Security of Internet of Things - Issues, Vulnerabilities and Measures

Verified

Added on  2023/06/11

|12
|555
|406
AI Summary
This presentation discusses the security concerns related to Internet of Things (IoT) devices and networks. It covers the potential vulnerabilities, such as inadequate security features, exploitable web interfaces, and privacy concerns. The presentation also suggests measures to secure IoT applications, including the usage of trusted platform modules, isolation of infected devices, and proper data encryption.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
SECURITY OF
INTERNET OF THINGS

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTRODUCTION
IOT OR INTERNET OF THINGS IS REFEREED AS THE
NETWORK OF COMPUTING DEVICES, OBJECTS, DIGITAL
MACHINES AND MECHANICAL DEVICES WHICH ARE
INTERRELATED. WITHOUT THE NEED OF HUMAN TO
COMPUTER OR HUMAN O HUMAN INTERACTION,
THESE DEVICES HAVE THE POTENTIAL TO TRANSFER
INFORMATION OVER A NETWORK.
Document Page
APPLICATIONS WEARABLES
SMART GRIDS
CONNECTED CAR
CONNECTED HEALTH
INDUSTRIAL INTERNET
SMART RETAIL.
SMART CITY
Document Page
SECURITY ISSUES
LESS STORAGE, PROCESSING CAPABILITY AND MEMORY
OF DEVICES
UNABLE TO PREDICT SECURIY ISSUES
NOT ALWAYS EFFICEINT IN DETECTING INCIDENTS AND
VULBERABILITIES
UANBLE TO MANAGE VULNERABILITIES
HAVING HIGH VULNERABILITY

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Continued… ENSURING A SECURE COMMUNICATION CHANNEL
MANAGING THE UPDATES ON THE DEVICES
RGULARLY
AUTHENTICATION AND AUTHORZATION PROBLEMS
SECURING THE APPLICATIONS THAT ARE PRESENT
IN THE MOBILE, CLOUD AND WEB (Gubbi et al.,
2013)
MAINTAING THE SECURITY OF DATA AND PRIVACY
Document Page
RESEARCH WORKS SMART GADJETS
IoT APPLICATIONS (Chen et al., 2014)
SMART HOME AUTOMATION
CONNECTED LOGISTICS
ASSOCIATING IT WITH BLOCKCHAIN
SMART TRAFFIC
Document Page
VULNERABILITES
IMPROPER AUTHENTICATION AND AUTHORIZATION
ISSUES
EXPLOITABLE WEB INTERFACE
NETWROK SERICES WHICH ARE NOT SECURE
NOT ENOUGH TRANSPORT ENCRYPTION
PRIVACY CONCERNS

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Continued… CLOUD INTERFACES WHICH ARE NOT SECURE
MOBILE INTERFACES WHICH ARE NOT SECURE
INADEQUATE SECURITY FEATURES (Fortino & Trunfio, 201
FIRMWARE AND SOFTWARE SAFETY ISSUES
ERASURE OF ALL PERSONAL INFORMATION
Document Page
SECURITY MEASURES
USAGE OF A TPM OR TRUSTED PLATFORM MODULE
FOR AUTHRIZATION PURPOSES
FOR CHECKING MALICIOUS FORMWARE OR
UPDATES, THE TNC OR TRUSTED NETWORK
CONNECT STANDARDS NEED TO BE CHECKED
(Balani & Hathi, 2016)
THE INFECTED DEVICES NEED TO BE ISOLATED
AND REMEDIATED WITH SECURITY PROTOCOLS
AND SOFTWARES
Document Page
Continued…
ONCE THE DEVICES ARE COMPROMISED, A LAYERED
DECURITY SYSTEM CAN MINIMIZE THE DAMAGE THE
HACKER CAN CAUSE (Theoleyre & Pang, 2013)
EVERY DEVICE SHOULD HAVE PROPER DATA
ENCRYPTION
WITH THE HELP OF INDUSTRIAL CONTROL SYSTEMS,
THE LEGACY SYSTEMS NEED TO BE SECURED

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
REFERENCES
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
1645-1660.
Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). A vision of IoT: Applications, challenges,
and opportunities with china perspective. IEEE Internet of Things journal, 1(4), 349-359.
Balani, N., & Hathi, R. (2016). Enterprise IoT: A Definitive Handbook. CreateSpace
Independent Publishing Platform.
Theoleyre, F., & Pang, A. C. (Eds.). (2013). Internet of Things and M2M Communications. River
Publishers.
Fortino, G., & Trunfio, P. (Eds.). (2014). Internet of things based on smart objects: Technology,
middleware and applications. Springer Science & Business Media.
Document Page
THANK YOU
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]