Internet of things (IOT) Security: Challenges & Solutions

Authors

  • Akshat Gupta Student, Class 12th, St Joesph's Academy, Dehradun, Uttarakhand

DOI:

https://doi.org/10.29070/kaetha55

Keywords:

Internet of Things, Cyber-attacks, encryption, Challenges, Solution

Abstract

The fast expansion of the Internet of Things (IoT) has led to the transformation of several sectors via the connectivity of devices and the ease of real-time data collecting. However, important security vulnerabilities have emerged as a consequence of the expansion of Internet of Things systems, putting their availability, confidentiality, and integrity at risk. A comprehensive overview of the primary security issues related to the Internet of Things (IoT) is the goal of this write-up. Faults in software integrity, network connection, data encryption, and device authentication are among these issues. This essay delves into the peculiar threats posed by resource-constrained Internet of Things devices and the prospect of widespread cyberattacks. Modern, state-of-the-art methods for avoiding these threats are also included in the research. Some examples of these frameworks include blockchain-based cryptographic protocols, intrusion detection systems, robust access control methods, and lightweight cryptographic protocols. By reviewing the current state of affairs and looking ahead to future developments, this paper aims to provide academics and practitioners with the knowledge they need to enhance the security of the Internet of Things (IoT) and make it possible to safely implement IoT technologies in many different industries.

References

Ahammad, D. S. K. H. (2022). Microarray Cancer Classification with Stacked Classifier in Machine Learning Integrated Grid L1-Regulated Feature Selection. Machine Learning Applications in Engineering Education and Management, 2(1), 01–10.

Ashwin, K. V., Kosuru, V. S. R., Sridhar, S., & Rajesh, P. (2023). A passive islanding detection technique based on susceptible power indices with zero non-detection zone using a hybrid technique. International Journal of Intelligent Systems and Applications in Engineering, 11(2), 635-647.

Burgos-Artizzu, X. P., Dollár, P., Lin, D., Anderson, D. J., & Perona, P. (2012). Social behavior recognition in continuous video. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition. IEEE; pp. 1322-1329.

Chen, L. C., Papandreou, G., Kokkinos, I., Murphy, K., & Yuille, A. L. (2018). DeepLab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected CRFs. IEEE transactions on pattern analysis and machine intelligence, 40(4), 834-848.

Chen, Z., & Gupta, S. (2020). Deep learning for object detection: A comprehensive review. Journal of Visual Communication and Image Representation, 68, 102768.

Chinthamu, N., Gooda, S. K., Venkatachalam, C., Swaminathan, S., & Malathy, G. (2023). IoT-based secure data transmission prediction using deep learning model in cloud computing. International Journal on Recent and Innovation Trends in Computing and Communication, 11, 68-76.

Deng, J., Dong, W., Socher, R., Li, L. J., Li, K., & Fei-Fei, L. (2009). ImageNet: A large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition. IEEE; pp. 248-255.

Everingham, M. et al. (2010). The Pascal visual object classes (VOC) challenge. International Journal of Computer Vision, 88(2), 303-338.

Girshick, R. (2015). Fast r-cnn. In: Proceedings of the IEEE International Conference on Computer Vision. pp. 1440-1448.

Girshick, R., Donahue, J., Darrell, T., & Malik, J. (2014). Rich feature hierarchies for accurate object detection and semantic segmentation. Proceedings of the IEEE conference on computer vision and pattern recognition, 580-587.

Guo, J., He, H., He, T., Lausen, L., Li, M., Lin, H., et al. (2019). GluonCV and GluonNLP: Deep Learning in Computer Vision and Natural Language Processing. arXiv preprint arXiv:1907.04433.

Gupta, A., Singh, R., Sharma, A., & Das, S. (2023). Influence of cultural factors on consumer behavior in India. Journal of Consumer Research, 50(1), 112-129.

He, K., Gkioxari, G., Dollár, P., & Girshick, R. (2017). Mask R-CNN. Proceedings of the IEEE international conference on computer vision, 2961-2969.

He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. Proceedings of the IEEE conference on computer vision and pattern recognition, 770-778.

Henriques-Alves, A. M., & Queiroz, C. M. (2016). Ethological evaluation of the effects of social defeat stress in mice: Beyond the social interaction ratio. Frontiers in Behavioral Neuroscience, 9, 364.

Inman, J. J., & Nikolova, H. (2018). Shopper-facing retail technology: A retailer adoption decision framework incorporating shopper attitudes and privacy concerns. Journal of Retailing, 94(3), 377-389.

Jhuang, H. et al. (2010). Automated home-cage behavioural phenotyping of mice. Nature Communications, 1, 68.

Kamau, J., Goldberg, R., Oliveira, A., Seo-joon, C., & Nakamura, E. (2023). Improving Recommendation Systems with Collaborative Filtering Algorithms. Kuwait Journal of Machine Learning, 1(3).

Lin, T. Y., Dollár, P., Girshick, R., He, K., Hariharan, B., & Belongie, S. (2017). Feature pyramid networks for object detection. Proceedings of the IEEE conference on computer vision and pattern recognition, 2117-2125.

Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C. Y., & Berg, A. C. (2016). SSD: Single Shot MultiBox Detector. European conference on computer vision, 21-37.

Norouzzadeh, M. S. et al. (2018). Automatically identifying, counting, and describing wild animals in camera-trap images with deep learning. Proceedings of the National Academy of Sciences of the United States of America, 115(25), E5716-E5725.

Peixoto, H. M., Teles, R. S., Luiz, J. V. A., Henriques-Alves, A. M., & Santa Cruz, R. M. (2019). Mice Tracking Using the YOLO Algorithm. PeerJ Preprints, 7, e27880v1.

Raj, R., & Sahoo, D. S. S. (2021). Detection of Botnet Using Deep Learning Architecture Using Chrome 23 Pattern with IoT. Research Journal of Computer Systems and Engineering, 2(2), 38-44.

Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. (2016). You only look once: Unified, real-time object detection. Proceedings of the IEEE conference on computer vision and pattern recognition, 779-788.

Redmon, J., & Farhadi, A. (2017). YOLO9000: Better, faster, stronger. Proceedings of the IEEE conference on computer vision and pattern recognition, 7263-7271.

Redmon, J., & Farhadi, A. (2018). YOLOv3: An incremental improvement. arXiv preprint arXiv:1804.02767.

Ren, S., He, K., Girshick, R., & Sun, J. (2015). Faster R-CNN: Towards real-time object detection with region proposal networks. Advances in Neural Information Processing Systems, 91-99.

Simonyan, K., & Zisserman, A. (2014). Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556.

Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., & Wojna, Z. (2016). Rethinking the inception architecture for computer vision. Proceedings of the IEEE conference on computer vision and pattern recognition, 2818-2826.

Thaler, R. H., & Sunstein, C. R. (2008). Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press.

Downloads

Published

2024-07-01

How to Cite

[1]
“Internet of things (IOT) Security: Challenges & Solutions”, JASRAE, vol. 21, no. 5, pp. 80–88, Jul. 2024, doi: 10.29070/kaetha55.

How to Cite

[1]
“Internet of things (IOT) Security: Challenges & Solutions”, JASRAE, vol. 21, no. 5, pp. 80–88, Jul. 2024, doi: 10.29070/kaetha55.