Challenges of the Internet of Things (IoT) in Term of Security

   

Added on  2023-06-10

81 Pages22608 Words228 Views
Running head: COMPUTER NETWORK SECURITY
Challenges of the Internet of Things (IoT) in Term of Security
MSc Computer Network Security
Supervisor:
Dr. Dhiya Al-jumeily
Done by:
SALEH A. ALFAHAD
(777730)
S.A.Alfahad@2017.ljmu.ac.uk
Challenges of the Internet of Things (IoT) in Term of Security_1
1COMPUTER NETWORK SECURITY
Acknowledgement
I would like to thank our supervisor Dr. Dhiya Al-jumeily who gave me this golden opportunity
of doing this wonderful project. I would also like to express my special thanks to him to for his
provision and guidance during the entire project. I would also like to extend my thanks to my
classmates who have helped me to the conduct this research project successfully.
Challenges of the Internet of Things (IoT) in Term of Security_2
2COMPUTER NETWORK SECURITY
Abstract
This focus of this project is on demonstrating the challenges being faced in Internet of Things
(IoT) in terms of security. The discussions as well as analysis are executed out in this project to
illustrate on the security issues within IoT and some solutions have also been proposed. The
security issues have been clearly stated categorizing them into different layers.
Further, analysis has been done on four applications of IoT to evaluate the issues and present
them so that those can be solved with proper mitigation strategies. In this research project,
secondary data analysis technique has been used which shows the security challenges of IoT in
four different fields of application. The issues have been elaborated in the results and discussion
to focus on the current and future challenges of IoT.
Finally, in the last chapter, a conclusion has been drawn to the study to present the outcomes that
are achieved from the project. Moreover, some recommendations have been provided so that
proper mechanisms can be implemented to prevent the challenges of IoT in terms of security.
Challenges of the Internet of Things (IoT) in Term of Security_3
3COMPUTER NETWORK SECURITY
Table of Contents
1. Introduction..................................................................................................................................6
1.1 Aims and Objectives of the project.......................................................................................7
1. Main Objective....................................................................................................................7
2. Specific Objectives..............................................................................................................7
1.2 Project Plan............................................................................................................................7
2. Literature Review......................................................................................................................10
2.1 Internet of Things Architecture...........................................................................................10
2.2 Internet of Things Layers.....................................................................................................11
1. Perception layer.................................................................................................................12
2. Network layer....................................................................................................................12
3. Application layer...............................................................................................................13
2.3 IoT Applications..................................................................................................................13
2.4 Security Challenges in IoT Layers......................................................................................15
1. Perception Layer................................................................................................................15
2. Network Layer...................................................................................................................16
3. Application Layer..............................................................................................................17
2.5 Threats Facing IoT...............................................................................................................17
2.6 The fundamental differences between Internet of things and traditional Internet...............18
2.7 Security Directions for IoT layers.......................................................................................20
Challenges of the Internet of Things (IoT) in Term of Security_4
4COMPUTER NETWORK SECURITY
3. Methodology..............................................................................................................................23
3.1 Introduction..........................................................................................................................23
3.2 Research Philosophy............................................................................................................23
3.3 Research Approach..............................................................................................................25
3.4 Research Design..................................................................................................................26
3.5 Data Collection Method.......................................................................................................27
1. Data sources.......................................................................................................................27
2. Data techniques..................................................................................................................28
3. Data Analysis Method.......................................................................................................29
3.6 Ethical Consideration...........................................................................................................29
3.7 Research Limitation.............................................................................................................30
3.8 Summary..............................................................................................................................31
4. Findings and Analysis................................................................................................................32
4.1 Introduction..........................................................................................................................32
