logo

Internet of Things & Cyber Security

   

Added on  2021-05-27

19 Pages5950 Words53 Views
 | 
 | 
 | 
qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopaInternet of Things (IoT) & Cyber Security Research Work
Internet of Things & Cyber Security_1

Internet of Things & Cyber Security Table of ContentsIntroduction...........................................................................................................................................1Significance of the Research..............................................................................................................2Literature Review: Cyber Security Issues and Threats in IoT............................................................2Device Security Issues...................................................................................................................2Authorization & Authentication Issues..........................................................................................3Device Updates for Security..........................................................................................................3Secure Communication Issues.......................................................................................................4Data Privacy & Integrity Issues.....................................................................................................4Architectural Security Issues.........................................................................................................5Data Protection Issues....................................................................................................................5Data Encryption Issues..................................................................................................................5Identity Management Security Issues............................................................................................6Scale Management for IoT-Cloud..................................................................................................6Denial of Service & Distributed Denial of Service Attacks...........................................................6Limitations & Research Gap.................................................................................................................7Aim of the Research..........................................................................................................................7Materials & Methods.............................................................................................................................7Results.................................................................................................................................................12Discussion...........................................................................................................................................13Set of Countermeasures & Solutions...............................................................................................13Device Security...........................................................................................................................13Securing the Cloud......................................................................................................................13IoT Security Lifecycle Management............................................................................................14Recommendations & Conclusion........................................................................................................14References...........................................................................................................................................151
Internet of Things & Cyber Security_2

Internet of Things & Cyber Security IntroductionInternet of Things (IoT) is defined as the amalgamation and inter-connection of variedcomponents to allow them to achieve as specific goal. The components that may be involvedin an IoT application may include computer systems, databases, file servers, exchange mailservers, sensors, networking equipment and peripherals, web servers, home appliances, andmany more. IoT is gaining immense popularity and is being implemented by numerousindustrial sectors. The business organizations are now trying to adapt to the technology tooffer the IoT services and applications to the customers. There are various sectors that can bewitnessed to be using IoT applications and technology, such as healthcare, banking,entertainment, commercial, and many others. IoT has provided several benefits to the users in terms of the intelligent components thatcome together to give rise to smart applications. The overall connectivity of the componentshas increased with the emergence of IoT. However, there is one prime concern that has beenseen in this area. There are cyber security issues that are observed in association with the IoTtechnology and applications. Significance of the Research IoT has started to become a significant component in the business and personal activities thatare carried out by the users. The occurrence of cyber security attacks in association with theIoT applications and technology bring in numerous disadvantages. These disadvantages anddrawbacks are primarily in terms of the exposure of the confidential, sensitive, and privatedata sets. There are also legal obligations that the IoT vendors suffer from as a result of theoccurrence of security attack. The reputation of the vendor in the market deteriorates and sodoes the customer trust and engagement (Botta, de Donato, Persico & Pescapé, 2015). The research explores the several cyber security issues that are associated with IoT and issignificant as it is necessary to have this information so that the measures to control andprevent these issues may be developed (Wang, Bi & Xu, 2014). 2
Internet of Things & Cyber Security_3

Internet of Things & Cyber Security Literature Review: Cyber Security Issues and Threats in IoTDevice Security Issues There are various limitations and constraints that are applied on the devices that areassociated with the IoT applications. These limitations are in terms of the data storage limitsalong with the processing capabilities that may be allowed on the device. It is also requiredfor the devices to always operate on the power saver modes whenever they may be runningon the batteries. As a result, the application of encryption algorithms and processes becometroublesome on these devices. The tasks that are associated with encrypting or decrypting thedata sets may not be quick to carry out the safe and secure transmission of the data sets.There are various other forms of security attacks that may also take place, such as poweranalysis attacks, side channel attacks, and so on. There are physical security risks that are alsoassociated with the IoT applications in terms of loss of device. For example, smart parkingIoT application is being widely used. The Smartphone of the user comprises of the locationand parking details of the vehicle. If the attacker succeeds in capturing the Smartphone of theuser then the security of the user as well as that of the vehicle may get compromised. Authorization & Authentication Issues The primary reason behind the occurrence of cyber security issues in IoT applications is theenhanced number of access points that are present in these applications. There are a lot manyaccess points that lead to increase in the failure points as well. All of these access pointscannot be secured with a generalised authentication and authorization scheme that leads tothe presence of security loopholes (Duncan & Whittington, 2012). Due to the presence of somany access points, there may be chances that one of these may utilize weaker password orimproper access control. Such vulnerabilities may then be utilized by the malevolent entitiesto give shape to the security attacks. For example, there are home automation systems that have been designed on the basis of IoTtechnology and are being used by numerous users. There are a lot of components involved inthe application, such as Smartphones of the house owners, computer systems, routers, homeappliances, electronic gadgets, and many more. The use of poor access control in any of thesecomponents may compromise the overall security (Yousuf, Mahmoud, Aloul & Zualkernan,2015). 3
Internet of Things & Cyber Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents