ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measures

Verified

Added on  2023/06/03

|12
|760
|401
AI Summary
This presentation discusses the importance of IoT security, sources of IoT attacks, vulnerabilities, and contribution of chip manufacturers to IoT security. It also suggests the use of Application-programming Interface (API) as a solution to IoT security issues and emphasizes the need for more priority to be given to IoT security.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Internet of Things (IoT) Security
Name of the student:
Name of the university:
Author note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Internet of things can manage huge number of devices that are
interconnected in the network and provides the capability to
communicate and manage devices remotely through the internet.
The transfer of IT networks from closed networks to enterprise
networks to public internet is taking place at a fast rate and
therefore creating alarming IoT security issues.
Breaches in IoT security is becoming an alarming issue and
dominating news headlines lately.
Document Page
Importance of IoT security
Service providers of platforms and devices are increasingly being concerned
about sensitive data that flows through IoT devices in the network.
Security experts are continuously warning about the huge number of
connected devices through internet that are prone to malicious attacks since
the birth of IoT concept in late 1990s.
They fear for security disaster if security issues are not solved soon.
Hackers are finding it easy to hack routers instead of computers.
Document Page
Sources of IoT attacks
IoT security breaches might happen due to attacks from internet bugs,
eavesdropping, denial-of-service attacks and ransom ware attacks.
Common malwares that attack IoT devices are :
Malware DNS Changer that attacks computers, home routers
Linux worms that targets cameras, routers and other embedded
systems connected to the internet through Internet of Things.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IoT security issues and
vulnerabilities Hackers are exploiting these security issues and stealing personal
information of users through various means.
Individuals use the same ID and password for their IoT devices,
which can be easily hacked.
Hackers are using a particular software bug to hijack smart cars
remotely.
Google accounts are being hacked through IoT devices to gain
bank information.
Document Page
IoT security issues and
vulnerabilities
Document Page
Contribution of chip
manufacturers to IoT security
The chip manufacturer makes the chip as cheap as possible while
keeping profit margin slim without giving priority to security
issues.
The problem lies with software that has been programmed in the
chip.
Software provided is old even when the device is new.
The situation becomes worse as old software components cannot
be upgraded to latest versions.
The result is millions of devices sitting insecure in the internet.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Increase of attacks on IoT
devices and systems
Document Page
Application-programming Interface
as a solution to IoT security issues
The functions that API management system provides are:
Connection between application in use and API is automated and
controlled by API software tool.
Traffic of individual applications is monitored by API software tool
Application performance can be improved by the use of API management
system as it provides caching mechanism and memory management.
Document Page
IoT security should be given
more priority
The application of IoT is reaching from industrial control to home
appliances and devices such as transport and power control.
Security of the devices connected through internet should be given
more priority as the devices handles sensitive user data and
information.
IPv6 protocol should be implemented to ensure security in IoT
devices.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT) security: Current status,
challenges and prospective measures. In Internet Technology and Secured Transactions (ICITST), 2015 10th International
Conference for (pp. 336-341). IEEE.
Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013, May). A systemic approach for IoT security. In
Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on (pp. 351-355). IEEE.
Tankard, C. (2015). The security issues of the Internet of Things. Computer Fraud & Security, 2015(9), 11-14.
Wurm, J., Hoang, K., Arias, O., Sadeghi, A. R., & Jin, Y. (2016, January). Security analysis on consumer and
industrial iot devices. In Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific (pp. 519-524).
IEEE.
Document Page
1 out of 12
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]