft, requiring robust physical security measures to safeguard their integrity. Standardization of security practices across the diverse IoT ecosystem is necessary to establish a unified and robust security framework. Security awareness and education are critical to empowering users and manufacturers to implement secure practices effectively. By comprehensively understanding and actively mitigating the key security issues, adopting best practices, and collaboratively addressing open challenges, we can forge a safer and more resilient IoT landscape that not only fosters innovation but also preserves user privacy and instills confidence in the trustworthiness of IoT technologies. This paper centers on addressing IoT security concerns and exploring the optimal practices to mitigate them. Finally, we point out open challenges as a scope of future research.

n

n

n

Keywords: IoT, IoT security, data security, data privacy, IoT ecosystem, security challenge, IoT devices

n[if 424 equals=”Regular Issue”][This article belongs to International Journal of Information Security Engineering(ijise)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Information Security Engineering(ijise)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Srikanta Kolay, Tryambak Hiwarkar IoT Security: Issues, the Best Practices and Open Challenges ijise October 30, 2023; 01:8-15

n

How to cite this URL: Srikanta Kolay, Tryambak Hiwarkar IoT Security: Issues, the Best Practices and Open Challenges ijise October 30, 2023 {cited October 30, 2023};01:8-15. Available from: https://journals.stmjournals.com/ijise/article=October 30, 2023/view=0/

nn


nn[if 992 equals=”Open Access”] Full Text PDF[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘ijise’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Kolay S, Hiwarkar T. Evaluation Of The Privacy-Protecting Effects Of Learning-Based Iot Ecosystem Behavior. Journal of Data Acquisition and Processing. 2022;37(5):1873–1883.
  2. Yang Y, Wu L, Yin G, Li L, Zhao H. A survey on security and privacy issues in Internet-of-Things. IEEE Internet of things Journal. 2017 Apr 17;4(5):1250–1258.
  3. Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE internet of things journal. 2017 Mar 15;4(5):1125–1142.
  4. Rajmohan T, Nguyen PH, Ferry N. A decade of research on patterns and architectures for IoT security. Cybersecurity. 2022 Dec;5:1–29.
  5. Moinuddin K, Srikantha N, Lokesh KS, Narayana A. A survey on secure communication protocols for IoT systems. Int. J. Eng. Comput. Sci. 2017 Jul;6(6).
  6. Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L. Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks. 2017 Nov 6;2017.
  7. Fremantle P, Scott P. A survey of secure middleware for the Internet of Things. PeerJ Computer Science. 2017 May 8;3:e114.
  8. Srivastava A, Gupta S, Quamara M, Chaudhary P, Aski VJ. Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects. International Journal of Communication Systems. 2020 Aug;33(12):e4443.
  9. Verma V, Bhatia M. Analysis of Security Measures on the Internet of Things based Applications. In 2022 3rd International Conference on Smart Electronics and Communication (ICOSEC) 2022 Oct 20 (pp. 526–534). IEEE.
  10. da Cunha V, Carvalho V, Machado J, Soares F. Industrial Networks Protocols PROFIBUS and RS485–A Description of the Most Common Problems. InInternational Conference on Reliable Systems Engineering 2022 Aug 26 (pp. 367–374). Cham: Springer International Publishing.
  11. Koul N, Kumar N, Sayeed A, Verma C, Raboca MS. Data exchange techniques for internet of robotic things: Recent developments. IEEE Access. 2022 Sep 26.
  12. Liu Y, Yu W, Rahayu W, Dillon T. An Evaluative Study on IoT ecosystem for Smart Predictive Maintenance (IoT-SPM) in Manufacturing: Multi-view Requirements and Data Quality. IEEE Internet of Things Journal. 2023 Feb 22.
  13. Zhou J, Cao Z, Dong X, Vasilakos AV. Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine. 2017 Jan 19;55(1):26–33.
  14. Sharbaf MS. IoT Driving New Business Model, and IoT Security, Privacy, and Awareness Challenges. In2022 IEEE 8th World Forum on Internet of Things (WF-IoT) 2022 Oct 26 (pp. 1–4). IEEE.
  15. Samaila MG, Neto M, Fernandes DA, Freire MM, Inácio PR. Challenges of securing Internet of Things devices: A survey. Security and Privacy. 2018 Mar;1(2):e20.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

Regular Issue Subscription Review Article

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 01
Issue 02
Received July 20, 2023
Accepted October 10, 2023
Published October 30, 2023

n

n

n

[if 1190 not_equal=””]n

Editor

n

[foreach 1188]n

n[/foreach]

n[/if 1190] [if 1177 not_equal=””]n

Reviewer

n

[foreach 1176]n

n[/foreach]

n[/if 1177]

n

n

n

n function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n n function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]