A Review on Internet of Things (IoT): Security Challenges, Issuesand the Countermeasures approaches

In the present scenario, Internet of Things is playing vital role in the next era of communication. The IOT applications like smart cities, smart houses, smart livestock, smart health care, smart climate etc.It can be lead to many security challenges and issues. The aim of this survey focus on the main objective of the security challenges and issues in the data privacy, security, confidentiality, integrity, availability, access control, encryption, default password, malware and ransom, botnet, phishing, cloud, routing and trust management and discussed recovery from mention security defies. This study has detailed review of IoT layered design, each of these layers having lot of security challenges such as threats, vulnerabilities and attacks. Understanding these challenges and associated countermeasures mechanism with the help of the secure routing.


Fig 1 -Evolution Model of IOT
According to the Cisco data source, it is significant that IoT proves that future evolution of internet has beenshiftingthe whole IoT. The Table 2 shows the future evolution of IoT connected devices .

Applications of IOT
The survey paper [2] hassummarized the various IOT applications are discussed in this paper.

Smart
Cities:It contains smart hospices, insolentlightning, smart path, traffic organizationetc., Smart Environments:It comprisesseveralIoT applications likeforest fire uncovering,disaster management, air pollution, snow level monitoring, early earthquake and river flood detection etc., Smart Homes: It embracescountlessapplications of IoT. For example, lightning controller, garden maintains, intruder's detection system, water supply consumption etc., Smart Agriculture: It includes various IOT applications smart farming, diseases monitoring, monitoring, crop health monitoring etc.,

Characteristics of IoT
IoT is a assemblage of devices which is attached with internet. Itcollects and transfer the information using nodes and controllers. The following characteristics are discussed in this section [19].
i) Connectivity: Internet connectivity is attached with in the devices and sensors. ii) Communication: Everythingis unified with comprehensiveevidence and communication structure.
iii) Things related services: IoT is capable of traditional and non-traditional computer things related services. iv) Security:IoT may be transmitting sensitive data, it is very significant to givedata privacy and security. v) Energy Efficient: The IOT devices should be having power backup. vi) Sensor: It is an important supporting device in IOT. vii) Heterogeneity: The IOT devices based on hardware and Network platforms. viii) Dynamic Environment: The IoT devices support dynamic environment. ix) Enormous scale:The IoT technologies support to control more number of devices and which interact.

IoT Challenges
Security is one of the key threats in IoT applications that involve the following problems and issues in recent IoT applications [1][2][3][4][5]. All these challenges, attacks and countermeasures are discussed in the section 3.

IoT Layered architecture
Application of IoT consists of four layers:i) Layer of Perception ii) Layer of Network iii) Layer of Middleware iv)Layer of Application [2, 8, 20, and 21]. The Figure 4 shows the IoT layered architecture. In this architecture discussed the various devices and technologies are available in each layers. The Section 3 will be discussing in the various security challenges, threats, vulnerabilities, attacks and counter measures details in each layer.

Perception layer
In other words it is called as physical or sensor layer. There are many kinds of sensors such as actuators, sensors, etc., attached to the things to gathering data.

Network Layer
The network layer is named as transport layer. It carries and communicating the information from the middleware to the processing layer.

Middleware Layer
It is also known as the processing layer. It acts as a conduit between thetransport and application layer. This layer provides Application Programming Interface (API)and cloud storage. This can also offer powerful competencies in computing and storage.

Application Layer
The customer has been provided service in the application layer. It has the duty to give the application the services.
The forthcoming part of the study covers Literature Review, Security challenges, threats, vulnerabilities and attacks in IoT applications. Counter measures of security challenges, Discussion, Conclusion and References.  The key goal of security related issues and sources of danger in this survey is to achieve a high degree of confidence in IoT applications. Discussed are the various technologies for rising the level of protection in IoT such as block chain, fog computing, edge computing and machine learning.

