LITERATURE REVIEW ON SECURITY ASPECTS OF IOT

: This Review paper sheds light on the very approach of Internet of Things. The whole conception of having all the gadgets to be interconnected is a landmark of our technological advancements. The wonders that IoT has provided us have redefined what communication and efficiency means to us. Accessibility has become a more refined privilege, all because of IoT. However it seems all that glitter isn’t gold, IoT being a technological wonder it still attaches some limitations to it, foremost of it being the issue of security where data privacy is a very crucial issue that goes in various spheres of social and technological systems, it is something that IoT has to be developed to overcome. Also, the second aspect is the number of devices connected. This research paper also discusses the design aspects of the IoT architecture, its components and various security issues of IoT which can be developed to achieve better efficiency.


I. INTRODUCTION
The concept of Internet of Things is contemplated from the idea that through a wired of wireless network an enormous number of devices are interconnected. Rather a fact of tremendous amusement that the devices linked to the web exceeded the number of humans on the planet. The whole concept of Internet of Things have provided a transition of the technology sphere to the modern age in the true sense. The whole idea that it holds the self-ability to configure and adapt a wireless network with the aim to inter-link everything is itself astonishing. The idea of IoT is to collude a network whose sphere covers many devices merely.
Internet of Things has worked and assisted us to gain the very crucial and rewarding ability to be interconnected. It has become such a great aspect of the modern age tech that IT Giants such as Samsung has claimed that almost all their devices are connected to the internet as of 2017. Even Apple proudly promotes its iOS devices to be connected to the iCloud. This also compiles individual tech like the following: • Geographical Information System • Radio Frequency Identification Detection • Smart Objects • Global Positioning System Internet of things requires a canny handling framework and dependable transmission inside a system.
Internet has 3 noteworthy performing actors as client, device and server.
IoT gadgets are isolated into 2 essential gatherings -Edge Devices -These are low asset gadgets containing sensors/actuators.
Gateway Devices -These are high asset gadgets which will total the information from edge gadgets. They are in charge of mingling edge gadgets to the web.

IoT ARCHITECTURE
IoT engineering has 4 distinct layers: A. Application layer It is the top most layer in IoT architecture and legitimate connection between the client and web which is responsible for delivery of all services to the users in various fields. Technique utilized by the application layer are Machine Learning, information mining, information preparing and different investigation to process the data from framework.

B. Middleware Layer
Mediated between application and network layer. Its main point is to shield the hardware particulars from unauthorized access and grant the testers to mainly limelight on the evolution stage rather than other. It authenticates clients to furnish a more secure environment alongside proficient conveyance of administrations.

C. Network Layer
Secures information exchange over sensor and is responsible of totaling the data from different sources and directing it to adjust goal. This layer use technology like WSN, Bluetooth, Infrared, 3G network. In this layer our aim is to properly allocate unique address for each object. Ipv6 is the best protocol used in this manner.

D. Perception Layer
The utilization of creative sensors facilitate the relatedness among gadgets besides promoting the swap of data between them. It contains integrated hardware for discernment and securing of information.
Example -RFID is a technique in which chips are installed into the gadgets for automated recognition.

IoT COMPONENTS
A. Identification Decisive for the internet of things to name and match assistance with their request. Recognizable proof techniques in IoT architecture are Electronic product codes (EPC) and Ubiquitous codes (u Code). Here consign the Internet of things gadgets is analytical to distinguish between item ID and its determinant address. For example for a selective temperature sensor its name will be the object ID and it also have an address within that communication protocol in which it is performing. What's more, ipv6 is used an addressing method for IoT gadgets.

B. Sensing
It means aggregation of data from familiar access inside a system network and direct it back to data directory, data hub or storage drive then composed information is explored to proceed for explicit action in regard to decisive assistance.

C. Communication
Interface heterogeneous items together to convey particular keen administrations. Examples of transmission protocols used for the Internet of things includes Wi-Fi network, Bluetooth, Z-Wave & LTE-Advanced.

D. Computation
Processing units like micro-controllers, micro-processors and other software applications together represents the computing ability of the IoT gadgets.

