ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Internet of Things Privacy and Security Issues

Verified

Added on  2023/04/21

|10
|2130
|317
AI Summary
This report provides a literature review on the privacy and security issues in the Internet of Things (IoT) and suggests measures to mitigate these issues. It discusses the insufficient testing and updating of IoT devices, brute forcing and default password issues, IoT malware and ransomware, IoT botnets, AI and automation, and various IoT security measures. The report concludes by emphasizing the importance of implementing these security measures to enhance the robustness of the IoT framework.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
Name of the Student
Name of the University
Author note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
Table of Contents
Introduction..........................................................................................................................2
Literature Review................................................................................................................2
Security Issues.................................................................................................................2
Insufficient Testing and Updating...............................................................................2
Brute forcing and default password issue....................................................................3
IOT Malware and Ransomware...................................................................................3
IOT botnets..................................................................................................................4
AI and Automation......................................................................................................4
IOT Security measures....................................................................................................5
IOT Network Security.................................................................................................5
IOT authentication.......................................................................................................5
IOT encryption.............................................................................................................6
IOT security analytics..................................................................................................6
Conclusion...........................................................................................................................6
Reference.............................................................................................................................8
Document Page
2
INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
Introduction
Dynamic global network is considered over other terminologies of new dimensions.
Usage of mobile communication, RFID and Wireless Sensor Network has also been providing
beneficial regarding communication process. Usage of IOT has been increasing efficiency in
field of smart homes, smart transport, smart cities and smart living. Despite advantages that are
present in system, major disadvantage that is received includes affecting privacy of data that are
used in the processing of dynamic architecture. This ensures that execution of venture will be at
stake as data that will be stored in the database of system. This report will provide literature
review regarding issues that are present in the system along with issue mitigation process.
Literature Review
Security Issues
According to Yang et al. (2017), security issues that affects functioning of IOT includes
usage of insufficient testing and updating of system, presence of brute forcing and default
password related issues, IOT malware, IOT botnets and implementation of AI in system.
Insufficient Testing and Updating
According to Yi, Qin and Li (2015), it is estimated that there are 23 billion devices that
are connected with platform of IOT. It is expected that there will be a rise in usage of IOT. Most
of products among these are not provided with proper updates. This issue makes devices more
vulnerable for imposters to gain access to data that are stored in database of systems. The devices
that fails to receive proper updates were once considered to be a secured device, but with passing
time and least updates, robustness of security infrastructure reduces. Firmware update provided
Document Page
3
INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
but updates are not consistent for a prolonged period. In this process service providers often
provide legacy Linux kernels.
Brute forcing and default password issue
According to Borgohain, Kumar and Sanyal (2015), usage of MIRAI botnet is noted in
several DDoS attacks that has been taking place during shipping of device with passwords that
are set. This kind of attack takes place when shipping of products is done with default set
passwords and clients are not aware of fact that they will be needing to change passwords.
Reason that MIRAI malware was benefitted as the IOT devices had default usernames and
passwords that were used for logging in to system. Hence Brute force attack is considered to be
one of fiercest attacks to take place in framework of IOT.
IOT Malware and Ransomware
According to Weber (2015), with an increase in number of devices that are getting a
connected rise in platform of IOT, introduction of new Ransomware and Malware in framework
has also been increasing. In initial stages protocol that was used intended on encryption of
security structure and hence gaining access to data that that is stored in device. With introduction
of ransomware, main issue that will affect functioning of scheme is that ransomware is capable
of disabling functional processing of device. This will lead to stealing of data. This stealing of
data will lead to capturing of sensitive information that is stored in database of the computing
system. An example of an IP camera can be taken. Data that are obtained by IP camera, with
introduction of ransomware in database of IP camera data can be breached. This will affect user
of product negatively. This increase in system will lead to rise in developing of permutation

