Skip to main content

Current Issues and Challenges of Security in IoT Based Applications

  • Conference paper
  • First Online:
Advances in Intelligent Systems and Interactive Applications (IISA 2019)

Abstract

The abstract should summarize the contents of the paper in short terms, i.e. 150–250 words. Automation in sensor-based network has made Internet of Things (IoTs) a reality. From wearable gadgets, smart homes, smart city, industrial internet, connected car, connected health, smart retail down to smart farming, IoT plays a major role at present. This drastic development now met with security issues such as privacy, infrastructure, leakage of information, loss of security services etc and is a major challenges. In this communication, we have surveyed literature to understand various security issues of IoT and the immediate challenges to be addressed to overcome security issues. Different factors like mobility, scalability, resource limitation etc. are considered for analyzing IoT security and current researchers can identify some open research problems and meet the challenges to promote IoT further.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. http://saphanatutorial.com/introduction-to-internet-of-things-part-2/

  2. https://en.wikipedia.org/wiki/Internet_of_things

  3. Fuqaha, A.A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347–2376 (2015)

    Article  Google Scholar 

  4. Pfister, C.: Getting Started With the Internet of Things: Connecting Sensors and Microcontrollers to the Cloud. O’Reilly Publishers, Sebastopol (2011)

    Google Scholar 

  5. https://www.lifewire.com/introduction-to-the-internet-of-things-817766

  6. Ghapar, A.A., Yussof, S., Bakar, A.A.: Internet of Things (IoT) architecture for flood data management. Int. J. Future Gen. Commun. Network. 11(1), 55–62 (2018)

    Article  Google Scholar 

  7. Yuan-sheng, D., Zhi-chao, Y.: Industrial IoT mining algorithm of cloud computing research. Int. J. u- e- Serv. Sci. Technol. 9(1), 197–208 (2016)

    Article  Google Scholar 

  8. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of Things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  9. Da Xu, L., He, W., Li, S.: Internet of Things in industries: a survey. IEEE Trans. Ind. Inf. 10(4), 2233–2243 (2014)

    Article  Google Scholar 

  10. Chen, S., Xu, H., Liu, D., Hu, B., Wang, H.: A vision of IoT: applications, challenges, and opportunities with china perspective. IEEE Internet Things J. 1(4), 349–359 (2014)

    Article  Google Scholar 

  11. Shrivastava, S., Shrivastava, L., Bhadauria, S.S.: Performance analysis of wireless mobile ad hoc network with varying transmission power. Int. J. Sens. Appl. Control Syst. 3(1), 1–6 (2015)

    Google Scholar 

  12. Pandey, K.K., Patel, S.V.: Development of an effective routing protocol for cluster based wireless sensor network for soil moisture deficit monitoring. Int. J. Control Autom. 8(1), 243–250 (2015)

    Article  Google Scholar 

  13. Upendar Rao, R., Veeraiah, D., Mandhala, V.N., Kim, T.H.: Neighbor position verification with improved quality of service in mobile ad-hoc networks. Int. J. Control Autom. 8(1), 83–92 (2015)

    Article  Google Scholar 

  14. https://www.zdnet.com/article/25-billion-connected-devices-by-2020-to-build-the-internet-of-things/

  15. Cho, M., Choi, H.R., Kwak, C.H.: A study on the navigation aids management based on IoT. Int. J. Control Autom. 8(7), 193–204 (2015)

    Article  Google Scholar 

  16. Mukherjee, S., Biswas, G.P.: Networking for IoT and applications using existing communication technology. Egypt. Inf. J. 19(2), 107–127 (2018)

    Article  Google Scholar 

  17. Kamal, Z., Mohammed, A., Sayed, E., Ahmed, A.: Internet of Things applications, challenges and related future technologies. World Sci. News 67(February), 126–148 (2017)

    Google Scholar 

  18. Nalbandian, S.: A survey on Internet of Things: applications and challenges. In: 2nd International Congress on Technology, Communication and Knowledge, ICTCK 2015, pp. 165–169 (2016)

    Google Scholar 

  19. Shahid, N., Aneja, S.: Internet of Things: vision, application areas and research challenges. In: Proceedings of the International Conference on IoT in Social, Mobile, Analytics and Cloud, I-SMAC 2017, pp. 583–587 (2017)