E. Services
Internet of things assistance will be typecast in four divisions -1. Integrity related 2. Data augmentation 3. Cooperative aware 4. Ubiquitous

F. Semantics
It refers to the competency of elicitation knowledge stylishly for essential services.

IoT VS M2M
By the definition both IoT and M2M systems may not be advertised as identical. A mutual property of IoT and M2M is remote access to gadgets. Despite there are some fundamental variation between them. The classical M2M refers to transmission between two or more gadgets by aid of a mobile or fixed line network. We call it steep point to point communication. M2M utilization usually subsist of a hardware module installed into a device on the user subordinate which transmits through a mobile or fixed line network with the comparable application usually on the side of service worker. Here main objective is to reduce management and maintain amount. M2M associate things with system but IoT associates system with things. IoT is positioned on the IP network for parallel network of gadgets to a storage drive of a user. IoT usually associates neural data with big data analytic system for enhancement of productivity, increment of manufacturing and stake on market, enhancement of utility. As M2M which only hold gadgets but IoT supports passive sensors, low durability sensors and low amount devices which are not supported by M2M machines. IoT devices broadcast through IP networks which are usually linked to a storage drive which makes it an extensible and flexible solution but M2M are adapted towards installation of sim cards of fixed line network. It is must to specify that M2M associate with IP is a component of IoT. Internet of things is an immense perception than M2M because it may be unified into the global company business while M2M is more align close to maintenance. Despite IoT facilitate a broad spectrum of utilization in usual life, its ongoing application is finite and symbolic changes are expected in the coming time.

IoT UTILIZATION
A. Home & Office -It has become radical ratio of success in the residential area. Example-You can switch 'off' your home lights when you are not at home, you can switch 'on' your air conditioner before reaching home.
B. Manufacturing -Industrial internet is creating a new buzz in the manufacturing sector with sensors, software and big intelligence data to create dazzling machines. Example-You can track your goods whether it reached the location or not, you can keep track of manufacturing figures more accurately and efficiently.
C. Transportation -It includes engine off your car from your phone, get details of mileage, sensors automatically detect the temperature and allows air conditioner to start automatically.
D. Health care -It will provide actualize analysis of an individual's health and provide game plan to combat illness.
E. Energy -It will collect data in a programmed fashion of electricity consumers and suppliers which will increase efficiency as well as economics.
F. Agriculture -In India, approximately 70% of the people are dependent upon agriculture as it is their only source of income. IoT has also helped the farmers in reducing their efforts as sensors installed in an agricultural field detects automatically temperature, humidity and accordingly starts irrigating the fields.
This becomes possible only because of IoT as all devices and tools are interconnected to the internet.

A. Robustness In Connectivity
Not firmly established internet connectivity available therefore combination of human and sensors via the internet connectivity is a large scale challenge.

B. Interoperability & Standardization
Devices produced by different merchants vary in innovation and administrations in this way making them incongruent. Standardization should be re-routed to give interoperability among different items and sensor hubs inside WSN.

C. Naming & Identity Management
As many/boundless objects are associated, each must have extraordinary recognizable proof. In introduce situation deficiency of address space is a noteworthy task.

D. Safety & Security Of Objects
Access to data by vindictive/unapproved individual should be anticipated to make preparations for physical harm or modification in characterized usefulness.

E. Data Confidentiality & Encryption
Usage of encryption to keep up information respectability at layer of data preparing.

F. Big Data
As we know infinite number of devices are interconnected to each other and each must have data associated with it. We will have data intelligence concept here so that only competent data must be extracted from a gigantic database.
The authors have discussed several security challenges which are heterogeneity in system and number of devices increasing day by day. In the paper, the authors have proposed the idea of machine learning technique and testbed creation method to face the security challenges in an IoT framework [1].

Khoo, "RFID as an Enabler of the IoT: Issues of Security and Privacy" (2011).
paper, the authors have discovered that IoT devices have low computational power and low memory management which are a serious issue in the networking field [9].

Chaudhary et al. "The IoT: Challenges & Security Issues" (2014).
The authors have discussed have discussed general layer architecture of IoT, its future aspects and limitations. In this paper, the authors have provided a guarded development of the IoT building by dealing with security concerns at each layer of the IoT framework [10].

III. CONCLUSION
In the present era, IoT has become an important tool for interconnection of various networks. The importance is evident from the fact that in the year 2008, the number of gadgets connected to internet were more than the then population of the world. In the fast moving world, machines have reduced manual labor and efforts as a man can do anything which he can possibly think of by the click of a button. Few limitations such as lack of standardization of sensors which is a potential privacy issue and the increasing number of devices are causing problems in functioning of the system, IoT has become an integral part of human life as its aspirations to boost the essence of life by connecting various smart devices and applications