Internet of Things: Security Challenges and Mitigation Strategies
Verified
Added on  2023/06/13
|5
|2317
|51
AI Summary
This report discusses the security challenges faced by IoT devices and provides mitigation strategies. It also includes a journal article on security and privacy issues in cloud-based IoT devices.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Internet of Things Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Task 2 Abstract- This report deals with the internet of things in the modern days.The use of the IoT devices in the modern world has been described.The security issues in the IoT devices have been provided in the report. There are some mitigation strategies provided in the report related to the security issues in the IoT devices. Keywords:Internet of Things (IoT) I. INTRODUCTION The internet of things has been increasing in the computing services for maintaining the computing services in the market.The use of cloud computing in the IoT devices has been helping in maintaining uniquecharacteristicsofresourceconstraintsand self-organizing behavior. However, there have been somesecuritychallengesinthecloudandIoT services. Thusly, this systems may help in keeping up andeasingtheissuesintheIoTstructureand development. The utilization in the IoT contraptions has been keeping up and viewing differing strategies in the associations. These contraptions can be utilized for the offering security to information and data in thealliance.ThejoiningofIoTanddispersed enlisting has been an extraordinary approach in the market. The utilization of IoT has been helping in obliging the multifaceted plan of the structures. IoT clientsaresnatchingagreatdealofchancesin keepingupasharpapproachinkeepingupa legitimateapproachforcrucialestimationtothe vitality boundless cloud for upgrading ability. The utilizationoflegitimatesystemintheIoT contraptions helps in keeping up different central issues at various field of activity in the market. This report discusses about the security issues in the cloudservices.Variouscloudsecurityissuesare described in the report based on the IoT devices. This report outlines about solutions of the challenges faced in the cloud and IoT services. II. CONCEPT OF IOT TheInternetofThingsiscomposedofphysical objects that can be embedded with the electronics, sensors and software. IoT has been widely used in various fields as its applications.The use of the IoT devices has been helping in minimizing complexity in various processes.The use of the IoT has been extendedtoindustry,experimentation,energy managementandaccuracy.TheuseintheIoT devices has been maintaining and monitoring various processes in the industries [1]. These devices can be usedfortheprovidingsecuritytodataand information in the organization. The convergence of IoT and cloud computing has been a great approach in the market. The use of IoT has been helping in minimizing the complexity of the systems. IoT users are gaining a lot of chances in maintaining a keen approachinmaintainingaproperapproachfor underlying computation to the energy abundant cloud for enhancing efficiency. The use of proper design in the IoT devices helps in maintaining various critical issues at different field of operation in the market. [6] Thecloud-basedIoTsolutionsareprovidinga convincing platform for contributing locality based services in order to satisfy customers. There are various characteristics of the cloud-based IoT devices: Identity Privacy: The identity privacy system has been maintaining the security of the mobile data user in the market.This helps in maintaining the security if the data and information of the users .The sue of
the IoT dataprivacyhelp in providing a proper approach in maintaining the identity constraint of the mobile [2]. Location privacy: It is an important feature in the IoT devices as the location of the user is kept secret form the outer world.The location of the users might be personal for the user.Therefore, the IoT devices are capable of hiding the location of the user in the market. Mobility: IoT devices are quite capable in mobility from one place to another.The IOT devices can be accessed from any place with the help of Internet as it is a cloud based devices. III. JOURNAL ARTICLE Zhou, J., Cao, Z., Dong, X. and Vasilakos, A.V., 2017.Securityandprivacyforcloud-basedIoT: Challenges. IEEE Communications Magazine, 55(1), pp.26-33. This journal article describes about the security and privacy issues in the cloud-based IoT devices.This paper focuses in the solutions to these challenges and future recommendations. There are various security issuesintheIoTdevicesincludingthelocation tracking, data privacy and malicious cyber-attacks. These attacks are very common in the IoT devices. The location privacy of the users can be tracked by hacking the IoT devices by the hackers [3].This might create problems for the users in the order to hide their personal location and address.The use of the IoT devices helps in storing data and information oftheorganizationandusersinthemarket. Therefore, there is a huge possibility of hacking data and information in the market. Therefore, the security if the data and information has been an important security threat for the IoT devices. Data loss can be dangerous or any user or any organization as it might becontainseveralimportantinformationabout companies. The computation results in the databases andthecloud-basedIoTdeviceshasbeen maintainingaproperconnectionwiththe computation results [4].The cloud security devices in maintaining the privacy in functional perspective oftheusersinthemarmite.Severaldataand information has been uploaded over the cloud storage related to the data security. However,thispaperhasdiscussedaboutthe mitigationstrategiesforthesechallengesinIoT devices.Asecurecredit-basedincentivescheme SMART has been prepared for maintaining a proper approachtostimulatepacketandmaintaininga security based solution in the system. Conditional identityprivacystrategieshavebeenhelping maintaining security of data and information of the system. There are different security issues in the IoT gadgetsincludingtheareafollowing, information protectionandmalevolentdigitalassaults.These assaults are exceptionally regular in the IoT gadgets. The area security of the clients can be followed by hacking the IoT gadgets by the programmers [3]. This may make issues for the clients in the request to conceal their own area and address. The utilization of the IoT gadgets helps in putting away information and data of the association and clients in the market. In this manner, there is an immense probability of hacking information and data in the market. In this way, the security if the information and data has been an essentialsecurity danger for the IoT gadgets. Information misfortune can be risky or any client or any association as it may be contain a few vital data about organizations. The calculation brings about the databases and the cloud-based IoT gadgets has been keepingupanappropriateassociationwiththe
