AbstractInternet of Thing has been a considerable attention from lastfew years. It was first proposed by kelvin Aston in 1990. This paper is generalsurvey of security and privacy issue and their standardization that end usermay face. This survey paper focus on layerof Security issue on data transmission in Iot.
1. INTRRODUCTIONInlast decay, the iot has become trending through representative application (e.g.
intelligent transportative , green house monitoring, telemedicine monitoring).The term internet of things refers to the network of physical devices, machine,home appliance, vehicles and other item which embedded with network andelectronics, which put up the data from their sensors to the cloud and otherstructural representative software through a network. The Iot allows tosense or remotely access the objectthrough network infrastructure. That give us sophisticated technology between physicalworld and computer system and it improve efficiency, accuracy and instance datadeliver through network parameter.
Term “Thing” in the IoT refer to the wide variety of devices like camerastreaming and control, automobile with built in sensors, biochip, DNA analysis. Legal scholars suggest regarding “Things” as an “intertricable mixture ofhardware, software, data & service”. The word “The internet of things” wasproposed by kelvin Ashton of procter & Gamble (P & G), later MIT’s Auto – ID center in 1999.2.
EVOLUTIONBefore doinginvestigation of the IoT in depth, It is Worthwhile to know the evolution ofthe internet. In the late 1960s the computer communication between two computerwas made possible through a computer network. Later in 1980s , the TCP/IP stackwas comes in the light. After that commercial use of the internet comes.
Later theworld wide web (WWW) become at more popular in 1991 which help internet to gainmore popularity and rapid growth. After uses of www, user was going oreforwarded and connect internet to mobile and form mobile internet. Later on theinvention of internet the next step to connect object around us to each other(e.g. M2M) and interchange data viainternet.IoT helps increating the world where all object may easily connect to each other viaInternet. The final goal is to create “a better world for human being” whereobject around us know what we like and what we need, and they act accordinglywithout less human interaction3. By the mid of1990s , web servers were allowed to added in embedded product.
Thesemanufacturers were rapidly integrating internet connected system into the highvalue asset tracks, fleet management. They like it for more than 15 years.However it is getting easier to integrate M2M machine system as more powerfulprocessor are in incorporated into the end nodes 4. And these processorssupport high level operating system (OSes). Fig. 1 (a) Evolution of Internet of Things 3. APPLICATIONLater on 2010 asurvey were done by IOT-I project which identified IoT’s application 4.
Whichwere grouped in 14 domains viz; transport, smart home 6, smart city 7,lifestyle, retail, agriculture, smart factory, supply chaine, emergency, healthcare 5 and energy. This survey paper was based on 270 response from 31 countries. 3.1. IoT IN MEDICAL APPLICATIONDue to rapidgrowth of population and population aging. There are arising of challenges toequally serve the health treatment. Because, some rural areas has no healthcare center. So they are usually suffer from big problem regarding their healthissue.
· Thereis a serious shortage problem with medical staff, specially in rural area, lackof medical instrument kit, low lwvwl of treatment.· Inadequatedisease prevention & early detctio capability. · Theimperfect diseases prevention system cannot meet the national strategyrequirements to safeguard the health of the citizen becoming heavy burden oneconomy, individuals, families and state.
Toovercome these issue, remote monitoring & management platform of healthcare, information (RMMO-HI) 5 can easily monitoring and managing of theselifestyle diseses. So we can easily prevent from these disease. Fig.2(a). Framework of healthcareservice 5Regardlessof restrictions of location, time and human activity state, RMMP-HI can collectthe body medical information timely through variety of sensors. Which areloaded in the human body. These informative data sent to the nearby datasharing center.
Where doctors can easily handle more than one area of people atone place. It also analysis these data them self and notify real time , whensuspicious result will found. IT also useful to maintain the nation record ofpeople medical information for higher research and development in medical field. Body medical sensors areresponsible for register and delete, constituting Medical Body Area Network(MBAN)automatically 3. As we can see in fig.
short-range wireless communicationsensors module can easily transmit human information to mobile phone or homegateway. This medical information is uploaded to datacenter and processingtimely. Then the important result will be send back to the respectiveperson.First-aid notification is delivered to nearby health care center andthen they deliver emergency service to the patient.3.2.
