NIT6130 Assignment 1 - Literature Review Title of the project: IOT based smart home device security and privacy Name Student ID Table of Contents Abstract2 Literature Review – Broad Scan and...

1 answer below »
Just check both the files and let me know


NIT6130 Assignment 1 - Literature Review Title of the project: IOT based smart home device security and privacy Name Student ID Table of Contents Abstract2 Literature Review – Broad Scan and Reading3 Round 13 Round 27 Round 313 Literature Review – Focused Reading18 Article 118 Article 219 Article 320 Proposed Research22 References24 Appendix26 Abstract As IoT (Internet of Things) is getting popular day by day also they are the main important element of the information architecture. Everything including smart homes, city, and health. The main aim of this research is to know about IoT based security devices and improve their security and privacy. In twenty to begin with century, we all are subordinate on the IoT based gadgets in our day by day schedule and all the gadgets are online. So it can cause a major security concern. The strategy utilized demonstrate based on (IFTTT) and they planned against following plot confirmed by both the parties. There will be developed a secure approach for the IoT based smart home device through the machine learning and cloud computing security Literature Review – Broad Scan and Reading Round 1 1) In this research, I have focused on IoT for the initial phase of keywords. Majorly these devices are used for smart homes, smart city, etc. 2) Keywords used - IoT, Smart Cities, IOT based Devices Resource Database - IEEE Digital Library No. of Results: 601 (2014-2019) Journal List S.N. Title Author Year Conference / Journal Title 1 Security and privacy issues for an IoT based smart home Dimitris Geneiatakis; Ioannis Kounelis; Ricardo Neisse; Igor Nai-Fovino; Gary Steri; Gianmarco Baldini 2017 International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2 Internet of Things (IoT) of Smart Home: Privacy and Security Ahmad Ashari Zaied Shouran Tri Kuntoro Priyambodo 2019 International Journal of Computer Applications 3 Security and privacy issues for an IoT based smart home Gianmarco Baldini Igor Nai Fovino Ioannis Kounelis Gary Steri Ricardo Neisse Dimitris Geneiatakis 2017 International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 4 A smart-phone based privacy-preserving security framework for IoT devices Mihai Togan; Bogdan-Cosmin Chifor; Ionuţ Florea; George Gugulea 2017 International Conference on Electronics, Computers and Artificial Intelligence 5 Blockchain for IoT security and privacy: The case study of a smart home Ali Dorri; Salil S. Kanhere; Raja Jurdak; Praveen Gauravaram 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) 6 Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoTNetworks Daemin Shin; Vishal Sharma; Jiyoon Kim; Soonhyun Kwon; Ilsun You 2017 IEEE Access 7 MidSecThings: Assurance Solution for Security Smart Homes in IoT Richardson Andrade; Nelson Rosa 2019 International Symposium on High Assurance Systems Engineering 8 Fog Based Architecture Design for IoT with Private Nodes: A Smart Home Application Aykut Kanyilmaz; Aydin Cetin 2019 International Istanbul Smart Grids and Cities Congress and Fair 9 Vigilia: Securing Smart Home Edge Computing Rahmadi Trimananda; Ali Younis; Bojun Wang; Bin Xu; Brian Demsky; Guoqing Xu 2018 IEEE/ACM Symposium on Edge Computing 10 Privacy-aware IoT cloud survivability for future connected home ecosystem Abdullahi Arabo 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications 11 Network-level security and privacy control for smart-home IoT devices Vijay Sivaraman; Hassan Habibi Gharakheili; Arun Vishwanath; Roksana Boreli; Olivier Mehani 2015 International Conference on Wireless and Mobile Computing, Networking, and Communications 12 Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme Qiuyun Lyu; Ning Zheng; Huaping Liu; Can Gao; Si Chen; Junliang Liu 2019 IEEE Access 13 An analysis of malicious threat agents for the smart connected home Joseph Bugeja; Andreas Jacobsson; Paul Davidsson 2017 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) 14 Tyche: A Risk-Based Permission Model for Smart Homes Amir Rahmati; Earlene Fernandes; Kevin Eykholt; Atul Prakash 2018 IEEE Cybersecurity Development (SecDev) 15 A secure scheme for a smart house based on Cloud of Things (CoT) Bashar Alohali; Madjid Merabti; Khasif Kifayat 2014 Computer Science and Electronic Engineering Conference (CEEC) 16 Exploring Security and Authentication Issues in Internet of Things L Prathibha; Kaleem Fatima 2018 International Conference on Intelligent Computing and Control Systems (ICICCS) 17 Device-Free Occupant Activity Sensing Using WiFi-Enabled IoT Devices for Smart Homes Jianfei Yang; Han Zou; Hao Jiang; Lihua Xie 2018 IEEE Internet of Things Journal 18 Encryption and hash-based security in the Internet of Things B. Vinayaga Sundaram; Ramnath M.; Prasanth M.; Varsha Sundaram J. 2015 International Conference on Signal Processing, Communication and Networking (ICSCN) 19 Security analysis of Internet-of-Things: A case study of august smart lock Mengmei Ye; Nan Jiang; Hao Yang; Qiben Yan 