Downloads Brochure Fz25
Downloads Brochure Fz25
Things
Areej Mohyudin Syeda Kisa Naqvi Osama Sohail Talha Naqash
Department of Department of Department of Department of
Computer Science Computer Science Computer Science Computer Science
Bahria University Bahria University Bahria University Bahria University
Islamabad, Pakistan Islamabad, Pakistan Islamabad, Pakistan Islamabad, Pakistan
[email protected] [email protected] [email protected] [email protected]
Abstract
Privacy breaching attacks are the major concern in the intelligent and are being used in industries, transportation,
development and deployment of Internet of Things (IoT) education and medicine which leads to the arise of security
based applications. Recent advancements tend to collect the concerns of data protection and privacy. There have been
data and store them using sensors-based systems, IoT, data many researches on the collection of data and statistics
analytics, cloud computing which are making possible to
collect data more efficiently and effectively. However, such
which were based on sensors-based systems, IoT, data
collection of data requires security for the connected devices. analytics and cloud computing. The major concern for all
Overabundance of data increases the number of connected the people now is that their data is not secure. The
devices and concern for security. In this paper a remedy is challenge is to make sure that the intelligent connected
proposed to make the devices protected enough for not to be objects are secure and reliable. The communication using
intruded by unauthorized users and attacks when using the these objects is protected in uncontrolled environment.,
Internet of Things (IoT) devices. communication between these devices are confidential and
Keywords—Cloud computing, Internet of Things, the users are authenticated while connected to the device,
Encryption, Decryption, Cipher Text. services and data without compromising their privacy.
There are many IoT based devices which lack efficient
I. INTRODUCTION encryption methods. Many companies implemented the IoT
in their systems, later they discovered that the text they
Everything in the current era is connected to the internet. were sending was plaintext and it was easily possible for
There has never been a world which is connected as the any intruder to capture the data. It was bad news for the
world today. Internet of things (IoT) is to connect objects of organization because their data was confidential and anyone
the internet, which further monitors and exchanges the data could have captured their data and analyzed it without them
with each other without involving any human effort. knowing. Lack of confidentiality is a major concern for all
According to a research, it is expected that in 2020, 50 the organizations and after the advancements in IoT, cyber-
billion objects will be connected and the number is already attacks have increased dramatically. Internet of things (IoT)
generated to 400 zettabytes. [11] Data protection is uses various cameras, RFID equipment, GPS, capturing
particularly difficult in internet-based devices. As it has behavior of humans and their physical signs which includes
become an essential part in every field. For example, heath blood pressure, pulse, disease etc. Gathering information is
care devices there are applications which are being increasing with respect to the advancement in IoT. [12]
deployed into the market which gives details about the Internet of Things (IoT) is a recent technology that
patient A device is launched into the market to monitor permits the users to connect anywhere, anytime,
patient at daily basis which is a small chip and is placed anyplace and to anyone. [8]
under the skin. Such devices are useful for regulating
patients and to give them first aid as soon as possible.
There is a wide use of IoT based devices which are
Fig1.1 Devices connected in IoT
The major concern in the IoT is the middle man for hardware systems to avoid data from being
attack that any intruder can bring his device that hacked. Internet of things is an evolution for the
can sniff the internet packets and extract the user’s development era. Like any other system it has
personal information using tools like Wireshark. issues and threats that can be overcome by various
We have discussed how we can secure the IoT methods and techniques discussed in this paper
system using the local database and DES including [6] enabling sensors, data owner to
algorithm. On the other hand, we have shown assess the privacy of data sharing. This technique
concern on the login system for the user. For more is generic scheme and can be adapted to different
security it is mandatory for the user to at least use type of time-series pair of sensors data-based
12 characters and it must be in upper case and applications. [7] Privacy aware software
lower case. The password also uses some special engineering is continuously aiming to become
characters and at least one number digit. The more critical for IoT based systems. Cryptographic
we add digits to the password, it will make it more protocols and Engineering of software applications
difficult for the middle man to attack. lowercase = are sensitive and critical subject for privacy
26, uppercase = 26, special character =8 number = assurance. A solution to prevent from attackers
10. If the password is mixed and is set using these and hackers we need to make sure to store our data
60 character’s combinations. [10] It will not be an on local servers using the Blocked chain (DES)
easy task for the intruder to break the password. algorithm which will help encrypting the storage
from cloud based to local servers. Further we will
IV. CONCLUSION allow user to use his password in a unique way,
Internet of Things (IoT) involves the enormous that is by filling the missing digits. Any
amount of applications that are being used in combination of user’s password will grant him
modern era making the objects and things smart. access to his credentials.
