Documente Academic
Documente Profesional
Documente Cultură
ISBN: 978-93-84893-49-4
(Organized by School of Computing [IT, CSE & MCA], E.G.S Pillay Engineering College, Nagapattinam)
IEEE-International Conference on IoT and its Applications (ICIOT-2017)
Four of seven systems that had cameras, gave the owner hardware and software design of the security system of an IoT-
the ability to grant video access to additional users, based Smart Home system with the application of basic
further exacerbating account harvesting issues security measures, privacy protection technologies, and the
Two of the systems allowed video to be streamed implementation of intrusion prevention and malicious code
locally without authentication precaution technologies to enhance the security of the system.
A single system o ered two-factor authentication [8] described various IoT technologies such as Wireless
The results for the ten devices were very similar and Sensor Networks (WSN), and Radio Frequency Identification
provided a good indicator of the current market status Technology (RFID) and defined in detail the various type of
security attacks on the two technologies.
with respect to security and the IoT.
[9] described the privacy and security challenges for IoT.
[3]proposed various Encryption and Hash algorithms, Current cryptographic models, schemes, and implementations
aiming to enhance the security in Smart Home Systems. The such as Advanced Encryption Standard (AES), Elliptic Curve
algorithms proposed in the paper were aimed at secure Cryptography (ECC) are described with their functionality and
communication between the devices in the IoT System. the both the advantages and disadvantages. The need for more
Existing algorithms such as RC-5, Skipjack, and AES to ensure flexible cryptographic suites is highlighted.
security within the network. A modified hash algorithm based
of RC4 is discussed and its performance is measured against
existing hashing algorithms. III. SYSTEM OVERVIEW
[4] define security requirementsand functions for the Smart
Home service. A Smart Home system was defined to be The configuration of an IoT based system is as shown in
consisting of a home server, a home gateway, and smart home Figure 1. The system typically consists of IoT devices, a
devices. A security feature was defined for each components of gateway, the server and the User device(s). The IoT devices
a smart home in an IoT environment. The security are generally sensors, actuators, or devices with computational
requirements and functionsproposed were based on the capabilities. These devices sense information within the
principles of Integrity, Confidentiality, and System system or are monitor or access various parts of the system.
Availability. The IoT devices are connected to the gateway over the
internal/home network. The gateway acts as a relay of the IoT
[5]presents an analysis of the main challenges and security devices to the User and the Server. The Server acts as a
threats present in Smart Home networks. The results of the repository for the information collected by the IoT devices as
analysis were then used to draw the fundamental requirements well as for transmission over the internet. The User device
needed for providing secure and confidential operations in provides the interface for the user to monitor, access and
Smart Homes. The paper discussed in detail the technologies
control the system remotely over the internet. [4]
composing a smart home i.e. applications, devices, operating
systems, and communication protocols. It discussed the main
challenges present in securing smart homes. The security
threats present in the communication protocols were illustrated
with case studies and defense strategies. Countermeasures were
discussed along with the security requirements of Smart
Homes.
[6]presented an approach to incorporate security in a IoT
based Smart Home System, with the aim of keeping the user
convenience and experience unhampered.The paper described
the design and prototype implementation of a Wi-fi based IoT
Smart Home system consisting of IoT devices (sensors,
actuators, equipment) connected to the Home Gateway over the
Home network. The user device (android based smartphone), Figure 1 - Configuration of an IoT System
used to access and control the system, was connected to the
Home gateway over the internet. The Home gateway enabled IV. PROPOSED WORK
secure communication between the IoT devices, and allowed
the user to access, configure, and control the system via the The Proposed Technique in this paper caters to the
user interface. The base of the implementation was the AllJoyn communication within the IoT system(Intra-network) i.e. the
framework. It is an open source IoT framework, capable of communication between the Gateway and the IoT devices.
supporting multiple devices and operating systems and has The aim is to secure the communication within the network
various libraries from cryptography (ECC, AES, etc.). and make it resilient to attacks. The proposed method is a
combination of Symmetric and Asymmetric cryptographic
[7]aimed at IoT Security Technology, with a detailed view techniques for transmission of data within the IoT networki.e.
of Privacy protection technology. A privacy protection scheme for Intra-Network security.Symmetric-key algorithms are
for IoT was designed for remote health care system. The
ISBN: 978-93-84893-49-4
(Organized by School of Computing [IT, CSE & MCA], E.G.S Pillay Engineering College, Nagapattinam)
IEEE-International Conference on IoT and its Applications (ICIOT-2017)
ISBN: 978-93-84893-49-4
(Organized by School of Computing [IT, CSE & MCA], E.G.S Pillay Engineering College, Nagapattinam)
IEEE-International Conference on IoT and its Applications (ICIOT-2017)
ISBN: 978-93-84893-49-4
(Organized by School of Computing [IT, CSE & MCA], E.G.S Pillay Engineering College, Nagapattinam)