II. Background
2017 A roadmap for threats to security in the Internet of Things Detailed analysis of the systematic and cognitive approach to IoT security, and discussed in IoT privacy , trust, identification, and access control. 2017 Internet of Things: A survey on the security of IoT frameworks In this paper, we survey the security of the main IoT frameworks, for each framework, we clarify the proposed architecture, the fundamentals of emerging third-party smart apps, the well-matched hardware, and the security structures. The companies produced devices to enforce functionalities but overlooked some serious problems affecting the security of the system. The revolutionary technique of IOT security systems using Berkeley Packet Filters (BPFs) is tackled in this report.

[7]
2018 On security problems in the Internet of Things and transparent issues The goal of this paper is to address security issues in IoT systems and IoT applications. Moreover, it also describes proposed architectural security projects, evaluated and available problems. [9] 2019 IoT Compliance Issues and Drawbacks The aim of this paper is to provide an detailed overview of security issues in IoT environments. In addition, the survey was conducted to take the views of researchers and IT experts on the main challenges and constraints of the internet of things technology.

[10] 2019
IoT Challenges and Countermeasures Throughout this article, IoT solutionsare discussed security problems and security concerns in the IOT world. [11] 2018 IoT and Mobile networking using current communication technologies The biggest obstacles to align WSN nodes with the MANET nodes in this proposed IoT architecture as the nodes have different amounts of resources, heterogeneous protocols and chances of snooping. The suggested countermeasures that include network protocols, distribution of range and node, MANET routing and versatility pattern and finally implementation of IoT applications. [12] 2018 A systematic survey of IoT attacks focused on a Buildblocked Reference Model Within this paper an advanced four-layered IoT was proposed, IoT asset-based surface attack reference model, Second, IoT protection targets set. Fourth, define taxonomy of IoT attacks for every asset. Finally, demonstrate the www.psychologyandeducation.net relationship between each attack and its violated security goals, and also define a collection of countermeasures to protect each asset. [13] 2017 Security attacks in IoT: A survey In this survey discussed various level of IOT attacksand discussedcountermeasures and finding the most noticeable attacks in IoT. [14] 2014 Security challenges in Internet of Things: survey In this survey article analyzed the security challenges face in Internet of things, such as privacy, confidentiality, integrity, authentication and access control. [15] 2015 Internet of Things: Effects on security and privacy The Internet of Things ( IoT) has a new security privacy risk that IoT system manufacturers are not able to anticipate. The IoT systems aid in processing, analyzing, tracking, and exchanging large amounts of data with other networked devices and users. The article aims at reviewing the privacy of a user is insecure and evaluating the approaches to address privacy problems of the user. This survey paper discusses the relationship of cyberphysical systems (CPS) and IoT, fog / edge computing and IoT, IoT architectures, IoT technologies, and IoT protection and privacy problems, and finally addressed the various smart applications and how to apply fog / edge computingbased IoT in real-world applications.  This study covered description of the various layered architectures and IoT attacks on IoT is discussed. In addition, a process analysis which helps to provide security solutions along with a novel stable layered IoT architecture was proposed to help to solve the security issues. [21] 2019 IoT Applications and Security In this paper, IoT smart applications were addressed and the concepts of security criteria including data confidentiality, data integrity, availability, authentication and nonrepudiation are also applied.  Robustness, protection and privacy in location-based IoT systems: a sample, a special section on security and privacy in applications and potential Internet of Things systems, This paper addresses strategies for enhancing the threats to robustness, security and privacy and cryptographic solutions related to location-based services in IoT systems, and finally examines policies and procedures for security and privacy issues of IoT-location-based services.

III Threatsagainst Safety, Vulnerabilities, Attacks in IoT Environments
Safety is a primary aspect of applications of IoT and devices. In this section various security terminologies such as threats, vulnerabilities and attacks are discussed in details.

Standard IoT Security Principles
The security has become one of the most important areas in IoT applications. The following figure illustrates the standard IoT security principles in IoT Environment. The information should be preventing from the unauthorized person and to make data confidential. The organization make a security policy and procedure helps to access information only authorized person.

Integrity
The integrity should not able to modify the data during transmission.

Privacy
The user personal information should not be disclosed to any one during the exchange of information.

Availability
The information must be available every authorized request at all times.

Authentication
The system is confirmed by authorized person's identity, once the identity is confirmed; authorized person has rights to access the particular system.