4.2 Analysis...............................................................................................................................32
1. Analyzing the Fitbit Health Tracker..................................................................................33
2. Analyzing the BMW Connected Drive System for Automobiles.....................................36
3. Analysis of the HomeEasy Protocol for Home Automation.............................................37
4. Analyzing the Eye-Fi Internet-Connected SD-Card for Digital Cameras.........................41
4.3 Summary..............................................................................................................................43
Challenges of the Internet of Things (IoT) in Term of Security_5
5COMPUTER NETWORK SECURITY
5. Results and Discussion..............................................................................................................45
5.1 Introduction..........................................................................................................................45
5.2 Discussion............................................................................................................................45
1. Constraints.........................................................................................................................47
2. Current challenges.............................................................................................................49
3. Future challenges...............................................................................................................53
5.3 Summary..............................................................................................................................54
6. Conclusion and Recommendations............................................................................................56
6.1 Conclusion...........................................................................................................................56
6.2 Recommendations................................................................................................................58
References......................................................................................................................................61
Appendix – Practical Work...........................................................................................................77
Table of Figures
Figure 1: Interact the IoT with different things...............................................................................7
Figure 2: Generic service-oriented architecture for IoT................................................................11
Figure 3: Types of Research Philosophy.......................................................................................24
Figure 4: Fitbit activity tracker......................................................................................................34
Figure 5: BMW Connected Drive Application..............................................................................36
Figure 6: HomeEasy protocol packet format and security exploit state diagram..........................39
Figure 7: Microcontroller used for HomeEasy protocol packet transmission...............................40
Figure 8: The EyeFi Mobi SD card...............................................................................................41
Figure 9: Key setup procedure for EyeFi......................................................................................42
Challenges of the Internet of Things (IoT) in Term of Security_6
6COMPUTER NETWORK SECURITY
1. Introduction
The term “Internet of Things” was first used in 1999 by Kevin Ashton- former MIT’s
Auto-ID centre director in his Procter and Gamble presentation (Mario, 2016). Since then, the
term is so popular, an event that made the International Telecommunication Union (ITU) to use
the Internet of things in 2006 Internet Report (Mario, 2016). Internet of things (IoT), is a
convenient way of linking devices with each other. It connects numerous objects within a single
source of the network that assists in the completion of tasks requiring such connectivity. The
connection can be made remotely across the present network infrastructure, enabling the
integration of the physical world into computerized systems. In effect, it results in enhanced
efficiency, accuracy as well as minimized human intervention. The application of IoT is broad,
as such the devices connected to this system can be in cities, houses, and factories and even in
schools (Floarea et al., 2017). According to Zhang et al. (2011), Internet of things is an
interconnected network infrastructure of self-configured and intelligent nodes (things), which
interact with each other unconditionally. Studies on this matter estimate that the IoT will consist
of between 50 to 100 billion objects, shortly following the current trend, where, in 2017, 31%
increment of these devices was recorded (Sedrati and Mezrioui, 2017). None could predict these
figures 20 years back, therefore, if this is something to go with, the future of the Internet is
almost impossible to predict.
Challenges of the Internet of Things (IoT) in Term of Security_7
7COMPUTER NETWORK SECURITY
Figure 1: Interact the IoT with different things
(Source: Iotamy.com., 2018)
1.1 Aims and Objectives of the project
1. Main Objective
The main aim of this project is to assess the existing IoT security goals and challenges to
establish more advanced ways of protecting the system against any threat.
2. Specific Objectives
i. To identify the ways through which the Internet of things protects the collected data.
ii. To identify the differences between Internet of things and the traditional Internet.
iii. To identify the security challenges in the Internet of things.
1.2 Project Plan
Planning is an essential part of any successful study. It enables the researcher to
accomplish various tasks within the stipulated period. Besides, it allows for evaluation and
improvement in areas of less strength to achieve the set objectives. Research is an expensive
Challenges of the Internet of Things (IoT) in Term of Security_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Department of Engineering and Computing - Smart Home
|63
|11563
|11

Unit 43: Internet of Things PDF
|43
|9819
|457

Blockchain in IoT
|76
|20208
|189

Internet of Things: A Review of Literature and Security Issues
|8
|810
|321

Security of Internet of Things - Issues, Vulnerabilities and Measures
|12
|555
|406

Annotated Bibliography On Network And Information Security Technologies
|8
|1781
|39