    Google Scholar 

  20. An, Q.: Localization of sound sensor wireless network with a mobile beacon. Int. J. Sens. Appl. Control Syst. 6(1), 1–14 (2018)

    MathSciNet  Google Scholar 

  21. Kumar, M., Annoo, K., Kumar Mandal, R.: The Internet of Things applications for challenges and related future technologies & development. Int. Res. J. Eng. Technol. (IRJET) 5(1), 619–625 (2018)

    Google Scholar 

  22. Özgür, L., Akram, V.K., Challenger, M., Daǧdeviren, O.: An IoT based smart thermostat. In: 2018 5th International Conference on Electrical and Electronics Engineering, ICEEE 2018, pp. 252–256 (2018)

    Google Scholar 

  23. Pandey, S., Mahapatra, R.P.: An adaptive gravitational search routing algorithm for channel assignment based on WSN. Int. J. Sens. Appl. Control Syst. 5(1), 1–14 (2017)

    Google Scholar 

  24. Kim, J.-H., Park, S.C.: IoT relationship between Korea and the Philippines. Int. J. u- e- Serv. Sci. Technol. 9(7), 395–406 (2016)

    Article  Google Scholar 

  25. Ricciardi, J., Amazonas, R., Palmieri, F., Bermudez-Edo, M.: Ambient intelligence in the Internet of Things. Mob. Inf. Syst. 2017, 1–3 (2017)

    Google Scholar 

  26. Priyadarshini, R., Narayanappa, C.K., Chander, V.: Optics based biosensor for medical diagnosis. Int. J. Sens. Appl. Control Syst. 5(2), 1–14 (2018)

    Google Scholar 

  27. Sastry, C., Ma, C., Loiacono, M., Tas, N., Zahorcak, V.: Peer-to-peer wireless sensor network data acquisition system with pipelined time division scheduling. In: 2006 IEEE Sarnoff Symposium (2006)

    Google Scholar 

  28. Kim, J.T.: Requirement of security for IoT application based on gateway. Int. J. Secur. Appl. 9(10), 201–208 (2015)

    Google Scholar 

  29. Kaur, S., Hans, A., Singh, N.: An overview to Internet of Things (IOT). Int. J. Future Gener. Commun. Network. 9(9), 239–246 (2016)

    Article  Google Scholar 

  30. Mostefa, B., Abdelkader, G.: A survey of wireless sensor network security in the context of Internet of Things. In: Proceedings of the 2017 4th International Conference on Information and Communication Technologies for Disaster Management, ICT-DM 2017, vol. 2018–January, pp. 1–8 (2018)

    Google Scholar 

  31. Wang, L., Wang, X.V., Wang, L., Wang, X.V.: Latest advancement in CPS and IoT applications. In: Cloud-Based Cyber-Physical Systems in Manufacturing, pp. 33–61 (2017)

    Google Scholar 

  32. Schaumont, P.: Security in the Internet of Things: a challenge of scale. In: Proceedings of the 2017 Design, Automation and Test in Europe, DATE 2017, pp. 674–679 (2017)

    Google Scholar 

  33. Hang, L., Kim, D.-H.: Design and implementation of IoT interworking of anchor service provider and mobius platform using RESTful API. Int. J. Control Autom. 10(10), 101–112 (2017)

    Article  Google Scholar 

  34. Eom, J.H.: Security threats recognition and countermeasures on smart battlefield environment based on IoT. Int. J. Secur. Appl. 9(7), 347–356 (2015)

    Google Scholar 

  35. Kim, Y.-H., Kim, M.-S., Park, M.-H., Kang, S.-K., Eun, C.-S.: Study on the low energy consumption method for light-wight devices in IoT service environment. Int. J. Grid Distrib. Comput. 11(8), 99–108 (2018)

    Article  Google Scholar 

  36. Schaumueller-Bichl, I., Kolberger, A.: IoT as a challenge in information security. Elektrotechnik Und Informationstechnik 133(7), 319–323 (2016)

    Article  Google Scholar 

  37. Seo, J.-H., Choi, J.-T.: Customized mobile marketing platform design utilizing IoT based Beacon sensor devices. Int. J. Grid Distrib. Comput. 11(8), 57–68 (2018)

    Article  Google Scholar 

  38. Abdulrahman, Y.A., Kamalrudin, M., Sidek, S., Hassan, M.A.: Internet of Things: issues and challenges. J. Theor. Appl. Inf. Technol. 94(1), 52–60 (2016)

