Sie sind auf Seite 1von 7

A Brief Review on Trust Issues in Internet of

things
Hashmat Ali, Graduation Student
MScs Student at Iqra University, Islamabad Pakistan
sayedhashmatnaqvi@gmail.com
“This work was supported by Dr. Abdul Hameed (Senior fecality Member at Iqra university.”

ABSTRACT In several ways the Internet of Things (IoT) has a great impact on our everyday lives,
it includes all devices from small to large networks. Various monitoring devices are connected with each
other using wired and wireless technologies including Bluetooth, and LTE. These devices get data from
environment and share with different servers and other devices which leads to trust issues due to many
reasons like device error, sensor error, packet loss etc. This paper discus the trust issues in Internet of
Surveillance things and IoT system security. Trust management has an essential role in IosT for improving
reliability. Through this survey, we clarified the issues in terms of IoT security and privacy along with the
solutions and identified the key security problem within the IosT system. In addition, the creation of trust
relationships between nodes in IoT is a primary safety achievement for providing secure networks that
avoid malicious nodes.

INDEX TERMS IoST, LTE, Trust management, Malicious nodes, Co-saliency,

I. INTRODUCTION
We need IoT that is reliable in developing smart cities. It Fig. 1.1 Representation of IOT Networks
will avoid unwanted access of Data and Communication
access. IoT systems may benefit from carefully tracking Image from an IoT device maybe trustful because it
Environment data that they capture. Fig [1.1] show the IoT indicates the corresponding IoT device. Therefore, security
networks previously used, current IoT networks and future data analysis can be helpful in developing trustworthy
IoT networks smart cities.
Analyzing numerous data and reducing human error and
effort can be beneficial for artificial intelligent. Like a
Crowd warning system, an alarm may be issued
automatically. And, also through tracking multiple IoT
devices we can predict different events. Like gathering
vehicle data for tracking the air quality. But in IoT we face
many problem and issue due to several reason like
untrustworthy sensor data or wrong data due to sensor or
device malfunction, so we need some techniques and
protocols to tackle these issues. In this paper we have
discuses several problems in IoST and their solutions.
Saliency detection can aid in understanding and cognition
of the situation. Saliency is based on information from a
single image and does not recognize similarities and image
variations from other IoT tools. Its performance is minimal.
This cannot assist with scene analyzes.

II. Architecture Of IoT Networks


There is no clear, universal consensus on the IoT
architecture agreed upon by the community as a whole and

