logo

Internet of Things (IoT) Research Paper 2022

   

Added on  2022-10-18

16 Pages3575 Words31 Views
Internet of Things
Name
Institution
Professor
Course
Date

Abstract
The Internet of Things (IoT) has made possible for devices to communicate over the internet and
share data without any human intervention. In this regard, most of the studies on IoT have
concentrated on its use and application but security concerns have not been addressed. For the
secure implementation of IoT, security experts should be involved during and after its
implementation. The review of the past studies focuses on security aspects such as types of risks,
threats, security control and techniques that should be implemented to secure IoT infrastructure.
Countermeasures such data encryption during transmission, network protection through
SSL/TLS and creating strong authentication credentials to avoid SQL injection and cross-site
scripting. Similarly, the trends on the IoT has been analyzed to come up with expected changes
that might come up as a result of adopting required security measures. The security measures
such as incorporating Blockchain technology has been addressed to make sure IoT security is
given the highest priority.

Contents
Abstract....................................................................................................................... 2
Introduction.................................................................................................................. 3
Application of Internet of Things....................................................................................... 4
Types of Risks in the Internet of Things..............................................................................5
Threats and countermeasures on the Internet of Things.........................................................6
A comparison of cybersecurity threats................................................................................9
Future Trends in Internet of Things................................................................................. 10
Conclusion.................................................................................................................. 11
Bibliography............................................................................................................... 12
Appendix.................................................................................................................... 13
Introduction
The paper would highlight security and ethical issues on the Internet of Things (IoT). It
would majorly focus on data collection, transmission and protection. With IoT, it has been

possible to automate most of the electrical appliances to communicate with each other. When
addressing IoT, security concerns have not been dealt with adequately making it difficult for
users to decide which security parameters to focus on during its implementation (Leloglu 2017,
pp. 121-122).
The security of on IoT cannot be addressed without addressing ethical concerns which
may arise from the implementation and use of the Internet of Things. The topic is very important
because of the ever-increasing cybersecurity attacks on Internet of Things data and devices
(Leloglu 2017, pp. 121-122). It is very sensitive to technological and social aspect due to the
impact it has on personal data and IoT devices.
The article would cover the overview of IoT, its benefits in both local and industrial use
and application in the key sectors of the economy. First, the application of the Internet of Things
in the various economic sectors and the impact (Allhoff & Henschke 2018, pp. 56). Next, the
evolution of the Internet of Things in terms of legislation, security and ethical concerns. Finally,
the types of risks involved and countermeasures to protect data privacy would be substantially
discussed.
The position of the paper is to shed light on the security threats, data protection, and
privacy of data, ethical issues and trends on the Internet of Things (IoT). The discussion would
be based on, security threats, data protection and countermeasures in security data collected over
the IoT.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Emerging Threats and Counter Measurements
|4
|866
|38

Security in the Internet of Things Assignment PDF
|12
|489
|132

Internet of Things: A Review of Literature and Security Issues
|8
|810
|321

Cloud Computing in IoT Security: Issues, Threats, and Countermeasures
|14
|4648
|362

Utilizing Blockchain in Internet of Things
|25
|6891
|265

Smart Connected Home Architecture, Threats and Countermeasures.
|17
|4151
|17