    Google Scholar 

  39. Kim, J., Lee, Y.: A study on the virtual machine-based anti-theft system running on IoT devices. Int. J. Grid Distrib. Comput. 11(8), 1–12 (2018)

    Article  Google Scholar 

  40. Macaulay, T.: Confidentiality and integrity and privacy requirements in the IoT. In: RIoT Control, pp. 125–139 (2016)

    Google Scholar 

  41. Lee, S.: Communication technology and application of Internet of Things (IoT) in smart home environment. Int. J. Control Autom. 10(3), 397–404 (2017)

    Article  Google Scholar 

  42. Lee, K., Kim, D., Choi, H.R., Park, B.K., Cho, M.J., Kang, D.Y.: A study on IoT-based fleet maintenance management. Int. J. Control Autom. 10(4), 287–296 (2017)

    Article  Google Scholar 

  43. Abomhara, M., Koien, G.M.: Security and privacy in the Internet of Things: current status and open issues. In: 2014 International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 - Co-located with Global Wireless Summit (2014)

    Google Scholar 

  44. Patil, A., Bansod, G., Pisharoty, N.: Hybrid lightweight and robust encryption design for security in IoT. Int. J. Secur. Appl. 9(12), 85–98 (2015)

    Google Scholar 

  45. Jung, S.H., An, J.C., Park, J.Y., Shin, Y.T., Kim, J.B.: An empirical study of the military IoT security priorities. Int. J. Secur. Appl. 10(8), 13–22 (2016)

    Google Scholar 

  46. Park, K., Kim, I., Park, J.: An efficient multi-class message scheduling scheme for healthcare IoT systems. Int. J. Grid Distrib. Comput. 11(5), 67–78 (2018)

    Article  Google Scholar 

  47. Kumar, N., Madhuri, J., Channegowda, M.: Review on security and privacy concerns in Internet of Things. In: IEEE International Conference on IoT and its Applications, ICIOT 2017 (2017)

    Google Scholar 

  48. Oriwoh, E., Al-Khateeb, H., Conrad, M.: Responsibility and non-repudiation in resource-constrained Internet of Things scenarios. In: International Conference on Computing and Technology Innovation (CTI 2015), 27–28 May 2015

    Google Scholar 

  49. Kouicem, D.E., Bouabdallah, A., Lakhlef, H.: Internet of Things security: a top-down survey. Comput. Netw. 141, 199–221 (2018)

    Article  Google Scholar 

  50. Alaba, F.A., Othman, M., Abaker, I., Hashem, T., Alotaibi, F.: Internet of Things security: a survey. J. Netw. Comput. Appl. (2017)

    Google Scholar 

  51. Chollet, S., Pion, L., Barbot, N., Michel, C.: Secure IoT for a pervasive platform. In: 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018, pp. 113–118 (2018)

    Google Scholar 

  52. Shah, T., Venkatesan, S.: Authentication of IoT device and IoT server using secure vaults. In: Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, pp. 819–824 (2018)

    Google Scholar 

  53. Kim, S.H., Lee, I.Y.: IoT device security based on proxy re-encryption. J. Ambient Intell. Hum. Comput. 9(4), 1267–1273 (2018)

    Article  Google Scholar 

  54. Hwang, S.: Monitoring and controlling system for an IoT based smart home. Int. J. Control Autom. 10(2), 339–348 (2017)

    Article  Google Scholar 

  55. Xuan, S., Park, D.-H., Kim, D.: A service platform for real-time video streaming based on RESTful API in IoT environments. Int. J. Control Autom. 10(3), 181–192 (2017)

    Article  Google Scholar 

  56. Jiang, J., Yang, D., Gao, Z.: Study on application of IOT in the cotton warehousing environment. Int. J. Grid Distrib. Comput. 8(4), 91–104 (2015)

    Article  Google Scholar 

  57. Yang, H.-K., Cha, H.-J., Song, Y.-J.: A study of secure distributed management of sensing data in IoT environment. Int. J. Adv. Sci. Technol. 124, 21–32 (2019)

    Article  Google Scholar 

  58. Byun, S.: Viability-based replication management scheme for reliable IoT data services. Int. J. Adv. Sci. Technol. 124, 89–102 (2019)

