Finding Security Gaps and Vulnerabilities in IoT Devices

Finding Security Gaps and Vulnerabilities in IoT Devices

Khushwant Singh, Mohit Yadav, Yudhvir Singh, Dheerdhwaj Barak
DOI: 10.4018/979-8-3693-6016-3.ch023
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The internet of things (IoT) and wireless sensor networks (WSNs) have become important innovations, offering unparalleled connectivity and pervasive data access for a variety of uses. They have combined to cause a paradigm change in the way we see and engage with our environment. But as connection has increased, new difficulties have emerged, largely concentrated around protecting the integrity of these networked systems. The cheap cost, long-term autonomy, and unsupervised operating capabilities of WSNs and IoT are the main reasons for their adoption. An enormous amount of data is now available for internet access due to the convergence of internet-enabled devices and sensor-driven data collecting, which has been facilitated by this integration. Users and network administrators are worried about the intrinsic security holes and vulnerabilities in these networks notwithstanding these advancements. WSNs and the internet of things are more susceptible to a wide range of threats because they lack a centralised security architecture. It becomes imperative to guarantee the confidentiality, integrity, and accessibility of data (CIA), particularly in applications where these characteristics are vital. In addition to the issues already listed, security risks are made worse by the intricacies brought about by the ever-changing dynamics of IoT ecosystems and the vast quantity of networked devices. New attack vectors appear as these systems develop, underscoring the need of carefully looking into any possible weaknesses. The significance of providing a thorough analysis of security risks, including both established and emerging attacks on WSNs and IoT, is emphasized in this study. This kind of analysis is necessary to classify and understand various assault types. Moreover, it underscores the need of addressing the intricate problems presented by WSN-IoT integration, including safeguarding communication protocols, overseeing extensive networks, and preserving data integrity over diverse devices and platforms. Establishing trust, reliability, and popular acceptance of these important technologies depends on recognizing those threats and safeguarding these linked systems from future assaults.
Chapter Preview
Top

1. Introduction

The integration of Wireless Sensor Networks (WSNs) and Internet of Things (IoT) frameworks has significantly impacted Industry 4.0, revolutionizing various sectors through innovative applications (Majid et al., 2022). The convergence of advancements in wireless communication and Micro Electro Mechanical Systems has revolutionized the design and deployment of Wireless Sensor Networks, allowing them to successfully gather and transfer valuable data and thus significantly contributing to several fields and applications (Butun et al., 2019). IoT is an area of engineering that focuses on providing thousands of small, physically connected things that can work together to achieve a common purpose. IoT has grown in popularity as a result of the widespread use of these tiny networked devices. These are smart, yet simple, devices that can detect and communicate wirelessly (Landaluce et al., 2020).

The Internet of Things (IoT) is an ex- citing development in technological advances, destined to revolutionize the information technology (IT) industry in a manner comparable to the internet's immense influence. Studies show a surprising trajectory of growth for the Internet of Things (IoT) market, with a projected increase from over 15 billion linked devices in 2015 to more than 75 billion devices by 2025 (Friedman, 2018). The potential applications of IoT are Smart Manufacturing, Supply Chain Management, Asset Tracking and Management, Energy Management, Healthcare and Remote Monitoring, Smart Cities and Infrastructure, Agriculture and Precision Farming, Environmental Monitoring, Retail and Inventory Management, etc (Attia, 2019). Figure 1 depicts the applications of IoT in the current scenarios.

Figure 1.

Applications of IoT

979-8-3693-6016-3.ch023.f01

The Internet of Things (IoT), Internet of Everything (IoE), and Internet of Nano-Things (IoNT) are cutting-edge approaches to merging the internet into one's private, business, and social interactions, as well as the impersonal world of inanimate quasi-intelligent appliances (Miraz et al., 2018). The interconnectedness between the virtual realm and IoT devices facilitates the emergence of cyber-physical systems capable of interacting and cooperating.

A fundamental aspect of Industry 4.0 revolves around a fully integrated production system that functions autonomously, leveraging data transmission, reception, and processing without direct human intervention. This system handles various tasks necessary for manufacturing diverse items. Industry 4.0 is structured around three core elements: peoples, things and business (Osterrieder et al., 2020). A typical IoT system consists of five basic components: Sensors: These devices are largely in charge of gathering and translating data from their surroundings into digital format. The component of computing node acts as a processing unit, handling data and information from sensors and executing computations or analysis as needed. The receiver component supports the collection of messages delivered by com putting nodes or other system-connected devices. The actuator causes related devices to perform certain functions or actions in response to decisions made by the Computing Node based on processed information.

User interface is activated by the actuator, this component is responsible for executing the desired tasks or activities, contributing to the overall functionality of the system (Keramidas et al., 2016). Security is a major concern in WSN and the Internet of Things (IoT), especially when these networks are used for crucial tasks. As these innovations grow more integrated into vital tasks and sensitive locations, comprehensive security measures are important for protecting against potential assaults and breaches. Based on recent studies, the majority of currently utilised systems fail to include strong security services that could protect the confidentiality of patients (Gope & Hwang, 2015).

Complete Chapter List

Search this Book:
Reset