Internet of Things (IoT) Security

Verified

Added on  2023/06/03

|9
|2735
|258
AI Summary
The research essay focuses on Internet of Things security. The transfer of IT networks from closed networks to enterprise networks to public internet is taking place at a fast rate and therefore creating alarming IoT security issues. The following paragraphs will enlighten on the security challenges that are faced by Internet of Things connected devices and suggest ways to address the security issues.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: INTERNET OF THINGS (IOT) SECURITY
INTERNET OF THINGS (IOT) SECURITY
Name of the student:
Name of the university:
Author Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2INTERNET OF THINGS (IOT) SECURITY
The research essay focuses on Internet of Things security. Internet of things can manage
huge number of devices that are interconnected in the network and provides the capability to
communicate and manage devices remotely through the internet. The application of Internet of
things is extending from operating rooms of hospitals to residential basements. The transfer of IT
networks from closed networks to enterprise networks to public internet is taking place at a fast
rate and therefore creating alarming IoT security issues (Farooq, Waseem, Khairi & Mazhar,
2015). Today people are increasingly being dependent upon intelligent and interconnected
devices in all aspects of life. Therefore, initiative should be taken in securing these devices and
complying them with regulatory requirements as they perform important functions that are
related with the life of people. Breaches in IoT security is becoming an alarming issue and
dominating news headlines lately (Mahmoud, Yousuf, Aloul, & Zualkernan, 2015). As a result,
government of every nation should make huge investment on IoT security technologies. The
following paragraphs will enlighten on the security challenges that are faced by Internet of
Things connected devices and suggest ways to address the security issues.
IoT devices attack sources:
Internet of Things promises to provide better safety and management to areas where the
technology is widely used. Additionally, it improves efficiency of energy along with optimizing
manufacturing processes. Despite of these benefits, security breaches leads to customer
dissatisfaction, violation of privacy and monetary losses (Tankard, 2015). The IoT security
breaches might happen due to attacks from internet bugs, eavesdropping, denial-of-service
attacks and ransom ware attacks. Therefore, there is an increasing demand for securing this
technology.
Document Page
3INTERNET OF THINGS (IOT) SECURITY
IoT security is the area of internet of things that is concerned with safeguarding network
and devices connected to the network. Connected devices are known as ‘things’ in the context of
internet of things that are uniquely identified by identifiers in the network. They have ability to
automatically transfer data in the network. Machine-to-machine communication in industries that
uses embedded sensors systems and computing devices have increased IoT communication
(Abomhara & Køien, 2015). Additionally, IoT communication prevails in vehicle-to-vehicle
communication, smart energy grids, building and home automation as well as in wearable
computing devices.
The concept of integrating devices and other objects into a network is new and as a result,
security has not been considered in product design. The IoT devices that are sold sometimes
consists of unpatched and old embedded software and systems (Riahi, Natalizio, Challal, Mitton
& Iera, 2014). Changing the default passwords of smart devices becomes difficult for the
purchasers. Even if they change, they fail to select strong passwords. Therefore, to increase
security, segmentation of an IoT device into its own network is needed and the network should
have restricted access. The network can then be monitored for detecting unusual traffic and
necessary actions can be taken.
IoT security issues and vulnerabilities:
Various organisation have adopted this emerging technology and facing security issues.
Hackers are exploiting these security issues and stealing personal information of users through
various means. According to recent news, they even targeted smart refrigerator to exploit user
data. Security experts have also revealed that IoT security issues arises with individual using
same login passwords for multiple websites. They use the same ID and password for their IoT
devices, which can be easily hacked (Hossain, Fotouhi, & Hasan, 2015). If the hackers get
Document Page
4INTERNET OF THINGS (IOT) SECURITY
information about an individual’s google account then it is quite possible that he will get all bank
information of the individual. This will lead to monetary loss. Another news revealed that
hackers are using a particular software bug to hijack smart cars remotely. With the software, they
are able to control steering, brakes and even transmission of the cars. Therefore, the emerging
technology should pass through various rules and regulations to ensure security and privacy of
sensitive data as well as IoT devices.