calculationcomesabout[4].Theuseofvarious strategiesinthesystemhasbeenhelpingin maintaining efficiency of the system sin the market. By improvising the efficiency of the system, it helps in providing a huge level production in the market. Anonymous users are restricted from entering and accessing the system of the company. Therefore, this strategies might help in maintaining and mitigating the issues in the IoT system and technology [5]. The utilization in the IoT gadgets has been keeping up and observing different procedures in the businesses [1]. These gadgets can be utilized for the giving security to information and data in the association. The joining of IoT and distributed computing has been an extraordinary approach in the market. The utilization of IoT has been helping in limiting the intricacy of the frameworks. IoT clients are picking up a great deal of chances in keeping up a sharp approach in keeping up an appropriate approach for basic calculation to the vitality inexhaustible cloud forimprovingproficiency.Theutilizationof appropriateoutlineintheIoTgadgetshelpsin keeping up different basic issues at various field of activityinthemarket.[6]Thecloud-basedIoT arrangementsaregivingapersuadingstageto contributing area based administrations so as to fulfill clients. IV. CONCLUSION It can be concluded that the use of the IoT devices has been helping in minimizing the complexity of the system.There are various issues discussed in the report elated to the security in IoT devices.This report discusses about the mitigation strategies for loads by the author in order to resolve these security issues. The report contains a journal article based on the security in the cloud based IoT devices. The concept of the IoT has been discussed in the report. Thecomputationrealizesthedatabasesandthe cloud-basedIoTdeviceshasbeenkeepingupa properrelationshipwith thefiguringoccurs.The utilizationofdifferentmethodologiesinthe frameworkhasbeenhelpinginkeepingup proficiency of the framework sin the market. By ad lobbingthe effectiveness of the framework, it helps in giving a tremendous level creation in the market. Unknownclientsarelimitedfromenteringand gettingtothearrangementoftheorganization. Consequently, this techniques may help in keeping up and alleviating the issues in the IoT framework and innovation. The usage in the IoT contraptions has been keeping up and watching diverse methods in the organizations. These contraptions can be used for the offeringsecuritytodataandinformationinthe affiliation.ThejoiningofIoTanddisseminated registering has been a phenomenal approach in the market.TheuseofIoThasbeenhelpingin constraining the multifaceted design of the structures. IoTcustomersaregrabbingalotofchancesin keeping up a sharp approach in keeping up a proper approachforfundamentalestimationtothe essentialnessunlimitedcloudforenhancing capability. The use of proper framework in the IoT contraptions helps in keeping up various fundamental issuesatdifferentfieldofactioninthemarket. Restrictive character protection procedures have been helping keeping up security of information and data of the framework. There are diverse security issues in the IoT contraptions including the zone following, data insurance and malignant advanced strikes. These ambushes are particularly general in the IoT devices. The territory security of the customers can be trailed by hacking the IoT contraptions by the software engineers[3].Thismaymakeissuesforthe customers in the demand to hide their own particular
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
zone and address. The use of the IoT contraptions helpsinsecuringdataandinformationofthe affiliation and customers in the market. In this way, there is a tremendous likelihood of hacking data and information in the market. Along these lines, the securityifthedataandinformationhasbeena fundamental security risk for the IoT devices. Data incidentcanbeunsafeoranycustomerorany relationshipasitmightbecontainacoupleof indispensableinformationaboutassociations.The computation realizes the databases and the cloud- based IoT contraptions has been keeping up a proper relationshipwiththefiguringoccurs[4].The utilizationofdifferentmethodologiesinthe frameworkhasbeenhelpinginkeepingup productivity of the framework sin the market. By extemporizing the productivity of the framework, it helps in giving a tremendous level creation in the market. Unknown clients are limited from entering and getting to the arrangement of the organization. V. REFERENCES [1]Bhattacharjya, Aniruddha, Xiaofeng Zhong, and Jing Wang. "An end-to-end user two- wayauthenticateddoubleencrypted messaging scheme based on hybrid RSA for thefutureinternet architectures."InternationalJournalof Information and Computer Security10, no. 1 (2018): 63-79. [2]Kim,JungTae."RequirementofIoT Security Gateway To Improve Vulnerability ofSensorNode."InINTERNATIONAL CONFERENCEONFUTURE INFORMATION&COMMUNICATION ENGINEERING, vol. 7, no. 1, pp. 425-428. 2015. [3]Inui,Takahiro,MasakiKohana,Shusuke Okamoto,andMasaruKamada."IoT Technologies:StateoftheArtanda SoftwareDevelopmentFramework." InSmart Sensors Networks, pp. 3-18. 2017. [4]Kim,JungTae."Analysesofsecure authenticationschemeforsmarthome systembasedoninternetonthings." InApplied System Innovation (ICASI), 2017 International Conference on, pp. 335-336. IEEE, 2017. [5]Wei, Biao, Guohong Liao, Weijie Li, and Zheng Gong. "A Practical One-Time File EncryptionProtocolforIoTDevices." InComputational Science and Engineering (CSE)andEmbeddedandUbiquitous Computing (EUC), 2017 IEEE International Conference on, vol. 2, pp. 114-119. IEEE, 2017. [6]Ashok, M., P. Suresh Varma, and MV Rama Sundari. "IoT based Monitoring and Control System for Home Automation." (2017).