What security issues and challenges exist in the application of the Internet of Things?

The Internet of Things has a wide range of applications, involving all walks of life. In addition to business abuse, replay attacks, information eavesdropping and tampering that appear in existing communication networks, its application security issues also have other more special application security issues.

DTU/Edge Gateway/IoT-platform/Gateway-moduleDTU/Edge Gateway/IoT-platform/Gateway-module

privacy threats

The extensive use of wireless communications, electronic tags and unattended devices in the Internet of Things will make the threat to privacy information at the application layer of the Internet of Things very prominent. Private information may be obtained by attackers, bringing security risks to users. Privacy threats in the Internet of Things mainly include privacy leaks and malicious tracking.

Privacy leakage: Privacy leakage refers to the exposure of a user’s private information to an attacker, such as the user’s medical records, personal identity, interests and hobbies, business secrets and other information.

Malicious tracking: Obtainers of private information can maliciously track users. For example, in IoT applications with RFID tags, privacy invaders can obtain the tag user’s whereabouts through the tag’s location information; robbers can even use sign information to determine and track the number and location information of valuables.

identity impersonation

Devices in the Internet of Things are generally unattended. These devices may be hijacked and then disguised as clients or application servers to send data information and perform other malicious operations. For example, an automatic access control system for smart homes can dispel alarms, open access control and enter the room by disguising itself as a network-based back-end server.

signaling congestion

The current authentication method is one-to-one authentication between the application terminal and the application server. In the Internet of Things, there are a huge number of terminal devices. When these huge numbers of terminals use services in a short period of time, large-scale authentication request messages will be generated on the application server. These messages may overload the application server, congest the signaling channels in the network, and cause denial of service attacks.

The security issues and challenges existing in the development of the Internet of Things are expected to be gradually solved in the future.

X

Neem contact met ons op

Neem contact met ons op