Contribution of chip manufacturers to IoT security:
Security experts are continuously warning about the huge number of connected devices
through internet that are prone to malicious attacks since the birth of IoT concept in late 1990s. A
researcher in Proofpoint that is an enterprise security firm first discovered IoT botnet in
December 2013. He said that baby monitors, smart TVs and household appliances made up 25
percent of the botnet. Security experts fear for security disaster if security issues are not solved
soon (Riahi, Challal, Natalizio, Chtourou & Bouabdallah, 2013). Hackers are finding it easy to
hack routers instead of computers. Experts even feel that computers in modems and routers are
much more powerful that the computers of 1990s. To understand the security issues of IoT, first
embedded system market should be understood. The chip manufacturer makes the chip as cheap
as possible while keeping profit margin slim. Less engineering knowledge is involved without
giving much priority to security (Xu, Wendt, & Potkonjak, 2014). A Linux operating system is
put onto the chip and sold in the market. Original device manufacturers (ODM) purchases the
chip based on price, features like bandwidth, and gives the outlook of embedded device along
with its brand name. They also give less priority to security. The problem is with software that
has been programmed in the chip. Software provided is old even when the device is new. As a
result, these devices become more vulnerable to security attacks. The situation is made worse as

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5INTERNET OF THINGS (IOT) SECURITY
old software components cannot be upgraded to latest versions. It resulted in millions of insecure
and unpatched devices sitting in the internet for about five to ten years (Dorri, Kanhere, Jurdak &
Gauravaram, 2017). Some of the common malwares that attack IoT devices are Malware DNS
Changer that attacks computers, home routers, and Linux worms that targets cameras, routers
and other embedded systems connected to the internet through Internet of Things.
API management system for IoT security:
Service providers of platforms and devices are increasingly being concerned about
sensitive data that flows through IoT devices in the network. One way to control data flow
through these devices to ensure security is application-programming interface (API) (Chase,
2013). Despite of the security issues, IoT application have several positive sides that needs to be
considered. To ensure privacy controls API management systems should be enforced (Gubbi,
Buyya, Marusic & Palaniswami, 2013). The functions that API management system provides
are:
Connection between application in use and API is automated and controlled by API
software tool.
Traffic of individual applications is monitored by API software tool
Application performance can be improved by the use of API management system as it
provides caching mechanism and memory management.
Change of priorities related to security:
Devices within IoT aggregate and collect fragments of data from where privacy risks
arises. The manufacturers of IoT devices should give more priority to IoT device security as the
physical world is increasingly being integrated with technology. The application of IoT is
reaching from industrial control to home appliances and devices such as transport and power
Document Page
6INTERNET OF THINGS (IOT) SECURITY
control. More the expansion of application more complex becomes the technology and severe the
consequences. Therefore, security of the devices connected through internet should be given
more priority as the devices handles sensitive user data and information. The protocol that should
be used and being forced to web engineers is IPv6. The protocol offers limitless IP addresses
however will take time to be implemented practically.
Securing devices connected through internet:
Evolution of technology in future will combine all smart devices, big data analytics and
cloud that will change lives of people. Internet of Things is referred as a gateway between
physical and digital world. The examples of IoT are smart vehicles, thermostats, smart meters,
health and activity monitors and so on. The devices interact with individual using ZigBee,
Bluetooth, Wi-Fi and Z-wave (Wurm, Hoang, Arias, Sadeghi & Jin, 2016). Internet of Things
has the ability to collect information from various systems and devices that provides great
convenience and insights. Despite of all positive effects of IoT, when it comes to security history
is repeating itself. The number of device connected to the internet is growing day by day and
therefore threats of possible attacks are increasing (Andrea, Chrysostomou & Hadjichristofi,
2015). Internet of Things is still in its emerging phase and therefore security and privacy can be
ensured. Privacy and security can be ensured by following few steps:
Implementer: If an organisation is planning to implement internet of things then security
and privacy policies should be ensured by its vendor to improve security.