VOLUME 1, 2020 1
by scholars. Scientists have suggested various and distinct
architectures. There are three layers of IoT according to few [1] Co-saliency detection is good for scene analysis
researchers, but few have supported the design with four because it investigates association between images of
layers. The design with different IoT devices. It focusses on foreground region with
three layers cannot fulfill the requirements with similarity group of images. Inspired by human phenomenon
applications due to the improvement of IoT. The design of of visual attention attracted to same object with different
five layers was also suggested because of a security and backgrounds. Co-saliency has ability to detect saliency in
privacy policy in IoT. A newly proposed scene collected by different IoT Devices. Existing co-
architecture is deemed capable of satisfying IoT's security saliency based on deep artificial neural network facing
and privacy criteria. The architecture on five challenges the first is inefficiently represent the inter-image
layers played an important role in IoT creation. Safety and
similarity which leads to poo characterization in varied image
storage problems were also found in four-layer architecture.
backgrounds.
This has three layers of Three Layer construction, the terms
Authors proposed a new technique to detect co-salient
of which are layer of understanding, layer of transport and
layer of operation. There is also one more element of it. object in IoT environment to address the inefficiency and
This layer's name is Support Layer, but certain threats can single image information extraction.
impact this layer like DoS attack, malicious attacker,
unauthorized access, etc. Experts proposed five-layer There is a lot of work on integrating IoT devices to address
architecture to make the IoT safer. This comprises three security problems in smart city and built trust between these
layers of previous Three-layer architecture and two devices.
additional layers Duan intended a trust deviation game system that can
called processing and Business Layer. The newly designed maintain protection and energy efficiency during derivation
architecture is deemed capable of to reduce overhead network. Adewuyi’s model can address
satisfying IoT specifications. These would also have the the challenges of trust decay and weighting. It is based on
potential to protect IoT software. collaborative download for trust management.
Wang introduced a cloud/edge architecture with adaptive
service and trust elevation which can balance dynamics
between edge and cloud computing to solve increasing
repeated service and internal attacks.
Rostamzadeh developed a strategy in vehicular network with
two modules a security check and message forward to create
trust for traffic requirements.
Jeong focus on smart manufacturing system and provides a
hierarchical model for trustful resource assignment.
Most method of co-saliency are from three schemes Bottom
up, feature fusion and machine learning.
A bottom up scheme detects co-saliency degree of each
pixel or region of group images by image contrast, pixel
values and locations, gradient, etc.
Li et al determine a pixel is from co-saliency region by how
many times it classified as co-salient point. However, bottom
up scheme rely on user experiences in the feature engineering
as well as subjective tendency in image observation. This is
the difficulty of bottom-up to adapt the varieties of practical
image scenes.
Feature-fusion scheme compute several predicted maps using
Fig [1.2] Basic Architecture of IoT networks existing co-saliency algorithms. To propose appropriate map
relationship among these needs to be investigated.
III. Related Work
The IoT, which is a crucial technology in smart cities, is Performance of the fusion based method is highly influenced
focused on the technologies of sensors, networks and by co-saliency detection algorithms.
working that allow it to gather and share data together. The Learning base scheme learn image feature representation of
IoT systems are mainly wirelessly linked and serve as a core co-saliency patterns in group of images. Early methods
infrastructure for smart city applications such as smart grid, construct explicit learning model to approx. the map from
smart building and mobile healthcare, but the biggest image group. These model focus on learning the feature
obstacle is IoT's noisy data and security issue due to its representation from supporting knowledge in other domain or
connectivity which leads to mistrusts of users. extract the common feature in group images.

VOLUME 1, 2020 3
proposed a stable and trustworthy IoT sensing scheme called
[2] Problem of small IoT systems with a high energy Real Warning to tackle this.
consumption is addressed. Founded a definition of smart city
in a 1993 academic paper that created strong interest in Such data and the node producing those data are analyzed
recent years with the advent of IoT. IoT allows artifacts that using anomalous IoT as well as qualitative information
communicate with the internet, but the difficulty is to create describing the world in which IoT data is collected. With
low-cost, low-energy tools on a wide scale. In terms of good efficiency and precision, this scheme will assess the
expense and energy consumption IoT systems need to be trustworthiness of both the IoT nodes and records.
inexpensive. Cognitive behavior of IoT systems is another
important field along with interconnectivity. IoT Systems IV. Analysis & Discussion
need to be smart enough to adapt and react intelligently to
various scenarios. IEEE 802.15.4 is preferred standard for With great advancements in IoT and emergence of sub
IoT deployment. The computers use IEEE 802.15.4 have domain of IoT like IoST the security risks are also increased
minimal computing capacity, with poor endurance and short and trust of user in IoT based devices shows a great decline,
range due to battery power. Packet transmission can be so it is necessary to deal with security issues of IoT devices.
increased by using more energy, but by reducing energy Fig 1.3 shows a roadmap for security challenges in the
consumption, the most important thing is to increase the internet of things.
battery life of devices. MAC protocol's key purpose is to In table 1 we have shown a comparison to different
provide high through put while reducing energy techniques of IoT based on different Features.
consumption. It is a challenge for IEEE 802.15.4 and IoT Discussed techniques shows results that are more secure but
low-energy networks to improve throughput with low energy based on the devices input we need a to improve the security
consumption. Several Selfish nodes are wasting time on re- and trust of devices that are collecting data from our
transmitting missing packets. The current transmission and Environment and send it to different servers.
re-transmission must be balanced. New apps with minimal
resources unlimited networking to face the threat. A scheme TABLE 2: A Basic Comparison of IT devices security with
is designed to incorporate energy efficient approaches and IoT devices
throughput for applications with minimal capital. This has
tremendous potential to improve IoT applications by bringing IoT I.T
low power consumption into effect. These devices must be IT devices have a large count
[3] Video anomaly detection has been explored in recent provided with security of resources
years with great results but is not suitable for online work. measures
We present a mechanism that extracts descriptive features Uses heterogeneous method Uses homogeneous methods
from the novel cell structure to describe regions dependent which produce large data which has a high security
on foreground occupation to help coarse to fine fashion. It increasing the attack area
uses a new variable cell structure to remove functionality Only simple and light Can support a high security
from small regions.it take longer but have a high detection algorithms are supported complex algorithm.
efficiency while delivering online performance with a Has devices which has Resource rich devices
lightweight range of features. Our approach works better than hardware and software limits
available methods online and is also compatible with offline
methods.
[4] Crowd anomaly detection is a crucial field for
researchers now a day but most of the available algos for Keywords & Terms: IoT, Smart City, IoT Networks,
crowd anomaly detection are very sluggish, heavy or less Cloud/Edge architecture, Vehicular networks, Block chain,
power-efficient to be applied to battery-powered surveillance Co-saliency, Feature fusion, Malicious Node.
cameras. We are introducing a new algorithm for detecting
crowd anomalies. With high power consumption this 1. IoT
approach offers high precision. This is based on outlier A transparent and robust network of intelligent objects
rejection; those pixels are not considered which do not capable of self-organizing, exchanging content, data and
correspond to the dominant direction of motion. Also present energy, responding and acting in the face of situations and
a new K-means modification that shows great performance changes the world. [6]
as compared to the original method.
[5] The main problem here is the noisy IoT info. And 2. Smart City
maybe there is also a chance that the IoT devices will be A smart city is a term granted to a community that integrates
targeted and fake data produced. Therefore, authors Communication technologies to increase the efficiency and
output of public infrastructure such as electricity, transit and

