Challenges with Internet of Things (IoT) Security

Authors

  • Muhammad Baballe Ahmad
  • Munirah Abdullahi Said Department of Computer Science
  • Musa Dan-azumi Mohammed Department of Computer Science

Keywords:

Leak information, Theft, Challenges of IoT, Security System, Protection

Abstract

The phrase "Internet of Things Security" refers to a broad category of tactics, equipment, procedures, frameworks, and techniques utilized to safeguard every facet of the internet of things. The safeguarding of the hardware, software, data, and network connections to guarantee the availability, confidentiality, and integrity of IoT ecosystems is all part of IoT security. There are several security issues due to the large number of vulnerabilities that are frequently found in IoT systems. All aspects of protection, including as component hardening, monitoring, firmware updates, access control, threat response, and vulnerability remediation, are included in robust IoT security. IoT security is essential since these systems are widely dispersed and susceptible to attack, making them a highly focused attack vector. By preventing unwanted access, IoT devices can be protected from becoming entry points into the network and from leaking private data. Vulnerabilities in IoT security can be identified in watches, smart home appliances, cars, and smart grids.

Author Biographies

Munirah Abdullahi Said, Department of Computer Science

Kano State Institute for Information Technology, Kura. Kano, Nigeria

Musa Dan-azumi Mohammed, Department of Computer Science

Kano State Institute for Information Technology, Kura. Kano, Nigeria

References

A. Sahrab and H. M. Marhoon, “Design and fabrication of a low-cost system for Smart Home Applications,” Journal of Robotics and Control (JRC), vol. 3, no. 4, pp. 409–414, 2022, https://doi.org/10.18196/jrc.v3 i4.15413.

L. Babangida, T. Perumal, N. Mustapha and R. Yaakob, "Internet of Things (IoT) Based Activity Recognition Strategies in Smart Homes: A Review," in IEEE Sensors Journal, vol. 22, no. 9, pp. 8327-8336, 2022, https://doi.org/10.1109/JSEN.2022.3161797.

P. K. Sattaru, K. V. Burugula, R. Channagiri and S. Kavitha, "Smart Home Security System using IoT and ESP8266," 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 469-474, 2023, https://doi.org/10.1109/ICSSIT55814.2023.10061059.

W. Li, T. Logenthiran, V. -T. Phan and W. L. Woo, "A Novel Smart Energy Theft System (SETS) for IoT-Based Smart Home," in IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5531-5539, 2019, https://doi.org /10.1109/JIOT.2019.2903281.

V. Bianchi, M. Bassoli, G. Lombardo, P. Fornacciari, M. Mordonini and I. De Munari, "IoT Wearable Sensor and Deep Learning: An Integrated Approach for Personalized Human Activity Recognition in a Smart Home Environment," in IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8553-8562, 2019, https://doi.org/10.11 09/JIOT.2019.2920283.

Q. I. Sarhan, "Arduino Based Smart Home Warning System," IEEE 6th International Conference on Control Science and Systems Engineering (ICCSSE), pp. 201-206, 2020, https://doi.org/10.1109/ICCSSE50399 .2020.9171939.

S. S. Tippannavar, S. N and P. K. M. S, "Smart Home Automation Implemented using LabVIEW and Arduino," International Conference on Electronics and Renewable Systems (ICEARS), pp. 644-649, 2022, https://doi.org/10.1109/ICEARS53579.2022.9752265.

B. Santhikiran, L. Nagaraju, S. Abdul Sattar, D. Bharath Chandra, and Y. Jayasankar, “Design and Implementation of Smart Home System Based on IoT and Esprainmaker,” International Transactions on Electrical Engineering and Computer Science, vol. 2, no. 2, pp. 70-79, 2023, https://www.iteecs.com/inde x.php/iteecs/article/view/45.

R. Sarmah, M. Bhuyan and M. H. Bhuyan, "SURE-H: A Secure IoT Enabled Smart Home System," IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 59-63, 2019, https://doi.org/10.1109/WF-IoT.2019.876 7229.

S. Arif, M. A. Khan, S. U. Rehman, M. A. Kabir and M. Imran, "Investigating Smart Home Security: Is Blockchain the Answer?," in IEEE Access, vol. 8, pp. 117802-117816, 2020, https://doi.org/10.1109/AC CESS.2020.3004662.