Authorization or Access control
The authentication process over and then go to authorization, given permission to access system and other login restrictions.

Non Repudiation
The non-repudiationmeans is the guarantee that someone cannot repudiate the legitimacy of something.

Resiliency
This security principle protects the system and data from any attack.

Fault Tolerance
It refers to the IoT interconnected devices continue to give security services without any interruption supposed to be if any one or more system fault.

Self-Healing
If any one of the devices may fail .The remaining interconnected devices support to operate the system with minimum level of security.

More IoT Devices:
Further IoT devices mean to increased vulnerabilities in terms of security and this is a growing concern for security professionals.

Weak and Default password:
Most IoT devices come with poor, original default passwords.

User unawareness:
The user has a lack of security training and knowledge of the IoT technologies is possible to attack their IoT environment.

Lack of Encryption and authentication:
The user has a lack of Encryption and authentication mechanism is one of the biggest challenges in IoT technologies..

Malware attacks:
It is a malicious program deliberately designed to gain access to or harm an infrastructure without the knowledge of the owner.

Botnet attacks:
A botnet occurs when hackers remotely monitor and use internet-connected computers for illegal use.

Phishing attack:
Hackers are enabled to send a signal to an IoT system that causes several complications.

Data privacy and Security:
As per the security audit results, approximately 90 percent of IoT devices collect user personal information in some way. This unauthorized collection of information is vulnerable to attacks against data protection, privacy and dignity.

Threats to eHealth IoT Devices:
They use Biomedical Sensor Network (BSN) to monitor the health of patients. Due to mobile nodes, power limitations and low bandwidth IoT communication protocols BSN has dynamic network topology. Therefore, BSN is vulnerable to various attacks including DoS, eavesdropping, and release of personal health information without authorisation.

Device Integrity:
Data is forwarded between computers. IoT end devices, however, still run in a less secure environment, without any physical protection, hardware attacks, side channel attacks, etc.Software/Code Integrity: www.psychologyandeducation.net In IoT, the lack of anti-virus / malware detection system contributes to attacks on the credibility of an end device's code / software. Example : Mirai malwareattack default usernames and passwords

Hardware Vulnerabilities:
Commercially designed hardware devices are developed with more emphasis on the functionality of the system rather than protection. Commercial IoT systems therefore have certain hardware bugs that can be exploited remotely.

Dos Attack:
Both of these attacks would most likely impact the operational functionality of IoT systems and their services will not be accessible to the respective users.

Security Issues of RFID and Bluetooth Devices:
Despite of lack of physical security RFID tag data is vulnerable to attacks on confidentiality and honesty. Likewise, using unpatched versions of Bluetooth devices will lead to unauthorized / malicious devices being attached.

Eavesdropping on Wireless Communication:
Attackers will mount endnode-like devices on an IoT network to sniff valuable user information

IV IoT Security counters measures
The main objective of the security mechanisms helps to reduce the risk extenuation is to reserve security and confidentiality, discretion, Integrity and availability, confirming the safekeeping of the users, environment, information and sensor devices of IoT. In this section focused various security counter measures in IoT.

Authentication Mechanismto against attack on IoT devices:
The authentication mechanisms is one of the greatest method in the current scenarios it is given permission to access IoT devices in the network and which is help to reduce the attacks to the IoT environment such as spoofing attacks are MIM, Reply outbreak, Buffer overflow outbreak, etc.
The authentication is the primary onset in terms of standard safekeeping principles in systemsecurity. This process helps to provide identity the user is established with proof and confirmed by a system, The IoTauthentication process implements the two or more authentication approaches in IoT devices. The user name and password are common authentication process and some additional authentication factors are implementing to password identity it is help to improve secure data.
Some of the IoT apps implement the authentication process by using the most familiar form of two factor authentication process method, The first step enter password into the IoT devices, the system or devices sent a OTP (one time password) to registered authentication phone number.In this paper focused Multi Factor Authentication Mechanisms (MFAM)method to implement the IoT device. It is one of the most active control mechanisms which are help to protect from unauthorized access to device or network system.Finally the multifactor authentication processsupports to the restriction of user and reduce the risk of the attack in IoT Environment.