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 20 Security Weaknesses and Attacks on the Internet of Things Applications Zeyad Mohammad; Thaer Abu Qattam; Kholoud Saleh 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) 3) As after reviewing 20 research papers based on IoT based smart home device security and privacy. I have found that majorly people are using IoT devices like smart lock, voice controller, etc. in their daily lives. Also, security is main concerned for the people using it For research’s in future the keywords which may be used are as follow: IoT based devices, IOT smart cities, challenges in IoT 4) New keyword derived can be - blockchain and IoT, smart devices security 5) Most suitable article Paper 1: Security and privacy issues for an IoT based smart home S.N. Title Author Year Conference / Journal Title 1 Security and privacy issues for an IoT based smart home Dimitris Geneiatakis; Ioannis Kounelis; Ricardo Neisse; Igor Nai-Fovino; Gary Steri; Gianmarco Baldini 2017 International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) Abstract According to the author with the increase in the use of the IoT based devices in the homes regularly there is also an increase in the security as well as the privacy threat to their lives.And author analyzed the different scenarios for the privacy and the security issues for the user of the devices. With increased in IoT in our lives there are problems of security and privacy. IoT has applications in payment sector, automobiles, heart monitoring, etc (Geneiatakis et al., 2017). Paper 2: Internet of Things (IoT) of Smart Home: Privacy and Security S.N. Title Author Year Conference / Journal Title 2 Remotely Access “My” Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme Qiuyun Lyu; Ning Zheng; Huaping Liu; Can Gao; Si Chen; Junliang Liu 2019 IEEE Access Abstract In this research according to the author the use of devices which are smart or we can say the smart home-based device is creating the security and privacy threats for the users. Though there are some components which address the different threats due to limited Capabilities these devices are vulnerable for all. IoT is widely used in our lives (Lyu et al., 2019). Round 2 1) Keywords -IoT based homes, IoT devices, blockchain, smart devices security Resource database- springer No of results – 198 (2012 -19) 2) Journal List S.N. Title Author Year Conference / Journal Title 1 Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review Mohammed Talal, A. A. Zaidan, B. B. Zaidan, A. S. Albahri 2019 Journal of Medical Systems 2 Smart hardware hybrid secure searchable encryption in the cloud with IoT privacy management for smart home system Hua Liu, Guo Chen, Yanting Huang 2019 Cluster Computing 3 Review: Security and Privacy Issues of Fog Computing for the Internet of Things (IoT) Binara N. B. Ekanayake, Malka N. Halgamuge 2018 Cognitive Computing for Big Data Systems Over IoT 4 Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home Jason R. C. Nurse, Ahmad Atamli 2016 HAS: International Conference on Human Aspects of Information Security, Privacy, and Trust 5 Research on Sensor-Gateway-Terminal Security Mechanism of Smart Home Based on IoT Fei Li, Zhou Wan, Xin Xiong, Jiajun Tan 2012 Internet of Things 6 i-SHSS: An IoT Based Smart Home Security System Saurabh Singh, Pradip Kumar Sharma 2017 International Conference on Future Information Technology International Conference on Multimedia and Ubiquitous Engineering 7 An Experimental Framework for Investigating Security and Privacy of IoT Devices Ali Tekeoglu, Ali Şaman Tosun 2017 International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments 8 A Review and Costing of Lightweight Authentication Schemes for the Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home Applications Attlee M. Gamundani, Amelia Phillips 2018 International Conference on Security and Privacy in Communication Systems 9 Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways Lei Yang, Chris Seasholtz, Bo Luo, Fengjun Li 2018 European Symposium on Research in Computer Security 10 Privacy Mining from IoT-Based Smart Homes Ming-Chang Lee, Jia-Chun Lin, Olaf Owe 2019 International Conference on Broadband and Wireless Computing, Communication and Applications 11 Enabling Consumer Trust Upon Acceptance of IoT Technologies Through Security and Privacy Model Wazir Zada Khan Mohammed Y AalsalemMuhammad Khurram KhanQuratulain Arshad 2016 Advanced Multimedia and Ubiquitous Engineering 12 Security and Attack Vector Analysis of IoT Devices Marc CapellupoJimmy LiranzoMd Zakirul Alam BhuiyanEmail authorThaier HayajnehGuojun Wang 2017 International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage 13 IoT Security and Privacy Labels Yun Shen Pierre-Antoine Vervier 2019 Annual Privacy Forum 14 Location Privacy in Smart Cities Era Raed Al-Dhubhani Rashid MehmoodIyad KatibAbdullah Algarni 2018 International Conference on Smart Cities, Infrastructure, Technologies and Applications 15 Beyond the Hype: Internet of Things Concepts, Security and Privacy Concerns Amit Kumar Tyagi Rekha. Sreenath 2019 International Conference on Emerging Trends in Engineering 16 SPAINChain: Security, Privacy, and