E. Anthi, L. Williams, M. S?owi?ska, G. Theodorakopoulos and P. Burnap, "A Supervised Intrusion Detection System for Smart Home IoT Devices," in IEEE Internet of Things Journal, vol. 6, no. 5, pp. 9042-9053, 2019, https://doi.org/10.1109/JIOT.2019.2926365.

H. M. Marhoon, M. I. Mahdi, E. Dh. Hussein, and A. R. Ibrahim, “Designing and implementing applications of Smart Home Appliances,” Modern Applied Science, vol. 12, no. 12, pp. 8–17, 2018, https://doi.org/10.55 39/mas.v12n12p8.

D. Rani, N. S. Gill, P. Gulia, F. Arena and G. Pau, "Design of an Intrusion Detection Model for IoT-Enabled Smart Home," in IEEE Access, vol. 11, pp. 52509-52526, 2023, https://doi.org/10.1109/ACCESS.2023. 3276863.

A. H. . Mukalaf, H. M. . Marhoon, I. . Suwarno, and A. . Ma’arif, “Design and Manufacturing of Smart Car Security System with IoT-Based Real-Time Tracking,” Int J Intell Syst Appl Eng, vol. 11, no. 6s, pp. 745-752, 2023, https://www.ijisae.org/index.php/IJISAE/article/view/2909.

I. Antzoulis, M. M. Chowdhury and S. Latiff, "IoT Security for Smart Home: Issues and Solutions," IEEE International Conference on Electro Information Technology (eIT), pp. 1-7, 2022, https://doi.org/10.1109/ eIT53891.2022.9813914.

M. Murad, O. Bayat, and H. M. Marhoon, “Design and implementation of a smart home system with two levels of security based on IOT Technology,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no. 1, pp. 546–557, 2021, https://doi.org/10.11591/ijeecs.v21.i1.pp546-557.

Q. I. Sarhan, "Arduino Based Smart Home Warning System," IEEE 6th International Conference on Control Science and Systems Engineering (ICCSSE), pp. 201-206, 2020, https://doi.org/10.1109/ICCSSE50399.2 020.9171939.

P. K. Sattaru, K. V. Burugula, R. Channagiri and S. Kavitha, "Smart Home Security System using IoT and ESP8266," 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 469-474, 2023, https://doi.org/10.1109/ICCSSE50399.2020.9171939.

Q. Li, Q. Zhang, H. Huang, W. Zhang, W. Chen and H. Wang, "Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT," in IEEE Internet of Things Journal, vol. 9, no. 18, pp. 16917-16927, 2022, https://doi.org/10.1109/JIOT.2022.3146197.

S. E. Mathe, A. C. Pamarthy, H. K. Kondaveeti and S. Vappangi, "A Review on Raspberry Pi and its Robotic Applications," 2nd International Conference on Artificial Intelligence and Signal Processing (AISP), pp. 1-6, 2022, https://doi.org/10.1109/AISP53593.2022.9760590.

V. Kamath and R. A., “Performance analysis of the pre-trained EfficientDet for real-time object detection on Raspberry Pi,” International Conference on Circuits, Controls and Communications (CCUBE), vol. 11, no. 1, pp. 834–838, 2021, https://doi.org/10.1109/CCUBE53681.2021.9702741.

P. Daponte, F. Lamonaca, F. Picariello, L. De Vito, G. Mazzilli and I. Tudosa, "A Survey of Measurement Applications Based on IoT," Workshop on Metrology for Industry 4.0 and IoT, pp. 1-6, 2018, https://doi.org/10.1109/METROI4.2018.8428335.

L. Chettri and R. Bera, "A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems," in IEEE Internet of Things Journal, vol. 7, no. 1, pp. 16-32, 2020, https://doi.org/10.1109/JIOT.2 019.2948888.

Z. Wang et al., "A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses," in IEEE Communications Surveys & Tutorials, vol. 24, no. 4, pp. 2292-2328, 2022, https://doi.org/10.1109/COMST .2022.3201557.

D. Pavithra and R. Balakrishnan, "IoT based monitoring and control system for home automation," Global Conference on Communication Technologies (GCCT), pp. 169-173, 2015, https://doi.org/10.1109/GCCT .2015.7342646.

M. A. Baballe, A. Hussaini, M. I. Bello, U. S. Musa,” Online Attacks Types of Data Breach and CyberAttack Prevention Methods”, Current Trends in Information Technology, Volume 12, Issue 2, 2022, DOI (Journal): 10.37591/CTIT.

