ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Internet of Things (IoT) Security: Real World Example, Solution and Conclusion

Verified

Added on  2023/06/11

|5
|1410
|66
AI Summary
This article discusses the security risks associated with the Internet of Things (IoT) and provides a real-world example of a Jeep Cherokee being hacked. It also offers a solution to prevent such attacks and concludes with the importance of security in IoT.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Student Name
Institution Affiliation
Facilitator
Course Name
Date

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
I. BACKGROUND
Information security is a blend of
strategies that manages procedures, tools and
policies that are essential to detect, prevent,
document and encounter threats to information [1].
It is responsible to establish some business
processes that guards information assert regardless
of the format of the information or whether the
information is in storage, being processed or being
transmitted [2]. Information security has various
fields namely Internet of Things, Software defined
networking, Cloud Network and Wireless Sensor
Network.
I will first go deeper and scrutinize the IoT
which refers to a system of interconnected
computing devices both digital and analogue as
well as people under a platform with unique
identifiers and the ability of transmitting data over
a network without the need for human and
computer interaction.
II. INTRODUCTION
The rate at which devices are connected to
the internet is increasing every single day. That
brightens the growth of IoT and the advancement
of technology too. When similar devices are
connected online, hackers get an ease chance to
access them. The efforts by malicious hackers
interrupts confidentiality of Internet of Things and
also breaches security of those devices, crippling of
the infrastructure, loss of business and even
medical and healthy emergencies hence yielding
consequences of Internet of Things [3].
III. REAL WORLD EXAMPLE
Vehicle manufacturing industry is among
the top industry that is incorporating IoT on their
infrastructure. Car manufacturers are increasingly
coming up with models that have IoT systems
implanted on them; driverless cars are still
emerging out [4]. While the interconnection of
these cars and their car industry to internet is
growing fast, more drawbacks are anticipated.
After a test where two hackers did a
controlled experiment and they were able to
compromise a Jeep Cherokee, moving at a speed of
70kmh by turning the steering wheel and applying
breaks remotely. A threat not only to life but also to
the security of the property as the vehicle can even
be stolen when the driver is on the steering is posed
[5].
In this controlled test, two hackers
demonstrated how the radio and some other
unnecessary features of the Jeep could be run
remotely even before moving ahead to take control
of brakes, steering and even the engine from the
driver [5]. That means a car can be stolen even
when the driver is behind the wheel.
Document Page
The attacked connectivity technology by
the hackers uses sprint cellular network to connect
the vehicle to the internet, which enables the owner
to trigger features such as remotely engine,
antitheft measures and remotely controlling GPS
via use of smartphones[6]. This connectivity makes
the vehicles vulnerable as demonstrated by the
hackers to attacks since the vehicle can be
wirelessly accessed.
We also have to worry about our vehicles
getting hacked by terrorists or rebel [7].
IV. SOLUTION
From the attention drowned to the cyber
security by the two which shown the risks in
today's vehicles which have transformed into
rolling computers [7], the hackers exploited the
weak spot in the Jeep's Uconnect structure, which
connects the Jeep to the Internet. Being able to
remotely control the radio, alter the air conditioner,
windscreen wiper, steering and even the engine.
To avoid being affected, car owner has to
download software update or take the car to the
manufacturer to update it. Though there has been
no single occasion of illegal access or remote hack.
The caution is taken to guarantee the safety of the
cars. The possibility exists hence making owners of
cars update the cars software. A remembrance, by
contrast, demands that all affected clients where to
be alerted about security vulnerabilities and
requested to reinforce their software. The
recollection aligns with the software distribution
that was going on insulating connected cars from
remote manipulation, which, if illegal, institutes
criminal action
It was pointed out that the hacking
technique had never been used outside the wired
demonstration and it is not easy since it can take up
to a year [8]. The software handling addressed by
this recall needs a unique and all-embracing
technical acquaintance, lengthy physical contact to
a subject car and prolonged periods of time to write
the code
One doesn’t need to depend on the
network protection or wait to be mailed a drive to
reinforcement their Uconnect computers since they
can download the update and get the software fix.
A bug fixing software too was implemented that
was deployed across vehicles that are connected to
the internet [8].
Sprint network can also be blocked. The
highest trick was that vehicles would never be able
to get fixed down on the road. Since Sprint network
was correctly fixed, one has no need to bother
about the tail of cars that would not be fixed. This
involves taking steps to block the digital attack the
hackers had proved with network-level security
Document Page
actions and security tools that sense and bar the
attack on Sprint's network, the cellular carrier that
connect cars to the Internet [8].
V. CONCLUSION
Both makers of autonomous and
connected cars and users are supposed to be aware
of security repercussions. Cars that incorporate
automated characteristics like adaptive cruise
control assist in traffic jam, and automatic parking
messengers a period of time that will possess
reduced accidents, eased congestion, reduced
pollution, and greater efficiency. However,
without satisfactory security technology supporting
these vehicles, they could herald a period of time
where engines are being shut down remotely,
vehicles being seized to ransom or even being used
to back attacks on major websites.
Preventing spiteful hackers from
controlling vehicles demands a gentle balance in
engineering, not only guaranteeing the car is secure
but also making sure it is safe. Connected vehicles
involve advanced technologies such as secure boot
to warrant the integrity of the vehicle is intact.
REFERENCES
[1] Siponen, M., Mahmood, M. A., & Pahnila,
S.(2014). Employees’ adherence to
information security policies: An
exploratory field study. Information &
management, 51(2), 217- 224.
[2] Khan, A., Pohl, M., Bosse, S., Hart, S. W.,
& Turowski, K. (2017). A Holistic View
of the IoT Process from Sensors to the
Business Value.
[3] Ghajargar, M., Wiberg, M., & Stolterman,
E.(2018).Designing IoT systems that
support reflective thinking: A relational
approach.International Journal of Design,
12(1), 21-35.
[4] Mohammed, A. F. (2017). Security Issues
in IoT.
[5] Puthal, D., Ranjan, R., Nepal, S., & Chen,
J.(2017).IoT and Big Data: An
Architecture with Data Flow and Security
Issues. In Cloud Infrastructures, Services,
and IoT Systems for Smart Cities (pp.
243-252). Springer, Cham.
[6] Conti, M., Dehghantanha, A., Franke, K.,
&Watson, S. (2018). Internet of Things
security andforensics:Challengesand
opportunities.
[7] Agarwal, A., Dawson, S., McKee, D.,
Eugster, P., Tancreti, M., & Sundaram, V.
(2017, April). DetectingAbnormalities in
IoT Program Executions through Control-

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Flow-Based Features.In Proceedings of
the Second International Conference on
Internet- of-Things Design and
Implementation (pp. 339-340). ACM.
[8] Zhou, J., Cao, Z., Dong, X., & Vasilakos,
A. V. (2017). Security and privacy for
cloud-basedIoT:Challenges.IEEE
Communications Magazine, 55(1), 26-33.
.
1 out of 5
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]