IoT based systems are its users are increasing Intelligent interface and integrated system into a
rapidly and there are a lot of people who are network of information is the base. Privacy,
developing such system for their use. In this paper security and safety is the biggest challenge for
we have discussed privacy and control with Internet of things. [8] Radio frequency
respect to data encryption, software engineering Identification technique and the related
technologies makes the concept of IoT feasible Trends (CAST), International Conference on (pp. 294-
and trust worthy. The main concept of this 299). IEEE.
technology is to provide self-aware/ self- [9] Kakanakov, N., & Shopov, M. (2017, May). Adaptive
autonomous devices with smart environment. The models for security and data protection in IoT with Cloud
future of Internet of things lies within technologies. In 2017 40th International Convention on
authorization/authentication to the culture of Information and Communication Technology, Electronics
hundreds and thousands of devices forming a and Microelectronics (MIPRO) (pp. 1001-1004). IEEE.
network around the globe. [10] Sohail, O., & Naqash, T. (2018, April). Anti-theft cloud
application for android operating system (Nougats).
REFERENCES In 2018 IEEE International Conference on Applied
System Invention (ICASI) (pp. 321-324). IEEE.
[1] Abomhara, M., & Køien, G. M. (2014, May). Security
[11] Nzabahimana, J. P. (2018, May). Analysis of security and
and privacy in the Internet of Things: Current status and
privacy challenges in Internet of Things. In 2018 IEEE
open issues. In Privacy and Security in Mobile Systems
9th International Conference on Dependable Systems,
(PRISMS), 2014 International Conference on (pp. 1-8).
Services and Technologies (DESSERT) (pp. 175-178).
IEEE.
IEEE.
[2] Vermesan, O., Friess, P., Guillemin, P., Sundmaeker, H.,
[12] Lu, X., Li, Q., Qu, Z., & Hui, P. (2014, October). Privacy
Eisenhauer, M., Moessner, K., ... & Cousin, P. (2013).
information security classification study in internet of
Internet of things strategic research and innovation
things. In Identification, Information and Knowledge in
agenda. RIVER PUBLISHERS SERIES IN
the Internet of Things (IIKI), 2014 International
COMMUNICATIONS, 7.
Conference on (pp. 162-165). IEEE
[3] Bertino, E. (2016, December). Data privacy for IoT
[13] Bandyopadhyay, S., Sengupta, M., Maiti, S., & Dutta, S.
systems: concepts, approaches, and research directions.
(2011). Role of middleware for internet of things: A
In Big Data (Big Data), 2016 IEEE International
study. International Journal of Computer Science and
Conference on (pp. 3645-3647). IEEE.
Engineering Survey, 2(3), 94-105.
[4] Kakanakov, N., & Shopov, M. (2017, May). Adaptive
[14] Nzabahimana, J. P. (2018, May). Analysis of security and
models for security and data protection in IoT with Cloud
privacy challenges in Internet of Things. In 2018 IEEE
technologies. In 2017 40th International Convention on
9th International Conference on Dependable Systems,
Information and Communication Technology, Electronics
Services and Technologies (DESSERT) (pp. 175-178).
and Microelectronics (MIPRO) (pp. 1001-1004). IEEE.
IEEE.
[5] Wang, X., Zhang, J., Schooler, E. M., & Ion, M. (2014,
[15] Abomhara, M., & Køien, G. M. (2014, May). Security
June). Performance evaluation of attribute-based
and privacy in the Internet of Things: Current status and
encryption: Toward data privacy in the IoT.
open issues. In Privacy and Security in Mobile Systems
In Communications (ICC), 2014 IEEE International
(PRISMS), 2014 International Conference on (pp. 1-8).
Conference on (pp. 725-730). IEEE.
IEEE.
[6] Abomhara, M., & Køien, G. M. (2014, May). Security
[16] Wang, X., Zhang, J., Schooler, E. M., & Ion, M. (2014,
and privacy in the Internet of Things: Current status and
June). Performance evaluation of attribute-based
open issues. In Privacy and Security in Mobile Systems
encryption: Toward data privacy in the IoT.
(PRISMS), 2014 International Conference on (pp. 1-8).
In Communications (ICC), 2014 IEEE International
IEEE.
Conference on (pp. 725-730). IEEE.
[7] Ukil, A., Bandyopadhyay, S., & Pal, A. (2014, April). Iot-
privacy: To be private or not to be private. In Computer
Communications Workshops (INFOCOM WKSHPS),
2014 IEEE Conference on (pp. 123-124). IEEE.
[8] Pawar, A. B., & Ghumbre, S. (2016, December). A
survey on IoT applications, security challenges and
counter measures. In Computing, Analytics and Security