Ambient Intelligence in Negotiation Between IOT and Blockchain Mohamed A. El-dosuky Gamal H. Eladl 2019 World Conference on Information Systems and Technologies 17 Securing the Smart Home via a Two-Mode Security Framework Devkishen Sisodia Samuel MergendahlJun LiHasan Cam 2018 International Conference on Security and Privacy in Communication Systems 18 Semantic IoT Gateway: Towards Automated Generation of Privacy-Preserving Smart Contracts in the Internet of Things Faiza Loukil Chirine Ghedira-GueganKhouloud BoukadiAïcha Nabila Benharkat 2018 OTM Confederated International Conferences "On the Move to Meaningful Internet Systems" 19 Human-Centric Security and Privacy for the IoT Using Formal Techniques Florian Kammüller 2017 International Conference on Applied Human Factors and Ergonomics 20 Security over Smart Home Automation Systems: A Survey Jhonattan J. Barriga A Sang Guun Yoo 2018 International Conference of Research Applied to Defense and Security 3) As after investigating 20 research papers based on IOT based shrewd domestic gadget security and privacy. I have found that majorly individuals are utilizing IOT gadgets like a keen bolt, voice controller, etc. in their everyday lives. Also security is fundamental concerned for the individuals utilizing it. Significantly increment within utilize of the IoT based keen gadgets. As the coin moreover has 2 sides. These gadgets moreover have both sides, they have focal points but too there are negative sides as well that's security and protection concerns. For future research, the set of keywords - security concerns for IoT devices, Smart grids 4) New keywords derived - cyber-attacks for IoT systems
Answered Same DaySep 25, 2021NIT6130

Answer To: NIT6130 Assignment 1 - Literature Review Title of the project: IOT based smart home device security...

Jayageetha answered on Sep 29 2021
145 Votes
Securing IoT devices with Blockchain solutions
Name,
Student ID
1. Abstract
    Internet of Things (IoT) [1] is the new buzz word in the field of Information Technology. IoT is interconnecting two or more smart devices, installed with sensors, through certain protocols so as to send or receive information in between them. This exchange of information does not require human interaction and hence it we call them smart devices. Since IoT handle a lot of data which are sensitive, privacy is the major problem and hence its penetration into information sensitive areas is still miles away. The more the term is appealing, the more is the concern over its commitment to confidentiality of information. One possible approach is to implement the blockchain technology in addressing the security issues. A block chain technology [2] in which informat
ion is stored in the form of blocks and each block contains a personal hash and a hash of the previous block. This hash entry makes it almost impossible to change the sequence of the blocks and hence are not vulnerable to attacks or duplications. The paper will define the solutions to the security threats posed by IoT with the help of block chain technology, the emergence of which has a positive gesture towards a threat-free inter connectivity of devices.
2. Introduction
Internet of Things is a sizzling and appealing topic of discussion. The smartly fabricated technology puts its face off when it comes to answering security questions. For an IoT, privacy is to be maintained at all its layers, particularly at the network layer and the application layer. Since both these layers are susceptible to information thefts, security cannot be compromised. There is a lot of research on how to enhance the security of IoT over these layers, for the threats which may be categorized into low, intermediate and high severities. Though regular security checks like node authentication, strong communication protocols, cloud audits, CSA standards, anti-virus software, etc., are present at each level, there seems to be an overall slip in securing the data from the expected level. This is because of the large size of IoT, its heterogenetic characteristic and the inability to feed the huge resource requirement. But on the bright side, there have been innovations towards a possible security implementation. These include, introducing cryptographic techniques for authentication, capability-based access control, using digital certificates for access issues, light weight authentication protocol, etc., All these are a definite move towards a meaningful improvement in confidentiality. But what they lack is the necessary infrastructure, since they eat up more CPU space and battery to be implemented. Yet, to make all these efforts fruitful, a more innovative technique has to be used. It is called the block chain technology, where every information is split and sent across the network and one block has information about its previous block. Here tampering the chain’s continuity is nearly impossible. The report holds vital information about how block chain technology gives solution to the security threats IoT faces. Even though there are areas needed to be researched under the block chain technology like, its high power of computation and scalability, the technology on the whole is promising.
