IoT Security Issues and Risks
VerifiedAdded on 2022/12/01
|6
|1123
|119
AI Summary
This research focuses on the security threats and risks faced by consumers while using IoT based devices and prevention techniques for improving performance of IoT networks. A literature review is conducted for a better understanding of the research topic and analyzing the results of previous papers.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: IOT SECUIRTY ISSUES AND RISKS 1
Security risks and Issues in IoT Technology
Author Name(s), First M. Last, Omit Titles and Degrees
Institutional Affiliation(s)
Author Note
Include any grant/funding information and a complete correspondence address.
Security risks and Issues in IoT Technology
Author Name(s), First M. Last, Omit Titles and Degrees
Institutional Affiliation(s)
Author Note
Include any grant/funding information and a complete correspondence address.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IOT SECURITY ISSUES AND RISKS 2
Abstract
The term IoT is defined as the internet of things which is a part of IT system that links
computing plans and physical things with each other using internet based networks. A thing in
the IoT system can be a human with a heart monitor implant which is connected with the sensors
and devices for controlling and managing communication systems. It is observed that security is
a common issue linked with the IoT which directly influence the individual data of customers
and companies. The aim of this research is to examine security risks linked with IoT and
evaluate mitigation techniques for improving performance of IoT enabled devices. A literature
review is conducted for a better understanding of the research topic and analyzing the results of
previous papers.
Keywords: IoT, computing devices, security, physical things and so on.
Abstract
The term IoT is defined as the internet of things which is a part of IT system that links
computing plans and physical things with each other using internet based networks. A thing in
the IoT system can be a human with a heart monitor implant which is connected with the sensors
and devices for controlling and managing communication systems. It is observed that security is
a common issue linked with the IoT which directly influence the individual data of customers
and companies. The aim of this research is to examine security risks linked with IoT and
evaluate mitigation techniques for improving performance of IoT enabled devices. A literature
review is conducted for a better understanding of the research topic and analyzing the results of
previous papers.
Keywords: IoT, computing devices, security, physical things and so on.
IOT SECURITY ISSUES AND RISKS 3
Introduction
IoT is a computing skill that has the capability for linking numbers of devices with each
other by using internet connections. It is mainly used in the business industries for controlling
computer devices from any location and connecting sensor-based networks with physical
devices. This research focuses on the security threats and risks faced by consumers while using
IoT based devices and prevention techniques for improving performance of IoT networks. In
which a literature review will be included for improving the quality of research and evaluating
the key findings of previous papers published on IoT.
Literature review
Internet of things
Abomhara, & Køien, (2014) argued that the IoT is a system of intercommunicated
computing networks and digital machineries or other devices which physical things that are able
to transfer signal over a network without using any social assistance. From this paper, it is
observed that IoT is an effective IT system that has the capability for controlling and handling
computing devices from any location.
A current study provided by Bekara, (2014) argued that IoT is an ecosystem of linked
physical objects which are accessible by using internet networks. With the help of this
technology, consumers can send and receive information from any location and companies can
enhance the overall performance of their IT infrastructure. As compared with other studies Riahi,
Challal, Natalizio, Chtourou, & Bouabdallah, (2013) critically reviewed the security risks linked
with IoT and also highlighted their impacts on personal data of consumers. It is observed that the
lack of configuration is a key factor that increases the issue of security attacks in IoT.
Introduction
IoT is a computing skill that has the capability for linking numbers of devices with each
other by using internet connections. It is mainly used in the business industries for controlling
computer devices from any location and connecting sensor-based networks with physical
devices. This research focuses on the security threats and risks faced by consumers while using
IoT based devices and prevention techniques for improving performance of IoT networks. In
which a literature review will be included for improving the quality of research and evaluating
the key findings of previous papers published on IoT.
Literature review
Internet of things
Abomhara, & Køien, (2014) argued that the IoT is a system of intercommunicated
computing networks and digital machineries or other devices which physical things that are able
to transfer signal over a network without using any social assistance. From this paper, it is
observed that IoT is an effective IT system that has the capability for controlling and handling
computing devices from any location.
A current study provided by Bekara, (2014) argued that IoT is an ecosystem of linked
physical objects which are accessible by using internet networks. With the help of this
technology, consumers can send and receive information from any location and companies can
enhance the overall performance of their IT infrastructure. As compared with other studies Riahi,
Challal, Natalizio, Chtourou, & Bouabdallah, (2013) critically reviewed the security risks linked
with IoT and also highlighted their impacts on personal data of consumers. It is observed that the
lack of configuration is a key factor that increases the issue of security attacks in IoT.
