Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: D. Radha, Dr. M.G Kavitha
DOI Link: https://doi.org/10.22214/ijraset.2023.51896
Certificate: View Certificate
The internet of things is the ability to mechanically transfer knowledge over a network. IIoT has been wide enforced in industries like manufacturing and F&B. To meet the difficult paradigms of wireless device networks like Energy potency and accommodative mechanism, the device nodes are increased with IoT support. IoT allows streamlining of information that may manage and monitor the industrial activities within the sensing space. Security issues arise within the space wherever IoT is used. There is a need for a information sharing system which should be directly implemented on the required field of the IoT system. The functions to be performed between the individual and the IOT system are generated as a set of functions in the IOT information sharing system. In order for the users to share the transactions within the system a storage database called a blockchain is used, this blockchain stores all the processed transactions and keep them safe from any adversaries. These information’s are stored and are available for each and every user or the nodes in the network. These informations are stored in the form of a public ledger which in turn can be easily modified and restored by all the user that are using ths system. as the intermediate proxies are used as a result secutity issues with the CoAP messages will rise which can be nullified by the use of Object Security of CoAP (OSCoAP) an IETF draft.
I. INTRODUCTION
There now is appreciable interest within the internet of Things (IoT) as an evolution of information communications that permits direct, persistent, and automatic device-to-device communication also called Machine-to-Machine [M2M] communication. IoT security threats aren't only malfunctions and stoppages of product and services. it is necessary to determine a detailed cooperation structure between IoT product and service companies to reduce security incidents and to prevent and prevent security threats preemptively. The principal applications of blockchains to this point are for monetary transactions’ execution, sensible contracts, and crypto currencies. IoT devices are miniaturized in size and typically operate batteries. the value of those devices has drastically belittled that makes a window of chance for his or her giant deployments in close to future. the protection concern in IoT devices has because of compromised IoT devices. The secure version of CoAP, known as CoAPs uses datagram transport layer security (DTLS) in order to secure the communication at the transport layer. IoT developers should take a strong initiative to bring secured devices to manage loss of data, theft, and integrity compromise.
II. RELATED WORK
Due to the less storage capability, memory and process capability, several IoT devices need to be operated on lower power and therefore, the protection measures fail here and therefore the devices become the victim of cryptanalytic processes that communicate data safely in expected length. These expedients square measure a great deal prone for power analysis attacks (lateral network attacks), which may be used to converse contrive these formulas. On the hand, forced expedients usually only utilize quick, in substantiate encryption processes [2].
The idea of blockchains is currently receiving extended analysis and sensible interest. Blockchains offer knowledge in- tegrity across an outsized range of transactional parties by providing all participants within the scheme with a working proof of redistributed trust; classically, this assurance of integrity had to be achieved by utilizing a trusty third party to ‘escrow’ parts of the group action –a blockchain replaces this trusty third party. The blockchain as such pro- vides universal accessibility, honesty, openness and therefore the ability to store and transfer information during a secure manner. several applications of blockchains have emerged within the recent past beyond the initial applications of cryptocurrency, like bitcoins. the information will, in fact, represent a large style of parts, documents, facts, packets, transactions, agreements, contracts, financial transactions, or signatures. A blockchain will support a large vary of tasks, together with permitting parties to draw up trustworthy contracts, storing sensitive data, and transferring cash safely all without the intervention of an mediator[4].
The information security sharing system performs four functions and performs the subsequent tasks
Security of application layer information in IoT is that the subject of the many recent analysis works because of the rising nature of IoT technology. The CoAP security additionally got similar attention from the analysis community. historically, CoAP messages are secured with DTLS known as the CoAPs protocol. a serious issue with DTLS is that its header is simply too long to suit during a single 802.15.4 maximum transmission unit (MTU) of 127 bytes. many approaches have antecedently been adopted so as to reduce the DTLS header overheads. for instance, the header compression mechanism of 6LoWPAN is employed in for reducing the DTLS header overheads in CoAPs.[1]
III. INFORMATION SECURITY FRAME WORK
A. Requirements
The following are the requirements of the functions needed to control the IoT data security sharing system.
2. Iot provides real-time observation perform for a few industries (ex. Good medical)
System handling (collection, analysis, processing, sharing) of cyber threat data
3. Supports Cyber Attack Identification And Incident Analysis
4. Construction Of A Proactive Response System
5. Institution of technical system for every IoT industry
6. Periodic implementation of cyber attack simulation training
B. System Design Methodology
Figure 1 shows the basic information management procedures in the IoT information security sharing system. Each procedure is conducted in the following order: information collection, information analysis, information sharing.