VOLUME 1, 2020 3
amenities to minimize resource use, congestion and total
costs. [7]
Table 1
3. IOT Networks Time Power Consumption Classification Data Security
Image Can Be
Efficient IOT Based High DNN More
A network to link everything to the Internet based on Reference Feature
Detection
Used
Online
&
Accurate
Technique Low Average CNN
Less
Secure
Secure

stipulated protocols by means of information sensing (R. Leyva,


July 2017)
YES YES YES NO Yes No
No
No
no
Yes
No

(M. U. K. No Yes No
equipment to share data and communications in order to Khan, Feb.
2019)
NO NO YES NO Yes No No Yes

achieve intelligent identification, location, recording, (Wenjia Li,


April 2018)
NO NO YES YES Yes No
No
No
No
No
Yes

(Sefki No No No
monitoring and management.[8] Kolozali, Sep
2014)
NO YES YES YES Yes No No Yes

(Zhifan Gao, No Yes No


YES YES YES YES yes No No Yes
2020)

4. Cloud/Edge Architecture
In cloud computing, the correspondence between the user Synthesis Matrix of Discussed techniques
and the network that delivers the service is clear, without any
external parties being involved. However, increased Cloud
utilization raises storage and network latency and load. Any V. Major Security Threats / Attacks
job for distributed systems is to provide billions of devices There are several types of attack exits which can affect or
target the IoT devices directly or IoT networks. In Fig [1.7]
and process the data generated by each one [9]
shown a taxonomy of different types of attacks.
5.Vehicular Network
1. Node Capturing: IoT devices require many low-
Vehicle networks are a modern form of wireless networks
power modules, including sensors.
that have evolved as a consequence of developments in
Those nodes are visible to the numerous attacks.
cellular technology and in the automotive industry. Vehicle
Attackers can try to catch or remove a malicious
networks are created randomly between moving vehicles
node within the IoT network. The new node can
fitted with wireless interfaces that may be of the same or
look like a part of the network, but it is being
heterogeneous technologies.[10]
controlled by the attacker. It might cause IoT
System security threats.
6. Block Chain
Blockchain acts as a distributed database that enables
2. Sleep Deprivation Attacks: In this kind of attacks
transactions to be carried out in a transparent way.
the attacker try to drain the battery of low-powered
Blockchain-based technologies are springing up, including
IoT edge devices which leads to a denial of service
various sectors from financial markets, the credibility
due to a dead battery from the nodes of the IoT
network and the Internet of Things (IoT), and so on.
network. This can be achieved by using malicious
Nonetheless, there are already several blockchain
code to run endless loops in the edge devices, or by
development problems, such as scalability and protection
deliberately increasing the power consumption of
concerns waiting to be solved. [11]
the edge devices.
3. Side-Channel Attacks (SCA): Aside from direct
7. Co-saliency
attacks on the nodes, there are various side-channel
is a technique which explores whether pictures of various IoT
attacks which leads to critical data leakage. CPU
systems are related. It focuses on region of the foreground
microarchitectures, electromagnetic emanation, and
with image group of similarity. Inspired by the human
their power use, expose valuable information to the
experience of perceptual focus with various backgrounds
attacker. Attacks on the side channels may be based
drawn to the same target. [1]
on power consumption, laser-driven attacks, timing
attacks or electromagnetic attacks.
8.Feature Fusion
Current devices take different countermeasures
Feature fusion is technique used in images co-saliency to find
when integrating the cryptographic modules to
the difference. In this different feature of image groups to
avoid these side-channel attacks.
detect objects [1]
4. Code Injection Attack: in this attack the attacker
9.Malicious Node
inserts some malicious code into the node's
IOT is a network of numerous devices connected to each
memory. As, IoT node software is upgraded on the
other through wireless or wired connection, each device is
air, which provides attackers a backdoor to
called a node of the network. A node which is trying to inject
malicious code injection. Using this malicious code,
wrong information in network or try to access data without
the attackers can perform some unauthorized
authentication is called Malicious node. [1]
functions or even try to access the whole IoT
networks.

VOLUME 1, 2020 3