IoT IN SMART HOME In recent years, peoplehave higher and higher requirement not only on the automation an information ofhousing and accommodation, but also on the flexible control of house holdappliance and the accessibility of acquiring the external information alongwith the rapid development of network technology 6 and communicationtechnology and for meeting the need of the “Well-off society”. Thus a wellimproved smart home network is demanded to establish. In the smart home system,So that home life become more comfortable, safer, and more effective throughthe overall management.Atpresent, all kind of low transmission rate data such as sensors, lighting,entrance guard, and equipment switch with a small data capacity have beenmaturely monitored and controlled through existing zigbee technology solution.However, there have been no related research on the collection and thetransmission solution of the voice, image and video data. In most relatedresearchs at home and abroad, the advantage of applying zigbee technology tosmart home network have been proven. In the domestic furniture system theapplication of the traditional sensors such as temperature, humidity, gas,smoke and CMOS camera to implementing the collection of image information inthe home network is mainly researched, The different control methods such asrelay control, infrared control, serial port control, and EIB control aremainly discusses in term of network structure, the network structure is designed as a starstructure in most researches. 4.
PAYATTENTION TO SECURITY IN IotThe informationsecurity and network may be catogeries with some properties likeidentification, confidentiality, integrality and underiability. Different fromother technology , IoT deals with our private data such as health information,home camera surveillance , home light system etc. Thus security must higher inavailability and dependability. A. SECURE ARCHRTECTURE Generally IoT have been catogerous infour key level . Fig. 4.
Security ArchrtectureThethird layer will be support platform for the application layer, through thissupport platform all data will be organized through network grid and cloud. Itcombining application layer upward and network layer downward. The terminallevel is application layer which is at top most. This gives user to customizeservices according to their need. User can access internet of things throughapplication layer interface using television,, personal computer or mobiledevice.
4.1 SECURITY AND PRIVACY CONCERNS INIoTInternet of things is a virtual networkbetween real world and computer with real-time interaction. At initial stage ofdevelopment of IoT is M2M, having deployment contexts and subscription.Unapproachable operation is done without human interaction by the wireless areanetwork (WAN) or WLAN. As the improvement in social efficiency it arising ofnew problem concerning security and privacy breach.
3 4.1.1. FRONT-END SENSORS AND EQUIPMENTFront end perceptual layer send data fromdifferent sensors and RFID reader to different modules of M2M device, Thismethodology involves the machines security with business implementation &node connectivity 5 . Perception nodes are generally catogariousin the absence of monitoring sensors. An intruder may be easily get access anddamage these devices and their data, and denial of services attack.4.
1.2. NETWORKNetwork playsan important role providing a more comprehensive interconnection capability,effectualness and thriftiness of connection, as well as authentic quality ofservice in IoTs.
Since a large number of machines sending data to networkcongestion, large number of nodes and groups exist in lOTs may be resulted indenial of service attacks2. 4.1.3 BACK-END OF IT SYSTEMBack-endIT systems form the gateway, middleware, which has high security requirements,and gathering, examining sensor data in real time or pseudo real-time toincrease business intelligence. The security of IoT system has seven majorstandards viz; privacy protection, access control, user authentication,communication layer security, data integrity, data confidentiality andavailability at any time.5.
STANDARDIZATION:ADDRESSING THE IOTCHALLENGES THROUGH ADEP AND ANALYTICS · Fragmentation!1. Connectivitystandards2. Operatingsystems3. Topologies4. Security · Expectdiverse solutions, so1. Softwareabstraction (APIs) needed at each node2.
Multitenant environment needed for security.3. Alwaysuse Https instead of http. 6.
ConclusionThrough this paper we have surveyed all the securityissue and their standardization existing in the internet of things. Weidentified several loophole related to the security and privacy that Shouldbe addressed by manufacturer to mekebest and made a best secure plateformfor delivering the Future IoT. · Simplified application collaborationthroughStandardized interfaces of the application development ecosystem.· Autonomous and smart behavior through analytics capability and standardized data exchange format and interface.· Processes, procedures andinterface toensure that privacy and confidentiality ofuser is maintained.
· Expandthe applicable device ecosystem andreduce deployment time withstandards-compliantdevices and applicationrequiringlittle or no customization.· Providean ecosystem that readily allows applicationsto share information and experiences.· Assuresa secure communication environment for user privacy and confidentiality.