Multi Factor Authentication Mechanism (MFAM) :
Themultifactor authentication mechanism is implemented properly, to support remote access and reduce security vulnerabilities.
There aresome of thelisted authentications mechanisms methods are used to Multi Factor Authentication Mechanism.
• User registered password • The IoT devices confirmed by registered user identity like Civil ID, phone number, passport no .etc. • The IoT devices authenticated by using Biometric authentication process such as (iris, finger print ,facial)

Analysis of Standard Encryption counter measure against attack on data collection in IoT devices: www.psychologyandeducation.net
The encryption is one of the cryptography data security technologies can protect against threats, vulnerabilities and attacks. In this method using some algorithms like symmetric and asymmetric, changing original information into cipher text to make it unreadable form to anyone except authorized user who have a proper key for the information.
The encryption method, possible evesdropper could only access the cipher text, yet the meaning of the messages shouldn't be understandable.In symmetric chiffrement algorithm using secret public key for bothsender and receiver,it is possible to known any one.In asymmetric mechanism using own private key, it cannot be easily consequent from any one [32].
The main objective ofIoT encryption mechanism is to accomplishopen contact end to end [1].The main security-related threat of IoT systems using sensor devices for data collection, it is possible to attack systems.To implement encryption mechanism to sensor devices, this can be effective countermeasures such as confidentiality, integrity and availability against threats, vulnerabilities and attack [40].The following fig 7 illustrates the encryption mechanism against attack on data collection. Fig: 7 Encryption-based countermeasures against attack on data collection.

Light weight Cryptography:
Instead of standard encryption algorithm increased number of connected IoT devices, the research community has introduced new security light weight cryptography encryption algorithms.The light weight cryptography technology implement the block and stream ciphers, hash function and message authentication code. To implement the light weight cryptography technology in to IoT devices for the following reasons [32]

RPL Secure routing optimization mechanism protect against routing attack:
In the IoT setting the IoT sensors and actuators are critical instruments. The more IoT devices connected using the IPV6 protocols. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN), where each device has its unique IPv6 address.This allows the node to connect directly with the Internet using open standards, However since there is no authentication in 6LoWPAN possible for security attack. [1] The RPL (low power and lossy network) is the compliant IPV6 compliant IoT network routing protocol. IETF for restricted networks are some constraints in this RPL protocol developed by the ROLL community which are memory, power and other network resources. RPL 's following vulnerabilities to security, such as sinkhole attack, selective forward attack and hello flood attack, warmhole and blackhole attack. Many of the security www.psychologyandeducation.net countermeasures to defend against the attacks are implemented here [41]

RPL Mechanism:
Steps: i) The RPL is a vector distance and a routing protocol to source.
ii) The RPL treats the entire network as a DAG (Directed Acyclic Graph).
iii) Which is further divided into one or more destination-oriented directed acyclic graphs (DODAGs) with unique DODAGID, one DODAG root, same Objective Function (OF), and the same RPL Instance ID. iv) In the RPL DODAG, there is one and only one DODAG root, with the remaining named nodes, each of which has a node ID(IPv6 address), a parent node, a neighbourhood list, a DODAG version number and a rank indicating its location relative to other DODAG root nodes, which decrease strictly in the Up direction to the DODAG root and increase strictly in the Down direction away from the DODAG root. v) In other words, the distance between the node and the DODAG root is approximate [42].

RPL security objectives:
i) Routing information remains unchanged during transmission or in storage.
ii) Only approved nodes can use the routing data iii) Routing information available, on demand [43].

Conclusion
The purpose of this survey was accomplished by providing a appropriate overview of IoT security problems, issues and countermeasures research trends in IoT Safety. A counter-measurement scheme was introduced in this survey paper to include a secure multiple authentication method, cryptographic encryption techniques, light weight cryptographic, and efficient routing goals between the cloud server and the IoT system. Finally, some exposed research issues were addressed about threats and vulnerabilities linked to IoT layers. Future developments of this work include the development of a safety model using cryptography techniques.