Abstract

In this paper, we have proposed a novel approach for the prevention of the Internet of Things (IoT) from fake devices and highlighted privacy issues by using third party Application Program Interface (RestAPI) in Web of Things (WoT). For the ease of life, the usage of IoT devices, sensors, and Radio-Frequency Identifications (RFIDs) increased rapidly. Such as in transport for monitoring vehicles, taxi services, healthcare for patient’s health condition monitoring, smart cars, smart grids, and smart homes, etc. Due to this for financial gain attackers are targeting these networks or protocol and adversaries are trying to damage the reputation of the organization or to steal intellectual property. From the last two decades or more, the injection vulnerabilities are more threatening security risks for the web application still exists. The new security challenges occur for the security professional or security researchers in the form of IoT or WoT (Web of Things) communication protocols implementation. These protocol Message Queuing Telemetry Transport (MQTT), Constrained Application Protocol (CoAP), WebSockets, and RestAPI have a different type of security issues. Respectively insertion of fake devices, authentication is not implemented in WebSocket connections, and user’s privacy can be leaked with the use of RestAPI without its validation. We have developed a program in Personal Home Pages (PHP) for the detection of new devices in the IoT network. With this, the user’s privacy and data will be protected along with some critical security issues of WoT underlying protocols.

Highlights

  • As the Internet of Things (IoT) devices usage is growing rapidly day by day for the easiness in today’s busy life

  • The scholar mainly discussed the security of devices as the main part of that area and considered the layer as secure which is similar to the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol that consists of security systems and techniques for the IoT networks [15]

  • An attacker can scan the network for this protocol and if he found it impersonate his device to that targeted network

Read more

Summary

INTRODUCTION

As the IoT devices usage is growing rapidly day by day for the easiness in today’s busy life. This WoT architecture does not describe the implementation of the communication method between these Things, but this has simplified the deployment of IoT software applications [5] Another advantage of this the interfaces and working of Things are explained very well, due to this the information collected from big data cloud and installation of different vendor’s devices with their monitoring has been made with low cost and administrative efforts. At the top of all the web application security issues such as Structured Query Language (SQL) injection, Cross-site Scripting attacks, session www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 11, No 3, 2020 hijacking, integrity issues of information, click hijacking, link redirections, and usage of third party Application Program Interface (APIs) with well-known vulnerabilities, etc Along with these security issues the new problems have occurred with the use of MQTT, WebSocket and CoAP communication protocols between webservers and these devices.

RELATED WORK
Maintaining the Integrity of the Specifications
Thing Description
WoT Gateway
WOT PROTOCOLS SECURITY ISSUES
MQTT Protocol
PROPOSED SOLUTION AND DISCUSSION
A Function for New Device Auto Detection
Alert Generation Function
Log Collection and Storage Function
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.