logo

ITC595 Information Security - Research Project

3 Pages3400 Words25 Views
   

Added on  2021-05-27

ITC595 Information Security - Research Project

   Added on 2021-05-27

ShareRelated Documents
ITC595 Research Project (Security & Privacy Issue inInternet of Things/ Smart Architecture)Name of the StudentName and department of UniversityEmail of the authorABSTRACTInternet of things (IoT) is one of the mostrevolutionary innovation of this century. It has proved itself to besignificantly beneficial in different industries. In simpler terms, it isthe concept of integrating different technologies to attain theobjective of sharing data among themselves and the user. Thewhole network of the considered network is controlled throughsmart means, that is using smart devices such as smart phones,smart watches and other smart devices. The discussed technologyoperates by collecting real-time data and taking the necessaryactions accordingly which is the most prominent advantage of theconsidered system. However, the most prominent advantage of theIoT is its weakest link as well because, the collection of real-timedata and sharing it over the internet makes it vulnerable to cyber-threats. The justification for the selection of the topic has also beendiscussed in the review which is because the concerns associatingwith the IoT needs to be mitigated to leverage the technology andearn mass adoption of the technique and in the process earntechnical advancement. The most prominent challenge that the userface due to IoT is the challenge of security & Privacy which areraising significant concerns over the technology. The devised paperhas attempted at evaluating the security & privacy concernsassociated with the IoT. The paper has discussed the literary workof past to earn an insight into the subject which would assist thereaders in mitigating the challenge. KeywordsIoT, security & privacy, smart devices, sensors, dataprocessing, internetINTRODUCTIONXu, Da Xu, Cai, Xie, Hu & Bu, (2014), has stated that IoT isthe technology that will completely alter the lifestyle of theusers from traditional approach to a simpler and advancedlifestyle. The core functionality off the subject is based on theinternet and real-time data which enables the users to controlequipment or appliances that are connected within the IoTfrom even geographical distant locations. The network alsoshares information among the devices to make them smart toautomate the basic operations. The IoT are proving to besignificant in almost all sectors from industries, education,healthcare, homes or any other depending on the type ofdesign. However, the technology is posing prominentchallenges to the users and the most significant of them is thesecurity & privacy concerns. However, to understand thesecurity & privacy threats offered by the consideredtechnology, it is of great significance to understand thetechnology which has been done in the following paragraph.The technology can only be understood if its insight isearned and to do so, it is necessary to understand thetechnologies to integrate together to form the IoT system. Thecore technologies involved are sensors & devices, connectivity,(DP)data processing and UI (user interface). They have beendiscussed as follows:Sensors & devices: The purpose of the sensors in IoT is tocollect real-time data and send it to the servers. It can be assimple as measuring the temperature to measuring humidityand other complex data.Connectivity: It includes the communication channelthrough which the sensors sends the data or the user inputs theresponse, it can be internet, infrared (for short range) Bluetoothconnected IoT or cloud.Data processing: The data collected from the sensors andmoved are moved here to process them and take the necessaryaction. The processing is done by means of some software.User Interface: Post-processing of the data a notification issent to the user depending upon which they can send the inputto the server and change the status of the equipment inconsideration according to the need.The discussion of the factors involved in the process havemade the working of the IoT clear. In concise form, theworking of the IoT can be stated as “Sensors collect the datawhich using the communication channel is sent to the serverwhere it is processed and a notification is sent to the user whoin response changes the status of the equipment inconsideration.”.A.Research Problem After analyzing the working of the IoT, it is determined thatthe biggest challenge posed by the subject is due to thecommunication channel. The data that the sensors transmitthrough the communication channel are not encrypted andhence are vulnerable to cyber-attacks. These cyber-attacks arethreat to both the security and privacy of the user and theassociated systems. In case, if one of the IoT connectedequipment is overheating and the signal sent by the sensor aremanipulated or blocked by the cyber-malefactors, it may resultin some major catastrophic situation. The equipment mayoverheat and explode posing a significant threat to everythingand everyone around it. Other such scenarios can also be citedby the security threat of the IoT and they are not just limited tothe physical damage, the damage to the user’s data could alsobe taken in account. The above-mentioned statement has beenquoted because the IoT network has all the gadgets and devicesused by the users connected to it. In case, any trespassers enterthe server of the users than they can see, manipulate or destroythe personal data of the users posing a significant threat to theuser’s privacy. So, security & privacy is a major concern forthe IoT which needs to be addressed as quickly as possible toleverage the full potentiality of the subject and hence is theresearch problem of the discussed paper.B.Research Justification The example cited in the research problem is just a minorexample of the significant threat posed by the IoT. Thegovernment organizations are also adopting the IoT and if anyunwanted sources get through it the results can becatastrophic. Additionally, the discussed technology wasdevised to assist the users to earn an easy, comfortable andsimplified use of the system but if it cannot offer security &
ITC595 Information Security - Research Project_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network and Security
|15
|3266
|22

Analyzing The Security Challenges of IoT Devices
|12
|4267
|74

Wireless Communication Protocols for IoT
|4
|845
|380

Security and Privacy Issues in IoT
|16
|5849
|49

Security and Privacy Issues in IoT/Smart Architectures
|5
|3113
|303

Security Challenges in Emerging Networks: Overview of IoT and its Applications
|9
|467
|400