IV. INFORMATION VALIDATION
A. Information Gathering And Sharing Restrictions
In the IoT information security sharing system, there is a requirement to prevent and minimize the harm by predicting the infringement at the event reporting and assortment stage. consequently, it is necessary to divide the classification of the accident report and also the collected data into the Central Intelligence Agency form for the clear analysis, and also the data sharing step should be carried out based on the classification. The collected and shared data could include confidential information of the corporate and also the management department. Therefore, it's necessary to gather and share data by handling authority.
B. Authentication Required
The ability to attach devices on to these new computing technologies provides an amazing chance to all who interact with complicated ecosystems. but to create the vision of of these interconnected systems a reality, confidentiality within the information changed and authentication of the devices interacting is needed. this will be provided by end-to-end information security approaches. The term ‘Diffie Hellman key Exchange’ refers to any system that employs pairs of keys.
C. IOT Block Chain Approaches
IoT will utilize blockchains to confirm integrity of the business logic information.
D. Coap Approach
The exchange of cross-layer data in our projected approach is highlighted. CoAP is an application layer protocol designed for resource-constrained devices in Internet-of-Things (IoT). Object Security of CoAP (OSCoAP) is an IETF draft for addressing security problems with CoAP messages that may arise with the utilization of intermediate proxies. These proxies are employed for higher performance, measurability and offloading expensive operations. OSCoAP adopts the counter with cipher block chaining message authentication code (CCM) mode of documented encoding with associated information (AEAD) that at the same time ensures confidentiality, integrity, and authentication of the messages. a cross-layer approach towards exploiting the CCM for OSCoAP victimisation mac-layer security suite in IoT devices. The motivation is predicated on the very fact that the majority of those devices are equipped with 802.15.4 radio chips. The IEEE 802.15.4 standard mandates the availability of some security measures for mac-layer coding in these radio chips together with the CCM.
V. ENERGY CONSUMPTION
To resolve the protection problems, local interference should even be thought-about. Mechanical and electronic problems should be considered to elude any weak security links that may be developed. The GoAhead internet server is extremely popular hardware vendors. since it will run on devices with restricted resources, like internet of Things (IoT) devices, routers, printers, and different networking instrumentality. The cyber-attacks show that the internet of things (IoT) is punctured with vulnerability. It will be ascertained however botnets are created from system weaknesses and have controlled low security to interrupt several devices and services.
In this survey, the information management procedures that may be generated through the institution of reference model of IoT information security sharing system are divided into information assortment, data verification and analysis, and information sharing. Also, within the method of assembling and sharing data, we tend to outlined the type and temporal arrangement of the shared data so on secure the protection and confidentiality of the shared data and establish the rating of knowledge sharing. Future analysis ought to be directed, among alternative efforts, at distinguishing that IoT applications are best suited, at the sensible level, to implement security mechanisms and the way the distributed databases that support IoT will be optimally implemented.
[1] Abdul Hameed, Adnan Noor Mian, Rizwan Hamid Randhawa, “Energy Efficient Cross-layer Approach for Object Security of CoAP for IoT Devices” , Elsevier ,Ad Hoc Networks Volume 92, September 2019. [2] Abhrajeet Nandi, Debabrata Samanta, Mohit Agarwal, R Gurunath , “An Overview: Security Issue in IoT Network”, IEEE Xplore,2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018. [3] Ala Al-Fuqaha , Mohsen Guizani , Mehdi Mohammadi “Internet of things: a survey and enabling technologies, protocols and application” IEEE Communication Surveys & Tutorials, Vol. 17, No. 4, Fourth Quarter 2015. [4] Benedict Occhiogrosso, Daniel Minoli “Blockchain mechanisms for IoT security”, Elsevier, Internet of Things, 2018. [5] Bruno A. Mozzaquatro, Ricardo Jardim-Goncalves, Carlos Agostinho “Towards a Reference Ontology for Security in the Internet of Things” IEEE Instrumentation and Measurement Society. [6] Edit Csizmás , László Kovács, “Lightweight Ontology in IoT Architecture” , IEEE International Conference on Future IoT Technologies (Future IoT),March 2018. [7] Guizi Chen , Wee Siong Ng “An Efficient Authorization Framework for Securing Industrial Internet of Things” Proc. of the 2017 IEEE Region 10 Conference (TENCON), Malaysia, November 5-8, 2017. [8] Jongsoek Choi ,Sunok Cho , Yongtae Shin “Study on Information Security Sharing System among the Industrial IoT Service and Product Provider” IEEE International Conference on Information Networking (ICOIN),2018. [9] Roderick Hodgson, Secure Chorus, “Solving the security challenges of IoT with public key cryptography”Article?in?Network Security 2019(1):17-19, January 2019.
Copyright © 2023 D. Radha, Dr. M.G Kavitha. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET51896
Publish Date : 2023-05-09
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here