logo

Analyzing The Security Challenges of IoT Devices

Proposed activity, aims, objectives, research question(s), and novelty of analyzing the security challenges of IoT devices.

12 Pages4267 Words74 Views
   

Added on  2022-11-26

About This Document

This research proposal focuses on analyzing the security challenges of IoT devices and aims to understand the customers' privacy and security issues when using IoT gadgets. It also explores the general security views of IoT devices and the countermeasures needed to deliver safe and secure IoT devices to customers.

Analyzing The Security Challenges of IoT Devices

Proposed activity, aims, objectives, research question(s), and novelty of analyzing the security challenges of IoT devices.

   Added on 2022-11-26

ShareRelated Documents
Dissertation Proposal Form
Student Name Supervisor
Name
Student
Number
Course
Project title: Analyzing The Security Challenges of IoT Devices
Start and end
dates of
research:
06/01/2020-14/05/2020
Proposed activity – aims, objectives, research question(s), and state how it is
novel (max 600 words
Analyzing The Security Challenges of IoT Devices_1
Introduction.
The term Internet of Things was first used by Kevin Ashton in 1998 at the MIT
Auto-ID Centre (Ashton, 2009). The Internet of Things has the potential to
transform the world. IoT was initially used majorly in the supply change
management sector. The basic knowledge of IoT technology is attaching
embedded gadgets to ordinary objects, making them ‘smart’ devices. There is an
advancement of technology and connecting IoT devices through the internet.
There is also a prediction of connecting IoT devices will furthermore grow (Bonetto
et al. 2012). The notion of connecting physical things to digital platforms is not a
new idea in the technology sector. The development and acceptance of wireless
sensor networks (WSN) and technologies and radio frequency identification (RFID)
have made the IoT more practical. It has grown to become the world’s biggest
growing technology. The number of wireless devices has gone up by 25 billion in
this current year of 2020.
Millions of IoT gadgets need big distributed network systems and also the
procedure of converting raw information into meaningful data. IoT changes the
way people live their life. IoT technology will create an “always connected
paradigm” (Bahekmat et al. 2012). The development in connected devices will
inevitably result in vulnerabilities and security issues “IoT technology has negative
on economic, legal and social aspects. Precisely IoT technologies development has
led to privacy and safety concerns (Thierer, 2015). The IoT technology still at its
initial early stages, and the security and privacy threats have yet to be fully
investigated and mitigated. Companies such as Apple and Microsoft have also
faced security challenges, during the use of IoT devices. Therefore, the papers will
try to analyze the security and privacy threats from the vendors’ perspective (Ingla
& Sachdeva,2013).
The advancement of IoT technology and the interconnection of IoT devices is
leading to the raising of vulnerabilities and compromising the systems such as
viruses, hackers and other forms of attacks. These IoT technologies have got a lot
of challenges arising from them such as security, safety, and privacy (Thierer,
2015). There is a need to analyze the security issue over the challenges the IoT
devices are at present facing.
Analyzing The Security Challenges of IoT Devices_2
Methodology – rationale, data selection and collection, recruitment, participant
demographics, analytical process (max 600 words)
Analyzing The Security Challenges of IoT Devices_3
This section shall review the research design deeply, Area of study, targeted
population, the sample size, sampling methods, data gathering and data analysis
methods to be used in this study. This section demonstrates all the steps that are
being taken by the researcher during the extraction of the information from the
interviewees.
This section shall answer the research question through demonstration of the
research techniques to be used and justification of those techniques.
This section explains the way research is to be conducted and in what manner
data is to be collected.
This section shall also explain in detailed the research approaches that are going
to be used.
Rationale.
The literary review shall highlight IoT technology as a new and growing concept in
the field of information technology. The challenges of IoT technologies are facing
are security issues. There is a need to carry out research and collect information
about the thoughts, opinions, and experiences of vendors who develop the IoT
devices and consumers who use IoT devices.
This proposal is to be designed to identify the users’ opinions about security
challenges while operating or interacting with IoT devices.
A lot of research approaches have been proposed in this research such as
qualitative and quantitative. Still, there is a clear indication there are few
qualitative kinds of research carried out on security challenges on IoT devices.
Therefore, there are very few qualitative data, and there is a need to explore more
research about this qualitative approach.
This research suggests that an individual’s view on the security challenges is
completely different from other people’s views (Weber, 2004). So, every person
has to provide their individual opinions about security issues.
There is no way we can prove people’s feelings, opinions and views towards
security challenges of the IoT technologies, and the best way is to carry research
using the qualitative approach.
Analyzing The Security Challenges of IoT Devices_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet of Things (IOT) - PDF
|14
|3561
|82

The Main Concept of loT is Wireless Sensor Networks
|8
|1673
|42

Internet of Things Security and Privacy
|12
|2833
|99

Security and Privacy Issues in IoT
|5
|3262
|310

Vulnerabilities with Internet of Things 0 Name STUDENT ID IT SECURITY Introduction IoT
|7
|1808
|461

Network Security Issues
|9
|2037
|42