logo

Experimental Evaluation of Cyber security Threats to the Smart-Home

   

Added on  2023-06-18

4 Pages1182 Words373 Views
ICT and Engineering Research Methods (9826)
Information Sciences Research Methodology (6797)
Semester 2, 2021
Assignment 1 Guidelines for Answers
Article Title, Authors, (if any) online address for access of paper.
Experimental Evaluation of Cyber security Threats to the Smart-Home
The main reason for choosing this research topic is to identify different cyber security issues and
threat that could lead to have affect over smart home.
Title/Abstract
The title of this research is appropriate as it is significant for describing the motive of conducting
research report. In this research different cyber security threats has been identified which will
lead to have affect over smart home. In current scenario consumers are purchasing internet
connected appliances which is also refer as the internet of things. These devices includes data and
information of the consumer as user is able to manage smart home environment through this.
This lead to increase the chances of cyber crime as well as huge risk to consumer privacy and
security. It is essential to identify and determine several threats which could lead to impact over
user privacy and security through this report. In this research report, first investigator is
developing a number of test suited in order to conduct evaluation in the four categories such as
confidentiality of data exchanges by internet of thing device, integrity and authentication of their
communication, access control and availability and their capability to reflect DDoS attacks. In this,
evaluation to four representative households namely home security, health monitoring, energy
management and entertainment which collectively includes 17 consumer IoT devices that are
available on the market.
Research Problem
This research is developed with the aims to experimentally evaluate vulnerabilities of consumer
IoT devices against cyber attacks. This is effective in order to determine the different issues and
problems that could be faced by individual due to internet of thing. In this experiment research,
investigator first test suites corresponding to four categories of security vulnerabilities namely
confidentiality of data they communicate with other devices locally/externally; integrity of
connections they make to/receive from other entities; access control and availability of IoT
devices; and their capacity in reflecting unwanted traffic that can contribute to a DDoS attack.
1
Experimental Evaluation of Cyber security Threats to the Smart-Home_1
Theories Used (Theory, or framework, or model, or development methodology, or guidelines)
Description of Theory Used:
Summarise the type of research covered – This research includes experimental design in order to
gain correct and accurate information about the topic. This is significant for successfully and
correctly conducting research activities as well as analyzing required information.
Summarise what theory was used and how - In this deductive research theory is used in order to
determine different elements and aspects about the research topic. This is used with the support
of conducting test in the given circumstances.
How was the research undertaken? The methodology and methods used
Research Design used: In this research both qualitative and quantitative research design has been
considered. Both of these are effective and efficient in order to find relevant information about
the topic as well as performing research practices in accurate manner. Qualitative research can be
describe as the approach of collecting and analyzing information in form of concept, theories and
other data which can not be represent in numerical data. Where as qualitative research design is
effective for gaining information from numerical and statistical data. Both of these research
design has advantages for conducting research activities in effective and efficient manner.
Research Methods used: There are different methods of data collection such as primary and
secondary method of data collection. Both of these methods have their own benefits and
drawbacks. It is essential for researcher to consider correct and appropriate research method
which is helpful for finding and gathering right information. In this research, investigator is
considering primary method of data collection through experiment. This is refer as the method
through which researcher is able to find first hand information. This includes original information
which is according to the requirements of the research.
Justification of Research Design: Deductive research design is considered as the phenomenon to
successfully test the given circumstances. In this research, investigator is considering research
design in order to formulate the subjection to testing during the research process. This will assist
in gaining right and appropriate data and information about the topic.
2
Experimental Evaluation of Cyber security Threats to the Smart-Home_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security and privacy issues in Internet of Things (IoT) /Smart
|3
|429
|28

Second level Second level 7. Experimental Design First level Second level 5. Introduction First level Second level 5. References Harvad APA version 6 3
|3
|5435
|421

Security Risks and Issues in IoT Technology
|7
|3094
|74

Security Issues In IoT
|12
|4945
|61

Emerging Threats and Counter Measurements
|4
|866
|38

Impact of IoT on Cyber Security in Australia
|14
|3627
|98