M. A. Baballe, et al., “Management of Vulnerabilities in Cyber Security”, Global Journal of Research in Engineering & Computer Sciences ISSN: 2583-2727 (Online) Volume 03| Issue 02 | March-April | 2023 Journal homepage: https://gjrpublication.com/gjrecs/.

M. B. Ahmad, et al., “Need for Security Alarm System Installation and their Challenges Faced”, International Journal of New Computer Architectures and their Applications (IJNCAA) 9(3): 68-76 The Society of Digital Information and Wireless Communications, 2019.

M. Çava?, M. B. Ahmad, “A Review Advancement of Security Alarm System using Internet of Things (IoT)”, International Journal of New Computer Architectures and their Applications (IJNCAA) 9(2): 38-49 The Society of Digital Information and Wireless Communications, 2019.

M. B. Ahmad, et al., “The Various Types of sensors used in the Security Alarm system”, International Journal of New Computer Architectures and their Applications (IJNCAA) 9(2): 50-59 The Society of Digital Information and Wireless Communications, 2019.

M. B. Ahmad, F. A. Nababa, “The need of using a Radio Frequency Identification (RFID) System”, International Journal of New Computer Architectures and their Applications (IJNCAA) 11(2): 22-29 The Society of Digital Information and Wireless Communications, 2021.

M. B. Ahmad, F. A. Nababa, “A comparative study on radio frequency identification system and its various applications”, International Journal of Advances in Applied Sciences (IJAAS) Vol. 10, No. 4, December 2021, pp. 392~398 ISSN: 2252-8814, DOI: 10.11591/ijaas.v10.i4.pp392-398.

M. M. Jassem, M. I. Al-Nouman, “Design and Implementation of IoT-Based Burglary Detection System”, Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Vol. 9, No. 3, September 2023, pp. 549-557 ISSN: 2338- 3070, DOI: 10.26555/jiteki.v9i3.26602.

M. F. Wicaksono and M. D. Rahmatya, “Smart Cluster Housing Monitoring with ESP32, ESP-Mesh and Django,” J. Eng. Res., vol. 9, pp. 1–16, 2021, https://doi.org/10.36909/jer.ASSEEE.16099.

Z. Guo, X. Ma, P. Zhang, and Z. Liu, “A dust sensor monitoring system using Wi-Fi mesh network,” J. Phys. Conf. Ser., vol. 1754, pp. 1–7, 2021, https://doi.org/10.1088/1742-6596/1754/1/012129.

R. Muhendra, A. Rinaldi, M. Budiman, and Khairurrijal, “Development of WiFi Mesh Infrastructure for Internet of Things Applications,” Procedia Eng., vol. 170, pp. 332–337, 2017, https://doi.org/10.1016/ j.proeng.2017.03.045.

Y. Chia, R. Arjadi, E. Setyaningsih, P. Wibowo, and M. Sudrajat, “Performance Evaluation of ESP8266 Mesh Networks,” J. Phys. Conf. Ser., vol. 1230, p. 12023, Jul. 2019, https://doi.org/10.1088/1742-6596/1230/1/012023.

M. F. Wicaksono, M. D. Rahmatya, “IoT for Residential Monitoring Using ESP8266 and ESP-NOW Protocol”, Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Vol. 8, No. 1, March 2022, pp. 93-106 ISSN: 2338-3070, DOI: 10.26555/jiteki.v8i1.23616.

https://www.intuz.com/blog/iot-smart-home-security-benefits-use-cases-and-top-devices.

A. Zainab., I. Amina, M. Abdulmuhaimin, M. A. Baballe, and A. S Sadiku, “Contribution of the IoT to the Security System”, Global Journal of Research in Engineering & Computer Sciences, vol. 3, no. 4, pp. 1–4, 2023. https://doi.org/10.5281/zenodo.8161017.

https://www.balbix.com/insights/addressing-iot-security-challenges/.

Downloads

Published

2024-03-31

How to Cite

1.
Ahmad MB, Munirah Abdullahi Said, Musa Dan-azumi Mohammed. Challenges with Internet of Things (IoT) Security. se [Internet]. 2024Mar.31 [cited 2025Sep.22];2(03):85-9. Available from: https://iphopen.org/index.php/se/article/view/80