simulated using a mobile app build using React native
on an Android platform.
5 CONCLUSION
The threat to the IoT devices is real and with the grow-
ing number of IP connected devices the attack vector
is ever increasing (Bhattarai and Wang, 2018). Build-
ing a standardized end-to-end security model is essen-
tial to protect the privacy of the users. We can build
trust among the users by eliminating trust from the se-
curity framework. To do so a proper mechanism like
zero-interaction pairing (ZIP) (Fomichev et al., 2019)
is needed that can integrate large numbers of devices
and their owners into the system without much man-
ual intervention. The P3 connection model described
in this paper uses this technique to securely set up a
secret key for the parties to communicate. Utilizing
these keys in the command execution model verifies
the identity of the parties on every request and re-
sponse. We also demonstrated how we can off load
the memory and processor intensive work to the gate-
way to let the device focus on its primary objective.
The ZT model shows how a security framework can
work in the background to protect our privacy as well
as respect the limitation of memory and computing
power of the device.
IoT is the next major breakthrough in the world
of technology. These devices perform one specific
operation, but it is specialized in doing it. They are
slowly turning out to be an essential part of our every-
day lives. With home automation systems and home
assistants on the rise, we are starting to communicate
with these devices with natural language and they are
also transacting with our personal and financial data.
However, this is just the tip of the iceberg for the po-
tential of these gadgets. Proper security infrastruc-
ture is essential to control the activities of these de-
vices. To ensure security and privacy P3 connection
approach provides a zero-trust architecture that will
verify the authenticity of every transaction.
REFERENCES
Atwady, Y. and Hammoudeh, M. (2017). A survey on au-
thentication techniques for the internet of things. In
Proceedings of the International Conference on Fu-
ture Networks and Distributed Systems, ICFNDS ’17,
New York, NY, USA. Association for Computing Ma-
chinery.
Bertino, E. and Islam, N. (2017). Botnets and internet of
things security. Computer, 50(2):76–79.
Bhattarai, S. and Wang, Y. (2018). End-to-end trust and
security for internet of things applications. Computer,
51(4):20–27.
Columbus, L. (2019). 2018 roundup of internet of things
forecasts and market estimates. shorturl.at/qMPTU.
accessed January 21, 2020.
Fomichev, M., Maass, M., Almon, L., Molina, A., and Hol-
lick, M. (2019). Perils of Zero-Interaction Security in
the internet of things. Proc. ACM Interactive Mobile
Wearable Ubiquitous Technology, 3(1).
Gao, M., Wang, Q., Arafin, M. T., Lyu, Y., and Qu, G.
(2017). Approximate computing for low power and
security in the internet of things. Computer, 50(6):27–
34.
Goasduff, L. (2019). Gartner says 5.8 billion enterprise
and automotive IoT endpoints will be in use in 2020.
shorturl.at/jlosS. accessed January 21, 2020.
Huth, C., Zibuschka, J., Duplys, P., and Guneysu, T. (2015).
Securing systems on the internet of things via physi-
cal properties of devices and communications. In 2015
Annual IEEE Systems Conference (SysCon) Proceed-
ings, pages 8–13.
Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum,
G., and Ghani, N. (2019). Demystifying IoT se-
curity: An exhaustive survey on iot vulnerabilities
and a first empirical look on internet-scale IoT ex-
ploitations. IEEE Communications Surveys Tutorials,
21(3):2702–2733.
Nieminen, J., Gomez, C., Isomaki, M., Savolainen, T., Patil,
B., Shelby, Z., Xi, M., and Oller, J. (2014). Network-
ing solutions for connecting Bluetooth low energy en-
abled machines to the internet of things. IEEE Net-
works, 28(6):83–90.
Pazos, N., Muller, M., Aeberli, M., and Ouerhani, N.
(2015). Connectopen - automatic integration of IoT
devices. In 2015 IEEE 2nd World Forum on Internet
of Things (WF-IoT), pages 640–644.
Puliafito, C., Mingozzi, E., Longo, F., Puliafito, A., and
Rana, O. (2019). Fog computing for the internet of
things: A survey. ACM Transactions on Internet Tech-
nology, 19(2).
Ronen, E. and Shamir, A. (2016). Extended functionality
attacks on IoT devices: The case of smart lights. In
2016 IEEE European Symposium on Security and Pri-
vacy (EuroS P), pages 3–12.
Trappe, W., Howard, R., and Moore, R. S. (2015). Low-
energy security: Limits and opportunities in the inter-
net of things. IEEE Security & Privacy, 13(1):14–21.
Uslaner, E. M. (2004). Trust online, trust offline. Commu-
nications of the ACM, 47(4):28–29.
van Oorschot, P. C. and Smith, S. W. (2019). The internet of
things: Security challenges. IEEE Security & Privacy,
17(5):7–9.
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
406