This report discusses the security and privacy challenges faced by the Internet of Things (IoT) technology. It covers the vulnerabilities found at each layer of the IoT system and the need for fundamental standards and hardware-friendly solutions to protect user data.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Security and Privacy Challenges in the IoT Domain Name of the Student Name of the University bmoses@studygroup.com
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Security and Privacy Challenges in IoT Domain The Internet of Things (IoT) is a new form of technology, which has the potential to transform thelivesofthepeopleandthegrowthinthe business sector. The IoT is able to cover all the sectors that are mainly used by the people such as health, transport, entertainment and many others (Wortmann & Fluchter, 2015). With the rapid growth of IoT, the number of devices that are being connected to the technology are also rising rapidly. The growing interest in this technology has led the growth of several security challenges.Thetechnologyhasbeenforcedto developdifferentstandards,policiesand governance, which would be able to shape the level of security. The IoT comprises of sensors and devices, which are able to interact and communicate with various other machines, environments and objects. After having connecting to the Internet technology, new problems related to security and privacy have risen such as authenticity, integrity of data and confidentiality of data. The privacy of the data of an individual should be given as the topmost priority. In the recent age of technological innovations, the systems are becoming autonomous and intellectual. Hence there are many upcoming challenges, which tendtochallengetheprivacyofthesystems (Roman, Zhou & Lopez, 2013). The Internet of Things is comprised of the network, the application layer and the perception. They provide a certain level of meaning to the whole system. Each of the components of IoT at differentlayerscouldbeexecutedasseparate technologies.Hence,differentweaknessesare found at each layer based on their application and functionality.Thesekindofvulnerabilitiesthat have exploited, have been compromising the safety mechanisms of several IoT based devices (Sicari et al., 2015). Many security experts who have done an extensive research in the field of security of IoT, have raised their concern on the weaknesses in the systems of IoT. The principle of low power of computing along with the efficiency of energy are incompatibletothecurrentprinciplesof cryptography. This means that there would be a challenging environment for the IoT systems and theircommunity.Basedonthenumberof challenges to the security concepts of IoT, the topic needs to be discussed deeply, which would be able tostrengthenthefoundationsofasecure environment. ThesituationoftheInternetofThings environmentshouldbeimmediatelytakeninto consideration. A proper analysis towards ensuring security of the vital data of consumers is very much essential. In the recent times, there is a high need forvariousfundamentalstandardsand implementationsofhardware-friendlysolutions. There is also a high priority for the protection of the data of the user in the IoT environment (Da Xu, He & Li, 2014). Structure of the Report 1. Purpose of the Report 1.1 Problem Statement – What are the major challenges,whicharebeingfacedbytheIoT environment? 1.2 Executive Summary 2. Introduction of the Problem and their Challenges 3. Literature Review 3.1ABriefReviewontheSecurity ChallengesinIoTbasedonPastandCurrent Scenario. 3.2 List of the Requirements of the Project 3.3 Modification of the Problem Statement Based on the Project Requirements 3.4 Past and Current Methodologies based on the Problem 4. Conclusion 5. References
References Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey.IEEE Transactions on industrial informatics,10(4), 2233-2243. Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things.Computer Networks,57(10), 2266- 2279. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen- Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead.Computer networks,76, 146-164. Wortmann, F., & Flüchter, K. (2015). Internet of things.Business & Information Systems Engineering,57(3), 221-224.