© December 2021| IJIRT | Volume 8 Issue 7 | ISSN: 2349-6002
IJIRT 153413 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 193
IoT security a layered Approach for Attacks and Defenses
Ankit R. Patel
1
, Jigneshkumar A. Chauhan
2
1
Research Scholar, Ganpat University
2
Assistant Professor, Ganpat University
Abstract - Internet of things(IoT) are everywhere in our
daily life. Internet of things is the connection of
embedded technologies that contained physical objects
and is used to communicate and intellect or interact with
the inner states or external surroundings rather than
people to people communication. Internet of Things(IoT)
includes millions of connected devices that can sense
,compute, and communicate data. Recent advancements
in wireless technology have created an exponential rise in
the number of connected devices leading to the internet
of things(IoT) revolution [7]. Large amount of data is
captured, processed, and transmitted through the
network by IoT devices. Security of the transmitted data
is a major area of concern in IoT networks. security is a
big challenge in IoT numerous encryption algorithms
have been proposed to ensure security of transmitted
data through the IoT network[7]. we analyzed the
various challenges and security requirements and
various light weight cryptographic algorithms.
Index Terms - IoT, Security, Privacy, Radiofrequency
Identification, Lightweight Security.
INTRODUCTION
Internet of things (IoT) is a collection of things
embedded with electronics, software, sensors,
actuator, and connected via the internet to collect and
exchange data with each other. The IoT devices are
equipped with sensors and processing power that
enable them to be deployed in many
environment[3].the fast growth of the number of IoT
devices utilized is predicted to reach 41 billion in 2020
as stated in the 2013 report of the international Data
Corporation(IDC). The IoT device can create
information about individual’s behaviours, analyze it,
and take action. Services provided by IoT applications
offer a great benefit for human’s life.
Fig.1 Different Layer of IoT
Sources : https://www.researchgate.net/figure/The-
five-layer-IoT-architecture- 114_fig7_309606980
Security and privacy remain huge issues for IoT
devices, which introduce a whole new degree of online
privacy concerns for consumers. That’s because these
devices not only collect personal information like
user’s name and telephone number’s but can also
monitor user’s activity[3] To address these challenges
when many smart devices are connected in an IoT
environment, the increasing demand for the use of
appropriate cryptographic solution into the embedded
applications. However, these smart devices generally
have constrained resources, or they can be called low-
resource devices in regard to their low computation
power, limited battery life, small size, small memory,
and limited power supply. Hence, the conventional
cryptographic primitives might not be suited for low-
resource smart devices. For example, the 1204-bit
RSA algorithm [12]
HOW IOT WORK?