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
process. This is one of the significant reasons that the functional process gets affected in an
undesired manner.
IOT botnets
According to Sicari et al. (2015), mining competition along with rise of usage of
cryptocurrency has been acting as a plus point for hackers as this affects functioning of the cash
transaction as per the crypto craze affects usage of this platform. Even though blockchains are
prone to hacking techniques. Excessive attacks are being imposed on blockchain. This
unwarranted attack on platform of blockchain has been reducing robustness of the project.
Monero, an open source cryptocurrency has been the primary target for imposters. Usage of IP
and video cameras are also made by hackers to perform mining process. Blockchain breaches
have been one of e significant aspects that are affected by the IOT botnets. There is a
considerable risk of flooding of open crypto-market. This disruption of entire process leads to an
increase in the volatility of structure of cryptocurrency.
AI and Automation
According to Hwang (2015), number of users that have been using platform of IOT and
Artificial Intelligence has been increasing drastically. This leads to the fact that management of
data transaction gets difficult. Detection of anomalous data and vivid traffic patterns are getting
difficult to be identified. With usage of the platform of IOT in field of smart city, smart cars, IOT
based health care amount of data that are being transacted are huge. This huge transaction of data
might not be structured in nature. This lack of structuring of data might lead to breaching of data.
Document Page
5
INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
IOT Security measures
According to Rehman al. (2016), security measures that can be taken to increase
robustness of the frameworks includes implementation of IOT network security, IOT
authentication, IOT encryption, IOT PKI, IOT security analytics and IOT API security.
IOT Network Security
According to Mendez, Papapanagiotou and Yang (2017), protecting of network that is
connected with back end system includes aspect that the traditional network security measures
cannot be implemented as exposure to system is high in case of maintenance of the capability of
internet system. In case of using the traditional method, the main advantage that is present
includes the scope of attack from imposter's increases. The process of providing security to IOT
network is by implementing security measures in starting and end points of network
connectivity. Usage of intrusion prevention and detection vendors must be performed. Usage of
Cisco and Darktrace will of great use.
IOT authentication
According to Li and Da Xu (2017), it is providing users with the ability to authenticate
devices that implement platform of IOT. This authentication of scheme will include process of
implementation of passwords for increasing robustness of venture. Usage of two-factor
authentication system will also be helpful. In case of two-factor security system password is
accompanied by questionnaires that have been initially answered by user. For accessing data that
are present imposter needs to crack both security measures. Usage of vendors, namely Covisint,
Device authority and Gemalto helps in increasing the robustness of system.
Document Page
6
INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
IOT encryption
According to Li, Da Xu and Zhao (2015), usage of encryption process helps in securing
of data that are stored in database in the platform of IOT. This insists on fact that the data that are
to be transacted are provided with a layer of encrypted data. In this case, even if imposters gain
access to data, they are unable to get information from data. Usage of vendors, namely Cisco
Etrust Datacard and the Symantec will be beneficial in process.
IOT security analytics
According to Sun al. (2018), in this case, main issue that is taken into consideration
includes adding of sophistication of machine learning process. Normalising of data is responsible
for actionable reporting. This process can be implemented in the machine learning process.
Using the significant data technique can also be done for increasing robustness of framework.
With help of implementation of big data proper estimation of output can be made. Application of
big data will not only increase the functioning of the predictive nature of the process, but also
anomaly detection is made with a better method. With application of IOT security analytics,
identification of attacks can be performed. This is one of significant reasons that the functioning
of plan will get better. Usage of Kaspersky Lab, SAP can be used for increasing robustness of
the system.
Conclusion
From the above discussion, it can be stated that IOT has several loopholes in its
framework. Getting into context of IOT is very easy for imposters until the security measures
that are stated in this report are followed. In case the security maintenance process is performed
robustness of IOT framework increases. Hence with proper usage of recommendation will

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7
INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
increase efficiency of functioning of thplatform of IOT. Internet of things has been one of highly
emerging technologies that have been benefitting the function of regular day to day execution of
missions. Dependencies regarding interoperability and communication protocol have been one of
significant reasons for developing better infrastructure for imbibing better communication
process.
Document Page
8
INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
Reference
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of internet
of things. arXiv preprint arXiv:1501.02211.
Hwang, Y. H. (2015, April). Iot security & privacy: threats and challenges. In Proceedings of the
1st ACM Workshop on IoT Privacy, Trust, and Security (pp. 1-1). ACM.
Li, S., & Da Xu, L. (2017). Securing the internet of things. Syngress.
Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems
Frontiers, 17(2), 243-259.
Mendez, D. M., Papapanagiotou, I., & Yang, B. (2017). Internet of things: Survey on security
and privacy. arXiv preprint arXiv:1707.01879.
Rehman, S. U., Khan, I. U., Moiz, M., & Hasan, S. (2016). Security and privacy issues in
IoT. International journal of communication networks and information security, 8(3),
147.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in
Internet of Things: The road ahead. Computer networks, 76, 146-164.
Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., & Wang, G. (2018). Security and privacy in the
medical internet of things: a review. Security and Communication Networks, 2018.
Weber, R. H. (2015). Internet of things: Privacy issues revisited. Computer Law & Security
Review, 31(5), 618-627.
Document Page
9
INTERNET OF THINGS PRIVACY AND SECURITY ISSUES
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in
Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250-1258.
Yi, S., Qin, Z., & Li, Q. (2015, August). Security and privacy issues of fog computing: A survey.
In International conference on wireless algorithms, systems, and applications (pp. 685-
695). Springer, Cham.
1 out of 10
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]