3. Related work
Researchers are keen about the emerging technology, IoT since it drives us towards living a smart life by building smart homes, smart travels, smart hospitals, etc., To understand the security issues related to using IoT, researches first tried to understand its architecture, separate it by layers and see what more can be done to which layer where information is found to have spoofed. Technically, IoT has four layers viz., Physical layer, Network layer, Support layer and Application layer. Among these, the most susceptible layers are the network and application layers. Hence researches focussed on important changes to be implemented at this level to enhance security of information put across the internet. Though many technologies and healthy communication protocols are readily available for satellite and mobile networks, the problems of spoofing, sybil attacks, routing attacks, eavesdropping, denial of service are still not being handled to the needed extent. Apart from this, the application layer is also prone to spyware attacks, malware attacks, phishing problems, and other authentication and key stroke thefts.
The existing papers report on possible solutions to these problems. They include different approaches at different levels of IoT. The authors Ferrag M.A., Maglaras L.A., Janicke H., Jiang J., Shu L., [3] in their research paper, “Authentication protocols for Internet of Things: A comprehensive survey”, demonstrated a list of protocols operable for IoT. They put them into 4 categories namely: Internet of Energy, Machine-to-Machine Communication, Internet of Sensors and Internet of Vehicles. This segregation provided a lead for further study. Following this, the authors, Wu Z.Q., Zhou Y.W., Ma J.F. A, [4] proposed the usage of Object Naming service (ONS) to ask the DNS (Domain name server) to look for an information, given that either its IP address or product ID is known. This method ensured anonymity and the usage of less likely to decipher encryption technologies.
The authors, Ning, Liu and Yang, differently approached the perception/physical layer of IoT and focussed on the critical data collection [5]. In their view, unit IoT is critical in the perception layer and that data is processed in the application layer, which shares the collected ubiquitous information. In order to provide real time security checks, their research was further progressed by authors, Rao, Newe, and Grout by implementing an encrypted technology imbibed hash function called, Secure Hash Algorithm (SHA-3) [6]. This technique later got to be known for its flexibility in reconfiguration and hence suitable for any IoT application for that matter.
All these researches focussed on IoT at different levels. Segregating the layers was a major move forward, which helped look at security issues in a more specific way. This approach is different the traditional approaches which included physical layer approaches and providing infrastructure related solutions. All these did not help overcome the security level issues which showed their heads in the layers to come, the network and the application layer.
Based on the above study, one significant success is the achievement of the encryption technology. Now there are many such cryptographic technologies which prove to be secured. Proven examples include, attribute-based encryption (Key policy and cipher text policy), certificate-based authentication system, elliptic curve cryptography, advance encryption standard (AES), symmetric key cryptographic algorithms, digital certificates and signatures, etc., [7] All these technologies are highly secured but are highly power eating and use a lot of CPU energy and battery. Since IoT is a large chain of network, there is always a problem of resource crunch. With this in hand, cryptographic technologies may not always prove efficient. In the same way, using keys or certificates for authentication also gives a lot of traffic to the network and overloads it. This technique is also to be studied deeper for effective solutions in handling IoT’s large network.
Hence there is always for a scope for improvement in assuring the strictest possible security when handling IoT of large networks. What comes closer is the concept of Block chain technology. It is a registry of nodes, distributed across the connected networks. It is completely decentralized. There are special nodes called miners. These miners solve a puzzled node and add it to a block and hence form a block chain. Each block is unique and carries its information as well as a tag to the previous node. Hence, they are completely non-modifiable and immutable.
Thus, the block chain technology can be used in implementing IoT, which will very easily solve the so far discussed security concerns. Any communication through the block chain technology can be assured for swiftness and trust. They are completely safe from phishing and other cyber threats because, in a block chain technology, building a block is easy but undoing it is close to impossible. This remarkable feature makes it a safe option for utilizing in...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here