Domains of IoT Security
VerifiedAdded on  2022/12/29
|7
|1867
|1
AI Summary
This literature review focuses on analyzing the domains where Internet of Things (IoT) security needs to be addressed. It discusses the importance of addressing IoT security issues in areas such as network connectivity, updating mechanisms, remote interfaces, data transfer, and device isolation. The review also highlights the need for strong security measures and policies to protect IoT devices and data. The sources used in the review are reliable and recent, providing valuable insights into the topic.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Literature review
1
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
LITERATURE REVIEW................................................................................................................3
To analyse the domains where Internet of thing security need has to be addressed...................3
REFERENCES ...............................................................................................................................6
2
LITERATURE REVIEW................................................................................................................3
To analyse the domains where Internet of thing security need has to be addressed...................3
REFERENCES ...............................................................................................................................6
2
LITERATURE REVIEW
Problem of statement/ Background
Internet of thing refers to physical devices that are used across worldwide that are used to
connnect people through interest. It contributes in connecting people in real time by making use
of digital technologies so that end objectives can be achieved. There are 5 areas or domain in
which IOT security need to be addressed so that people can easily share information to one
another in limited time.
Literature gap
It can be stated that study is based on analysis of domain where Iot security needs to be
address is one of the most important topic in current scenario. Many study has been made related
to Iot but never efforts has been made in order to critically analysis the domains of Iot security
that needs to be address on priority basis. So, the study will contribute in bridging the gap
between Iot security and domain that Iot security needs to be address so that best outcome can be
achieved.
Methodology or framework that are used
It specific about several methods that are used by scholar in order to complete the study, such
as it has make use of qualitative method which involves use of non statistical in order to make
deep analysis. So, qualitative method will be used to find alternative method that could be used
to solve the problem. Various secondary sources such as books, journals, articles and internet are
used in order to collect or gathered relevant information related to domain of internet of thing
security.
Any statistics that are used in research work to solve the problem.
No statistics has been used in research work to solve the problem as it is whole based on
qualitative method.
Hypothesis in paper
Based on the topic, there are two alternative hypotheses that can be developed for the
paper:
H1: There is significant impact of IT security in various domains.
H0: There does not exist any impact of IT security of domains.
3
Problem of statement/ Background
Internet of thing refers to physical devices that are used across worldwide that are used to
connnect people through interest. It contributes in connecting people in real time by making use
of digital technologies so that end objectives can be achieved. There are 5 areas or domain in
which IOT security need to be addressed so that people can easily share information to one
another in limited time.
Literature gap
It can be stated that study is based on analysis of domain where Iot security needs to be
address is one of the most important topic in current scenario. Many study has been made related
to Iot but never efforts has been made in order to critically analysis the domains of Iot security
that needs to be address on priority basis. So, the study will contribute in bridging the gap
between Iot security and domain that Iot security needs to be address so that best outcome can be
achieved.
Methodology or framework that are used
It specific about several methods that are used by scholar in order to complete the study, such
as it has make use of qualitative method which involves use of non statistical in order to make
deep analysis. So, qualitative method will be used to find alternative method that could be used
to solve the problem. Various secondary sources such as books, journals, articles and internet are
used in order to collect or gathered relevant information related to domain of internet of thing
security.
Any statistics that are used in research work to solve the problem.
No statistics has been used in research work to solve the problem as it is whole based on
qualitative method.
Hypothesis in paper
Based on the topic, there are two alternative hypotheses that can be developed for the
paper:
H1: There is significant impact of IT security in various domains.
H0: There does not exist any impact of IT security of domains.
3
To analyse the domains where Internet of thing security need has to be addressed
According to Gupta & Quamara, (2020), internet of things are physical objects that
embedded with software, sensors and other technologies in order to exchange and connect data
with other systems over the internet. The author further states that there is high concern about the
danger related to growth of Iot with relation to privacy and security. So, it can be stated that in
order to make best use of Iot various issue need to be resolved for better outcome.