10. Cloud Malware Injection: The attacker will get
5. Booting Attacks: During the boot time the edge access, insert malicious code or insert a virtual
devices are vulnerable to multiple attacks, because machine into the cloud during cloud malware
at that time the embedded protection processes are injection. The attacker pretends to be a legitimate
not activated. The attackers can take advantage of provider by attempting to build an instance of a
this weakness and attempt to attack the node virtual machine or a malicious node. Through this
way the attacker can gain access to the victim's
devices at restart. As the end devices are mostly
service requests and collect confidential data that
low-powered and often going through sleep-wake
can be changed.
cycles, so the booting phase in these devices is
important. 11. SQL Injection Attack: Middleware is also
vulnerable to an attack by SQL Injection (SQLi).
6. False Data Attack: once the edge node is captured, Attacker can inject malicious SQL statements into
the attacker can use that node to insert invalid or a system in these attacks. The attackers will then
false data into the IoT network. Which may lead to access any user's private data, and even change
invalid / false outcomes and the IoT device can information in the database.
malfunction. Also, the attacker may use this
approach to trigger a DDoS attack. 12. Flooding Attack in Cloud: This attack operates
almost the same as DoS assault in the cloud, which
7. Eavesdropping and Interference: IoT systems impacts service quality. The attackers continuously
are mostly composed of specific nodes deployed in send several requests to a database for depleting
distributed environments. Therefore, cloud services. These attacks may have a
eavesdroppers are vulnerable to certain IoT significant effect on cloud infrastructure by rising
the web service load.
programs. During various phases such as data
transmission or authentication, the attackers can
13. Routing Attacks: In this kind attacks, malicious
eavesdrop and capture the data.
nodes can redirect the route of the data
transmission in an IoT framework. Sinkhole
8. Access Attack: Access attack is also known as attacks are a particular form of routing assault in
Advanced persistent threat (APT). This is a attack which an attacker creates a shortest artificial
where an unwanted person or an attacker gets routing path and draws nodes to channel traffic
access to the IoT network. The intruder can remain into it. A worm-hole attack is also another attack
undetected in the network for a long time to come. and if it is coupled with other attacks such as
This type of attack is used to capture useful data or sinkhole attacks, then it may become a significant
information, rather than doing network harm. IoT security hazard.
nodes collect and transfer essential data constantly A warm hole is a link between two nodes for fast
and are vulnerable to these attacks. transmission of packets. An intruder in an IoT
program will build a warm hole between a
9. DDoS/DoS Attack: During this kind of attacks, compromised node and a computer on the internet
the attacker is bombarding the target database with and attempt to circumvent the simple protection
protocols.
a huge number of inappropriate requests. This
damages this overload the server and therefore
14. Signature Wrapping Attack: XML signatures
disrupts access to real customers. When the
are included in the Cloud servers used in the
attacker uses several outlets to overwhelm the middleware. The intruder breaks the signature
target system then such an attack is considered as a algorithm in a signature wrapping attack and may
DDoS attack or a distributed denial of service execute operations or alter eavesdropped messages
attack. These attacks are not common to IoT by leveraging vulnerabilities in SOAP.
implementations but the IoT network layer is
vulnerable to these attacks due to the nature and 15. Man-in-the-Middle: In MQTT Protocol the
complexity of IoT networks. Most IoT systems are publishing and subscribing clients can be
not well installed in IoT implementations, and decoupled from each other and messages can be
therefore are simple gateways for attackers to transmitted without specifying the target. When
conduct target server DDoS attacks. the intruder can manipulate the broker to become a
The Mirai botnet attack used this flaw and blocked man-in - the-middle, so without any consumer
numerous servers by continuously propagating information, he / she can have full leverage of all
requests to the weakly equipped IoT devices. traffic.

