978-1-7281-9437-0/20/$31.00 ©2020 IEEE
Study of Security and Privacy Issues in Internet of
Things
Muhammad Hassam Khalid
Study Group, Australia
hassamkhalid@yahoo.com
Mohsin Murtaza
Study Group, Australia
mmurtaza@studygroup.com
Mostafa Habbal
Study Group, Australia
mhabbal@studygroup.com
Abstract—With the advancement of technology and the
internet, almost every device is connected to internet. Internet of
Things (IoT) can be explained as an extension of the internet in
which smart devices are interconnected with each other. While
each smart device has unique identifiers, which makes every
device unique. Now, IoT has helped in developing smart
architectures whether its home, healthcare, financial institutions
or industries. There are smart devices everywhere. These smart
devices can also communicate to each other in a network and they
work together thus eliminating the need for human interaction.
IoT is relatively new and is still developing rapidly. So, there are
numerous privacy concerns in IoT. IoT can be divided into
different architectural layers depending where the IoT is being
used. The IoT model discussed in this research report is Service
Oriented Architecture (SOA) which is divided into three layers,
application, Network and perception layer. In 2020, during the
COVID pandemic the reliability on IoT has increased as people
are working from home and many of the tasks has been automated
using IoT. The number of security attacks on IoT has also been
increased in 2020 alone, which has affected many IoT devices. The
objective of this research report is to discuss a number of security
and privacy challenges in IoT based on the three SOA layers, the
objective of this report also covers discussion on the above
mentioned three layers, different technologies used in each layer
for communication and different attacks and methods which
target each specific layer also discussing different security attacks
on IoT which occur ed in 2020 during the COVID pandemic phase.
This topic is chosen because Internet of Things is becoming
important and is impacting everything around us. It is expected
that the total number of IoT devices will cross 20 Billion in 2020
and will have an impact of more than $11 Trillion by 2025. Thus,
the security of IoT is to be discussed.
Index Terms—IoT, blockchain, architecture, security
I. INTRODUCTION
IoT is relatively a new field in IoT. But, IoT is expanding
unlike any other IoT sector. Any device which can be connected
to the internet and to other devices is Internet of things, these
connected devices can also communicate with each other [1].
Internet of things is a big network of devices and to the people
who share data with each other [2]. A research company
surveyed that the number of IoT devices will reach to 21 Billion
by 2021 [3]. IoT enables to develop architectures like smart
homes which includes IoT devices like air conditioner, motion
detection cameras, smart door locks, smart fridge, TV. IoT is
also mostly used in healthcare and in industries which monitors
the work being done. IoT
will continue to grow because of the characteristics like low
cost, small and protocols like IPv6 which allows billions of
devices to connect to the internet each with unique address [4].
Since, IoT is a new field, it comes with problems which this
sector still faces. Problems like security and privacy issues as
well as no specific architecture model. There are many IoT
architectural models which vendors use to make devices. Thus,
each model has their weaknesses and it makes harder to secure
all the IoT devices. The IoT model discussed in this research
report is Service Oriented Architecture (SOA) which is divided
into three layers, application, Network and perception layer and
security issues and attacks which focus on each of the layer.
II. METHODOLOGY AND DATA
The methodology used for this research paper is the
combination of two research methods which are problem-
oriented method and qualitative method.
A. Problem-Oriented Method
This method includes two parts, understanding the problem
statement and understanding the background of the problem in
depth. This methodology helps in defining the starting point of
the research. Once the problem statement is understood
defining the scope of the research becomes easier.
Understanding the background of the problem domain helps in
determining the base of the problem [5]. In this report the
problem-oriented method was used to understand the problem
statement which is the security and privacy issues in IoT and
understanding the background of the problem which is layers
and different technologies of IoT being targeted by bad actors.
B. Qualitative Method
This method includes gathering information from different
sources, filtering the collected data and using that information
for support for the research [6]. In this research report,
qualitative method was used to collect the relevant information
from a number of papers as support for the research.
III. INTERNET OF THINGS
A. Architecture
The SOA (Service Oriented Architecture) of IoT based on
three layers:
• Application Layer
• Network layer
2020 5th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA) | 978-1-7281-9437-0/20/$31.00 ©2020 IEEE | DOI: 10.1109/CITISIA50690.2020.9371828