IOT SECURITY ISSUES AND RISKS 4
Security risks and issues in IoT
According to Zhang, et al., (2014) denial of service is a common security risk that
occurred in the IoT because it uses wireless networks and internet connection that help hackers
for performing hacking related processes. From this paper, it has found that consumers use
unauthorized servers while using IoT based devices that are developed by hackers for obtaining
data of users. Zhao, & Ge, (2013) proposed a literature survey and identified that there are
various kinds of security risks occurred in the IoT technology. These risks include DOS attack,
malware, misconfiguration of networks, phishing attack, and so on. As compared with previous
papers the authors provided in-depth analysis about IoT security risks and also suggested several
recommendations.
Discussion
It is discussed that there are major two risk factors that rise the amount of security attacks
and risks in IoT such as misconfiguration of networks, utilization of unauthentic networks. A
recent study suggested that the many consumers are using the less secure networks in their
systems while developing IoT based devices which can raise the degree of security attacks in the
workplace (Zhao, & Ge, 2013). There are various kinds of mitigation techniques and steps that
can be used by companies and users for reducing security risks associated with IoT. These steps
are described below:
Use only authentic networks in the system
User should ensure that they access personal networks in secure networks
Follow proper configuration processes and steps while developing IoT based devices
Use secure networks and servers in the IoT enabled devices
Adopt encryption related techniques while exchanging data using IoT based devices
Security risks and issues in IoT
According to Zhang, et al., (2014) denial of service is a common security risk that
occurred in the IoT because it uses wireless networks and internet connection that help hackers
for performing hacking related processes. From this paper, it has found that consumers use
unauthorized servers while using IoT based devices that are developed by hackers for obtaining
data of users. Zhao, & Ge, (2013) proposed a literature survey and identified that there are
various kinds of security risks occurred in the IoT technology. These risks include DOS attack,
malware, misconfiguration of networks, phishing attack, and so on. As compared with previous
papers the authors provided in-depth analysis about IoT security risks and also suggested several
recommendations.
Discussion
It is discussed that there are major two risk factors that rise the amount of security attacks
and risks in IoT such as misconfiguration of networks, utilization of unauthentic networks. A
recent study suggested that the many consumers are using the less secure networks in their
systems while developing IoT based devices which can raise the degree of security attacks in the
workplace (Zhao, & Ge, 2013). There are various kinds of mitigation techniques and steps that
can be used by companies and users for reducing security risks associated with IoT. These steps
are described below:
Use only authentic networks in the system
User should ensure that they access personal networks in secure networks
Follow proper configuration processes and steps while developing IoT based devices
Use secure networks and servers in the IoT enabled devices
Adopt encryption related techniques while exchanging data using IoT based devices
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IOT SECURITY ISSUES AND RISKS 5
Install firewall and antivirus related tools in the computer systems for blocking fraud
links and signals
Conclusion and future scope
It is concluded that the use of unauthorized networks is a common problem that increases
security risks in IoT devices and networks. This research paper critically reviewed the security
threats and issues occurred in IoT technologies. Therefore, it is recommended that users should
use only authentic networks and follow proper configuration processes while implementing IoT
networks. The future research will describe the advantages and disadvantages of IoT and also
discuss security attacks occurred in IoT in more detail.
Install firewall and antivirus related tools in the computer systems for blocking fraud
links and signals
Conclusion and future scope
It is concluded that the use of unauthorized networks is a common problem that increases
security risks in IoT devices and networks. This research paper critically reviewed the security
threats and issues occurred in IoT technologies. Therefore, it is recommended that users should
use only authentic networks and follow proper configuration processes while implementing IoT
networks. The future research will describe the advantages and disadvantages of IoT and also
discuss security attacks occurred in IoT in more detail.
IOT SECURITY ISSUES AND RISKS 6
References
Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current
status and open issues. In 2014 international conference on privacy and security in
mobile systems (PRISMS), 12(5), 1-8.
Bekara, C. (2014). Security issues and challenges for the IoT-based smart grid. Procedia
Computer Science, 34(2), 532-537.
Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013). A systemic
approach for IoT security. In 2013 IEEE international conference on distributed
computing in sensor systems, 6(4), 351-355.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014). IoT
security: ongoing challenges and research opportunities. In 2014 IEEE 7th international
conference on service-oriented computing and applications, 12(8), 230-234.
Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In 2013 Ninth
international conference on computational intelligence and security, 8(7), 663-667.
References
Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current
status and open issues. In 2014 international conference on privacy and security in
mobile systems (PRISMS), 12(5), 1-8.
Bekara, C. (2014). Security issues and challenges for the IoT-based smart grid. Procedia
Computer Science, 34(2), 532-537.
Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013). A systemic
approach for IoT security. In 2013 IEEE international conference on distributed
computing in sensor systems, 6(4), 351-355.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014). IoT
security: ongoing challenges and research opportunities. In 2014 IEEE 7th international
conference on service-oriented computing and applications, 12(8), 230-234.
Zhao, K., & Ge, L. (2013). A survey on the internet of things security. In 2013 Ninth
international conference on computational intelligence and security, 8(7), 663-667.
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.