Abstract

Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation. With the advent of Industry 4.0, Internet of Things has been started to be used and it has led to the emergence of innovative business models. The processing and production capabilities of Internet of Things objects in hidden and critical data provide great advantages for the next generation of Internet. However, the integrated features of Internet of Things objects cause vulnerabilities in terms of security, making them the target of cyber threats. In this study, a security model which offers an integrated risk-based Internet of Things security approach for the Internet of Things vulnerabilities while providing detailed information about Internet of Things and the types of attacks targeting Internet of Things is proposed. In addition, in this study, the vulnerabilities of Internet of Things were explained by classifying attack types threatening the physical layer, network layer, data processing layer and application layer. Moreover, the risk-based security model has been proposed by examining the vulnerabilities and threats of smart objects that generate the Internet of Things. The proposed Internet of Things model is a holistic security model that separately evaluates the Internet of Things layers against vulnerabilities and threats based on the risk-level approach.

Highlights

  • Technological advances have been an important factor that increase the productivity and efficiency by determining the direction of industrial development and have led to significant industrial revolutions until today.[1]

  • We describe Internet of Things (IoT)-specific vulnerabilities and their features by investigating related security weaknesses and threats

  • Security vulnerabilities occur when IoT platforms fail to provide any of the three fundamental security elements known as ‘‘privacy,’’‘‘integrity’’ and ‘‘accessibility.’’ In order to ensure a high level of security of IoT platforms consisting of sensors and intelligent objects, a new approach with four layers has been proposed to determine the threats and weaknesses according to the layers and to take countermeasures based on three fundamental elements of security according to the risk-based assessments

Read more

Summary

Introduction

Technological advances have been an important factor that increase the productivity and efficiency by determining the direction of industrial development and have led to significant industrial revolutions until today.[1]. Security vulnerabilities occur when IoT platforms fail to provide any of the three fundamental security elements known as ‘‘privacy,’’‘‘integrity’’ and ‘‘accessibility.’’ In order to ensure a high level of security of IoT platforms consisting of sensors and intelligent objects, a new approach with four layers has been proposed to determine the threats and weaknesses according to the layers and to take countermeasures based on three fundamental elements of security according to the risk-based. Known as the sensor layer, can be summarized as the sensory organs of the IoT platforms, where the data are collected and the objects are detected In this layer, RFID labels, barcode, Bluetooth, wireless sensors and protocols such as LTE (long-term evolution), ZigBee and NFC (near-field communication) are employed for different types of sensors. Encryption methods should be used to protect data in the thirdparty or untrusted environments where privacy

Evaluation
Conclusion
Is the processing of data on the IoT
Have the best recommendations been
11 Are there any IoT data processing
15 Are the best security recommendations
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call