ABSTRACT

Internet of things (IoT) is changing the world through connected devices in every place of our day-to-day life. International Data Corporation estimates 41.6 billion will be connected IoT devices in 2025. Nowadays, people are living with electronic devices such as TV, fridge, washing machine, mobile phones, laptops, closed-circuit television (CCTV) cameras, air conditioners, and some of the things like cars and bikes. IoT devices and their connectivity are more and more important for every application to reduce human effort. Machine to machine (M2M) is also evolving day by day where the device can communicate without human intervention. IoT is providing a good impact on many applications such as patient health monitoring system, vehicle movement tracking system, parking system, smart home, smart cities, investigation, and smart agriculture. The requirement of the hardware to design such applications is increasing for IoT devices. IoT connects with different topology by using various protocols and standards are implemented regularly according to the application in their perspective. IoT is storing a huge amount of data from day-to-day life and analysis will take care of the data analyst with a large amount of data. Even though IoT is storing a huge amount of data, the security is questionable in all the applications while it is connected to the Internet.

IoT majorly relies on three architectural styles. First, the client-server architecture where the client requests to the server and server replies to the client's request. Second, the cloud architecture where the application itself running on the Internet and the data will be stored in a cloud server. Third, fog architecture where control and data plane are separated. On accessing remote data, the cloud servers are most suitable for large data storage and running complex algorithms of data analytics. Fog computing provides data storage and computing close to user at the end, where data and control plane are separated. Even though IoT is adapted to architecture styles such as client-servers, cloud computing, and fog computing, the security of the data is breached by the intruders when it is connected to the Internet. The data breaching in a sensitive application will be a big issue such as a patient healthcare monitoring system where the patient is monitored in his home by the hospital with the help of the smartwatch inserted in his body to show the status of the health of a patient. The above scenario data breaching can be a reason for the loss of life of the patient. IoT is relying on different architecture styles but there is a possibility of data breaching. The new architecture has to be proposed to secure the data in IoT. To secure the data of IoT, the suggestion from the researchers and scientists is to go for blockchain.