VOLUME 1, 2020 3
The existing work of IoT has been focusing on
architecture of IoT and enabling technologies for seamless
cooperation among smart objects. In Addition, researchers
have developed important IoT application scenarios, such as
e-health, smart home and smart community or smart cities.
As the building block of IoT smart objects with
heterogeneous characteristics need cooperatively work
together to accomplish application tasks and build trust on
the output of IoT devices.
There are several types of attack in IoT network in Fig 1.6
a taxonomy shows the types of different IoT network attacks.
Potential vulnerability inside the Internet of Things (IoT)
has been hitting news headlines on a daily basis during the
last six months, from hacking flights, vehicles, or baby
controls to the insidious monitoring and transmission of
Fig 1.3 (Road map of Security Challenges in IoT) unencrypted messages across the internet through Smart TV.
IoT is an integral part of the transformation from today's
digital business model to the digitization of the whole supply
In recent times there is lots of research in IoT but majority chain, and ' wearable ' penetration in the market space is
is focusing on developing of new algorithms and technique to increasingly growing. For this genuinely revolutionary
maximize the through put of devices using low power as technology to shape the future, still required developments in
most of the IoT devices are hand held or battery powered and edge computing, networks, big data. And while universal
trying make these devices time efficient but there is more adoption is likely to be 3-6 years away, failure to fix security
room in research on trust building and trust management of vulnerabilities would now only complicate the issue for an
Device to make these more reliable and more trustful for IoT linked environment.
humans. Fig 1.5 shows how the IoT evolve in recent years.
Fig 1.4 shows taxonomy of security challenges in IoT

Fig 1.5 (IoT Evolution)


Although retaining customer trust, controlling the volume
and quality of data to be gathered and distributed as well as
resolving end-user behavioral patterns both present complex
challenges.
Companies around the world are spending large amount
on IoT security in recent years in Fig 1.6 a graph is showing
the total spending on IoT security as compared to devices
growth.

