MN502 Overview of Network Security: Security Challenges in IoT

Verified

Added on  2023/06/11

|8
|470
|190
Report
AI Summary
This report delves into the security challenges present in emerging Internet of Things (IoT) networks, contrasting IoT characteristics with traditional networks and highlighting applications in smart homes, wearables, and smart cities. It identifies three key security issues: lack of data encryption, lack of data authorization, and security-side-channel attacks. For each issue, the report proposes countermeasures such as SSL protocol, antivirus software, and firewalls, respectively. The analysis is supported by references to academic literature, providing a concise overview of the security landscape in IoT and potential mitigation strategies. Desklib offers similar solved assignments and resources for students.
Document Page
Internet of Things
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
It is the system of several computing
devices and machines that are interlinked
and are used to identify uniquely [3].
It is the network of several physical
devices, vehicles and appliances.
IoT allows several objects for sensing and
controlling properly.
Introduction to IoT
Document Page
Content in traditional network is
consumed by request, whereas in IoT, user
has to search for the issue.
Everything is manually done in traditional
network, whereas, the entire technology is
driven by machines in IoT [1].
IoT is faster than the traditional networks.
Characteristics of IoT over
Traditional Networks
Document Page
Smart Home: Helps to control climate
and appliances and produces safer home
environment.
Wearables: Smart electronic devices that
are worn on the body as accessories. The
best examples are transponders [2].
Smart City: Utilizes several types of
electronic sensors for collection of data and
making lifestyle better for the citizens.
Three areas of Applications for
IoT
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Lack of Data Encryption: Due to this lack
of data encryption, it often becomes a major
issue for the users to secure their data from
hackers.
Lack of Data Authorization: Data often
loses its authentication as well as integrity
within this technology [4].
Security-side-channel Attacks: Security-
side-channel attacks mainly focus on
information as well as the procedure of
presentation of that information.
Three Security Issues in
IoT
Document Page
Lack of Data Encryption: Involvement
of SSL or Secure Sockets Layer Protocol.
Lack of Data Authorization:
Involvement of Antivirus software program
[1].
Security-side-channel Attacks:
Involvement of firewalls.
Countermeasures for Security
Issues
Document Page
[1] Wortmann, Felix, and Kristina Flüchter. "Internet of
things." Business & Information Systems Engineering 57,
no. 3 (2015): 221-224.
[2] Yang, Shuang-Hua. "Internet of things." In Wireless
Sensor Networks, pp. 247-261. Springer, London, 2014.
[3] Gubbi, Jayavardhana, Rajkumar Buyya, Slaven Marusic,
and Marimuthu Palaniswami. "Internet of Things (IoT): A
vision, architectural elements, and future
directions." Future generation computer systems 29, no. 7
(2013): 1645-1660.
[4] Zanella, Andrea, Nicola Bui, Angelo Castellani, Lorenzo
Vangelista, and Michele Zorzi. "Internet of things for smart
cities." IEEE Internet of Things journal 1, no. 1 (2014): 22-
32.
References
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]