Ask a question from expert

Ask now

Security Issues and Solutions Doc

11 Pages2796 Words100 Views
   

Added on  2020-02-24

Security Issues and Solutions Doc

   Added on 2020-02-24

BookmarkShareRelated Documents
Running head: IOT: SECURITY ISSUES AND SOLUTIONSAssessment item [Student Name Here][Institution’s Name Here][Professor’s Name Here][Date Here]
Security Issues and Solutions Doc_1
IOT: SECURITY ISSUES AND SOLUTIONS2Executive SummaryInformation technology has diversified the access and availability of information todaythrough the different technologies it uses more so, the internet which is seen as the majorproponents of its success. In fact, the internet is so crucial to IT that its evolution is seen asthe defining factor of future systems such as smart cities and virtualization outcomes. Now,the internet of things (IoT) is outlines the next advancement in internet technology, whereglobal connection is achieved. Through IoT, objects will operate intelligently without humaninterference, an outcome that will improve their operation efficiency. Moreover, IoT willfacilitate the overall integration of information through extended instances of data collectionand analysis. However, while IoT will offer many benefits and advances it also faces manychallenges particularly, with its security, the subject of this report. This report outlines thesecurity issues of IoT as discussed by different researchers through their discussion material.Furthermore, the report also highlights the gaps and solutions to these problems.Keywords: Internet of Things, Internet, security, privacy
Security Issues and Solutions Doc_2
IOT: SECURITY ISSUES AND SOLUTIONS3Table of ContentsContents PageIntroduction........................................................................................3Summary of the discussions..............................................................3Issues not addressed...........................................................................5Impact of the security issues and challenges of IoT..........................6Reflection.............................................................................................7Conclusion...........................................................................................8References............................................................................................9
Security Issues and Solutions Doc_3
IOT: SECURITY ISSUES AND SOLUTIONS4IntroductionToday’s technological systems and devices are designed with the implementation of IoT,where they are developed using smart structures that generally improve their autonomousoutcomes. These outcomes are facilitated by technologies such as radio frequencyidentification (RFID), where electromagnetic waves are used to identify and control devicesremotely. Moreover, sensors and actuators are used to improve the control of the said deviceswhich helps to improve the IoT outcomes. In general, this technological architecture ofautomatic connections, sensors and actuators is the defining component of IoT [CITATIONTan16 \l 2057 ].IoT is also majorly defined by the internet as it’s the main network that will facilitatecommunication among the devices or objects involved. Furthermore, it is through the internetthat the different industries and fields will connect to each other, a vital aspect of IoT as itwill have extended connections across all operating environments. In addition to this, IoTwill use intelligent systems to perform its functionalities, a technological aspect that willinfluence the connectivity of different heterogeneous objects across different regions. Again,this outcome is met using the internet more so, through its protocols such as IP and IPaddressing schemes [ CITATION Van16 \l 2057 ].Summary of the discussionsVijayalakshmi and Arockiam (2016), highlight the security issues facing IoT in a generalperspective, where the different operational activities are outlined, such as RFID tagging,wireless connections, transmission, privacy and data security. Now, RFID tagging is prone tomany attacks including cloning and duplication an outcome that is facilitated by its minimalsecurity features. Moreover, the same component of the technology will use wirelesstechnology to connect devices which expose it to many security challenges. For one, wirelesssystems lack the physical protection provided by wired systems where access is granted
Security Issues and Solutions Doc_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IOT - Security Issues and Solutions - Report
|9
|2197
|75

Security Challenges in Emerging Networks Assignment
|4
|2314
|59

Internet of Things Technology
|11
|2627
|81

Security Challenges in Emerging Networks | Assignment
|4
|2579
|48

IoT devices. Connection between diff erent device s. In
|17
|350
|256

Proposed Model for IoT Implementation
|12
|2095
|299