    Article  Google Scholar 

  59. Schukat, M., Cortijo, P.: Public key infrastructures and digital certificates for the Internet of Things. In: 2015 26th Irish Signals and Systems Conference, ISSC 2015 (2015)

    Google Scholar 

  60. Matuszak, G., Bell, G., Le, D.: Security and the IoT. In: KPMG (2015)

    Google Scholar 

  61. Dayaker, P., Reddy, Y.M., Kumar, M.B.: A survey on applications and security issues of Internet of Things (IoT). Int. J. Mech. Eng. Technol. 8(86), 641–648 (2017)

    Google Scholar 

  62. Alaa, M., Zaidan, A.A., Zaidan, B.B., Talal, M., Kiah, M.L.M.: A review of smart home applications based on Internet of Things. J. Netw. Comput. Appl. 97, 48–65 (2017)

    Article  Google Scholar 

  63. Deol, R.K.: Intruder detection system using face recognition for home security IoT applications: a Python Raspberry Pi 3 case study. Int. J. Secur. Technol. Smart Dev. 5(2), 21–32 (2018)

    Article  Google Scholar 

  64. Son, Y., Lee, Y.: A study on the interpreter for the light-weighted virtual machine on IoT environments. Int. J. Web Sci. Eng. Smart Dev. 3(2), 19–24 (2017)

    Google Scholar 

  65. Kim, S.J., Min, J.H., Kim, H.N.: The development of an IoT-based educational simulator for dental radiography. IEEE Access 7, 12476–12483 (2019)

    Article  Google Scholar 

  66. Gehlot, A., Singh, R., Mishra, R.G., Kumar, A., Choudhury, S.: IoT and Zigbee based street light monitoring system with LabVIEW. Int. J. Sens. Appl. Control Syst. 4(2), 1–8 (2017)

    Google Scholar 

  67. Sharma, A., Salim, M.: On the feasibility of polar code as channel code candidate for the 5G-IoT scenarios. Int. J. Future Gener. Commun. Netw. 11(3), 11–20 (2018)

    Article  Google Scholar 

  68. Jiantao, C., Xiaojun, Z.: Study of IoT terminal interface platform based on embedded technology and Zigbee protocol. Int. J. Future Gener. Commun. Netw. 9(6), 55–64 (2016)

    Article  Google Scholar 

  69. Ghapar, A.A., Yussof, S., Bakar, A.A.: Internet of Things (IoT) architecture for flood data management. Int. J. Future Gener. Commun. Netw. 11(1), 55–62 (2018)

    Article  Google Scholar 

  70. Choi, J.H., Kang, U.G., Lee, B.M.: IoT service model for measuring sleep disorder using CoAP. Int. J. Mob. Dev. Eng. 1(1), 9–14 (2017)

    Article  Google Scholar 

  71. Yang, J.H., Ryu, Y.: Design and development of a command-line tool for portable executable file analysis and malware detection in IoT devices. Int. J. Secur. Appl. 9(8), 127–136 (2015)

    Google Scholar 

  72. Li, S.: Introduction: securing the Internet of Things. In: Securing the Internet of Things, pp. 1–25 (2017)

    Google Scholar 

  73. Bhargavi, M., Nagabhushana Rao, D.M.: Security issues and challenges in IOT: a comprehensive study. Int. J. Eng. Technol. 7(2.32), 298 (2018)

    Google Scholar 

  74. Jemshit, T.: A simple energy efficient routing algorithm for the IoT environment. Int. J. Cloud-Comput. Super-Comput. 4(2), 7–12 (2018)

    Article  Google Scholar 

  75. Shaikh, M.H.: Indication of European union clients’ privacy conservation in an IoT SCM system. Int. J. Private Cloud Comput. Environ. Manage. 5(2), 7–12 (2018)

    Article  MathSciNet  Google Scholar 

  76. Vardhan, K.A., Krishna, M.M.: DGD: an intrusion detection system for providing security to web applications. J. Stat. Comput. Algorithm 1(1), 27–32 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reji Thomas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rai, M.K., Kanday, R., Thomas, R. (2020). Current Issues and Challenges of Security in IoT Based Applications. In: Xhafa, F., Patnaik, S., Tavana, M. (eds) Advances in Intelligent Systems and Interactive Applications. IISA 2019. Advances in Intelligent Systems and Computing, vol 1084. Springer, Cham. https://doi.org/10.1007/978-3-030-34387-3_71

Download citation

Publish with us

Policies and ethics