Developer: The manufacturer of the IoT devices should also take necessary steps to
ensure security by using hardware security techniques, securing operating systems as well
as using secure developmental methods.
Document Page
7INTERNET OF THINGS (IOT) SECURITY
Securer: Individual who is in charge of IoT device security should start making strides as
an initiative for developing new security approaches towards internet of things.
Consumer: End consumers should ensure that they purchase IoT devices with in-built
security. Changing default password will enable security features. Encryption is
significantly important for ensuring IoT security.
From the above discussions, it can be concluded that security of Internet of Things is
necessary to keep sensitive user data confidential. Organisations using this emerging technology
should ensure that they are purchasing in-built secured IoT devices. Hackers are finding it easy
to hack routers rather than PC. Today people are increasingly being dependent upon intelligent
and interconnected devices in all aspects of life. Initiative should be taken in securing these
devices and complying them with regulatory requirements as they perform important functions
that are related with the life of people. The application of IoT is reaching from industrial control
to home appliances and devices. More the expansion of application more complex becomes the
technology and severe the consequences. Therefore, security of the devices connected through
internet should be given more priority as the devices handles sensitive user data and information.
Application programming interface can be used as a solution to IoT security issues. The
implementer, developer or manufacturer, securer as well as consumer all are responsible for
securing IoT devices. It is the responsibility of implementer to use in-built secured IoT devices.
Developer should ensure security checks while manufacturing the devices. Securer and consumer
should also ensure privacy and security policies in IoT devices. The number of IoT devices is
increasing day by day and therefore it is the responsibility of the user to ensure security in
internet-connected devices.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8INTERNET OF THINGS (IOT) SECURITY
References:
Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities,
threats, intruders and attacks. Journal of Cyber Security, 4(1), 65-88.
Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015, July). Internet of Things: Security
vulnerabilities and challenges. In Computers and Communication (ISCC), 2015 IEEE
Symposium on (pp. 180-187). IEEE.
Chase, J. (2013). The evolution of the internet of things. Texas Instruments, 1.
Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). A vision of IoT: Applications, challenges,
and opportunities with china perspective. IEEE Internet of Things journal, 1(4), 349-359.
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017, March). Blockchain for IoT
security and privacy: The case study of a smart home. In Pervasive Computing and
Communications Workshops (PerCom Workshops), 2017 IEEE International Conference
on (pp. 618-623). IEEE.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security
concerns of internet of things (IoT). International Journal of Computer Applications,
111(7).
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
1645-1660.
Document Page
9INTERNET OF THINGS (IOT) SECURITY
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues,
challenges, and open problems in the internet of things. In Services (SERVICES), 2015
IEEE World Congress on (pp. 21-28). IEEE.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT)
security: Current status, challenges and prospective measures. In Internet Technology
and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 336-
341). IEEE.
Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013, May). A systemic
approach for IoT security. In Distributed Computing in Sensor Systems (DCOSS), 2013
IEEE International Conference on (pp. 351-355). IEEE.
Riahi, A., Natalizio, E., Challal, Y., Mitton, N., & Iera, A. (2014, February). A systemic and
cognitive approach for IoT security. In Computing, Networking and Communications
(ICNC), 2014 International Conference on (pp. 183-188). IEEE.
Tankard, C. (2015). The security issues of the Internet of Things. Computer Fraud & Security,
2015(9), 11-14.
Wurm, J., Hoang, K., Arias, O., Sadeghi, A. R., & Jin, Y. (2016, January). Security analysis on
consumer and industrial iot devices. In Design Automation Conference (ASP-DAC), 2016
21st Asia and South Pacific (pp. 519-524). IEEE.
Xu, T., Wendt, J. B., & Potkonjak, M. (2014, November). Security of IoT systems: Design
challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International
Conference on Computer-Aided Design (pp. 417-423). IEEE Press.
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]