Fig 1.4 (IoT Security Taxonomy)

Fig 1.6 (Spending on IoT security)

VOLUME 1, 2020 3
Outliers for Efficient Crowd Anomaly Detection,"
IEEE Transactions on Information Forensics and
Security, 2019.
[5] H. S. a. F. Z. W. Li, "Policy-Based Secure and
Trustworthy Sensing for Internet of Things in Smart
Cities," IEEE Internet of Things Journal, 2018.
[6] A. V. B. U. D. R. TY - JOUR, "An Analysis of
Internet of Things(IoT): Novel Architectures, Modern
Applications,Security Aspects and Future Scope with
Latest Case Studies," Scientific Figure on
ResearchGate, 2015.
[7] D. T. D. R. I. M. F. Nabil, "Trust Management in
Internet of Things," Security and Privacy in Smart
Sensor Networks, 2018.
[8] S. M. P. Keyur K Patel, "Internet of Things-IOT:
Definition, Characteristics, Architecture, Enabling
Technologies, Application & Future Challenges,"
Fig 1.7 (Attack Types in IoT Networks) Book, 2016.
VI. Findings & Purposed Solution [9] V. ,. J. R. M. Gezer, "An Extensible Edge Computing
Architecture: Definition, Requirements and Enablers,"
Trust issue need to focus in IoT and an algo must be defined Book, 2017.
to get data from different IoT device in the same area and it [10] S. M. S. M. J. Hassnaa Moustafa, "Introduction to
should suggest the correct values after analyzing same type Vehicular Networks," in Vehicular Networks, 2008.
of data gathered through various IoT devices. [11] Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, "An
Overview of Blockchain Technology: Architecture,
VII. Conclusion Consensus, and Future Trends," IEEE International
Congress on Big Data, 2017.
The vulnerability problem influencing the Internet-of-
[12] V. S. a. C. L. R. Leyva, "Video Anomaly Detection
Things (IoT) model has drawn significant interest from the With Compact Feature Sets for Online Performance,"
academic community lately. To this end, many surveys have IEEE Transactions on Image Processing, July 2017.
been submitted on different IoT-centric subjects. Trust based
[13] H. P. a. C. K. M. U. K. Khan, "Rejecting Motion
network of IoT has a key role in smart cities. The various
Outliers for Efficient Crowd Anomaly Detection,"
data from different IoT devices can provide important
IEEE Transactions on Information Forensics and
information to achieve risk management. Currently IoT
Security, Feb. 2019.
facing trust issues . we have a comprehensive taxonomy that
sheds light on IoT threats mechanisms, impacts on various [14] H. S. F. Z. Wenjia Li, "Policy-based Secure and
protection priorities and currently offers organizational Trustworthy Sensing for Internet of Things in Smart
Cities," IEEE Internet of Things Journal, April 2018.
information security capability to identify these weaknesses.
[15] M. B.-E. N. F. P. B. F. G. M. I. A. A. M. M. F. T. I. D.
REFERENCES K. a. R. T. Sefki Kolozali, "Observing the Pulse of a
City: A Smart City Framework for Real-time
Discovery, Federation, and Aggregation of Data
Streams," IEEE Internet of Internet Of Things Journal,
Sep 2014.
[1] C. X. H. Z. S. L. a. V. H. C. d. A. Z. Gao, "Trustful
Internet of Surveillance Things Based on Deeply- [16] C. X. H. Z. S. L. Zhifan Gao, "Trustful Internet of
Represented Visual Co-Saliency Detection," IEEE Surveillance Things Based on Deeply-Represented
Internet of Things Journal, 2019. Visual Co-Saliency Detection," IEEE Internet of
Things Journal, 2020.
[2] H. X. a. J. S. J. Abegunde, "A Smart Game for Data
Transmission and Energy Consumption in the Internet [17] G. Z. A. M. Z. A. B. a. Q.-J. T.Wang, ""A secure IoT
of Things," IEEE Internet of Things Journal, 2020. services architecture with an efficient balance
dynamics based on cloud and edge computing"," IEEE
[3] V. S. a. C. L. R. Leyva, "Video Anomaly Detection Internet of Things Journal, 2019.
With Compact Feature Sets for Online Performance,"
IEEE Transactions on Image Processing, 2017.
[4] H. P. a. C. K. M. U. K. Khan, "Rejecting Motion

VOLUME XX, 2017 4

Das könnte Ihnen auch gefallen