ChallengesIoTs have increasingly processing power and re-configurability andtherefore are vulnerable to similar malware of traditional computers. Thesedevices are embedded in our everyday life but they may not have the computingcapacity to implement security protection solutions like Trusted Computing, orCryptography. This context presentschallenges of scalability (billions of devices to protect), harmonization andhomogeneity (different protocols and technologies). Physical availability ofdevicesConnected sensor/actuator devices embedded in the environment arephysically available to malicious users who could use them to compromise theintegrity or reliability of an IoT system.
The number of devices itself andtheir reduced capabilities make it very difficult to detect tampering and tocheck that they are operating properly. Identification in the IoTenvironmentIn all layers of IoT, it is essential to provide identification. It isone of the biggest challenges because IoT will face a tremendous number ofapplications and structures with different unpredictable characters andpatterns. Therefore, the need to have a global reference for identification isvital. Authenticating devicesDevices that use the sensors and actuators should follow specificpolicy for authentication to authorize the sensors to public their information.Low cost solutions in this field has not been provided.
We have to usehigh-cost solutions which is a conflict with the main goal of IoT to providelightweight protocols. Conflicting marketinterest (privacy)IoT will make a very competitive market by providing correlated datafrom different sources. Therefore, it will help to satisfy customers’ needsmore efficiently. As a result, providing different techniques to protect thepersonal data of people will be the main issue. This goal should be satisfiedby deployment low weight privacy solutions, which is considered as a challenges