Security Issues and Solutions Doc

Added on -2020-02-24

| 11 pages| 2796 words| 100 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 4 of 11 pages

Running head: IOT: SECURITY ISSUES AND SOLUTIONSAssessment item [Student Name Here][Institution’s Name Here][Professor’s Name Here][Date Here]
IOT: SECURITY ISSUES AND SOLUTIONS2Executive SummaryInformation technology has diversified the access and availability of information todaythrough the different technologies it uses more so, the internet which is seen as the majorproponents of its success. In fact, the internet is so crucial to IT that its evolution is seen asthe defining factor of future systems such as smart cities and virtualization outcomes. Now,the internet of things (IoT) is outlines the next advancement in internet technology, whereglobal connection is achieved. Through IoT, objects will operate intelligently without humaninterference, an outcome that will improve their operation efficiency. Moreover, IoT willfacilitate the overall integration of information through extended instances of data collectionand analysis. However, while IoT will offer many benefits and advances it also faces manychallenges particularly, with its security, the subject of this report. This report outlines thesecurity issues of IoT as discussed by different researchers through their discussion material.Furthermore, the report also highlights the gaps and solutions to these problems.Keywords: Internet of Things, Internet, security, privacy
IOT: SECURITY ISSUES AND SOLUTIONS3Table of ContentsContents PageIntroduction........................................................................................3Summary of the discussions..............................................................3Issues not addressed...........................................................................5Impact of the security issues and challenges of IoT..........................6Reflection.............................................................................................7Conclusion...........................................................................................8References............................................................................................9
IOT: SECURITY ISSUES AND SOLUTIONS4IntroductionToday’s technological systems and devices are designed with the implementation of IoT,where they are developed using smart structures that generally improve their autonomousoutcomes. These outcomes are facilitated by technologies such as radio frequencyidentification (RFID), where electromagnetic waves are used to identify and control devicesremotely. Moreover, sensors and actuators are used to improve the control of the said deviceswhich helps to improve the IoT outcomes. In general, this technological architecture ofautomatic connections, sensors and actuators is the defining component of IoT [CITATIONTan16 \l 2057 ].IoT is also majorly defined by the internet as it’s the main network that will facilitatecommunication among the devices or objects involved. Furthermore, it is through the internetthat the different industries and fields will connect to each other, a vital aspect of IoT as itwill have extended connections across all operating environments. In addition to this, IoTwill use intelligent systems to perform its functionalities, a technological aspect that willinfluence the connectivity of different heterogeneous objects across different regions. Again,this outcome is met using the internet more so, through its protocols such as IP and IPaddressing schemes [ CITATION Van16 \l 2057 ].Summary of the discussionsVijayalakshmi and Arockiam (2016), highlight the security issues facing IoT in a generalperspective, where the different operational activities are outlined, such as RFID tagging,wireless connections, transmission, privacy and data security. Now, RFID tagging is prone tomany attacks including cloning and duplication an outcome that is facilitated by its minimalsecurity features. Moreover, the same component of the technology will use wirelesstechnology to connect devices which expose it to many security challenges. For one, wirelesssystems lack the physical protection provided by wired systems where access is granted

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this