As illustrated by Perwej & et.al., (2019), IOT security is process of securing devices and
networks related to internet of thing such as smart energy grid, industrial machines and building
automation. IOT is an phenomenon that can truly changed our live or even can destroy so there
are various right as well as wrong things which needs to be fixed. Areas in which Internet of
Thing security issues needs to be handle are network connecting, updating mechanism, remote
interface, data transfer and device isolation across the network. The Khalid Haseeb, Ikram Ud
Din, Ahmad Almogren, Naveed Islam, 2020, further has explain that automate connecting and
unbroken or their constant flow of information to data centres that makes Iot devices great. The
engineers that built Iot devices may not be expert of network security, therefore they may lead
security gap. Moreover, all devices of lot are online so it become a point of infiltration for
hackers and attack vectors. Once automated system get online they get authenticated and remain
until they reset.
From the point of view of Perwej & et.al., 2019 the process of updating the firmware
installed on Internet of thing devices. It can be stated that every piece of software on Iot devices
that found to have flaws that needs to be fixed. So, there are no software which are flawless. The
author also illustrated that devices have to exist with discovered flaws forever that means
closing devices for software update. It also illustrate about another option that demand users to
make update on their devices as it is not manually possible to updates score of connected
devices.
As per view of Rizvi & et.al., (2020), devices isolation across the network is another
point where Iot security leave much to desire. It involves breaking into one devices that allows to
compromise other devices which are sharing the same network. Moreover the author explain that
devices are blindly trusting peers thus attacker that find way to single devices can laterally move
across the network and damage the other devices. So the Naveed Islam and et.al., 2019, conclude
4
According to Gupta & Quamara, (2020), internet of things are physical objects that
embedded with software, sensors and other technologies in order to exchange and connect data
with other systems over the internet. The author further states that there is high concern about the
danger related to growth of Iot with relation to privacy and security. So, it can be stated that in
order to make best use of Iot various issue need to be resolved for better outcome.
As illustrated by Perwej & et.al., (2019), IOT security is process of securing devices and
networks related to internet of thing such as smart energy grid, industrial machines and building
automation. IOT is an phenomenon that can truly changed our live or even can destroy so there
are various right as well as wrong things which needs to be fixed. Areas in which Internet of
Thing security issues needs to be handle are network connecting, updating mechanism, remote
interface, data transfer and device isolation across the network. The Khalid Haseeb, Ikram Ud
Din, Ahmad Almogren, Naveed Islam, 2020, further has explain that automate connecting and
unbroken or their constant flow of information to data centres that makes Iot devices great. The
engineers that built Iot devices may not be expert of network security, therefore they may lead
security gap. Moreover, all devices of lot are online so it become a point of infiltration for
hackers and attack vectors. Once automated system get online they get authenticated and remain
until they reset.
From the point of view of Perwej & et.al., 2019 the process of updating the firmware
installed on Internet of thing devices. It can be stated that every piece of software on Iot devices
that found to have flaws that needs to be fixed. So, there are no software which are flawless. The
author also illustrated that devices have to exist with discovered flaws forever that means
closing devices for software update. It also illustrate about another option that demand users to
make update on their devices as it is not manually possible to updates score of connected
devices.
As per view of Rizvi & et.al., (2020), devices isolation across the network is another
point where Iot security leave much to desire. It involves breaking into one devices that allows to
compromise other devices which are sharing the same network. Moreover the author explain that
devices are blindly trusting peers thus attacker that find way to single devices can laterally move
across the network and damage the other devices. So the Naveed Islam and et.al., 2019, conclude
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
that it may also lead to access to database which consist of sensitive information thereby
negatively impact on an individual.
According to another author named as Marksteiner & et.al., (2017), there is another
domain in relation to Iot which needs to be considered that is remote interfaces. Most of the users
are not much interested to change their administrative credentials that allows making changes or
access to devices setting interfaces. Web interfaces is most dangerous as it can be easily access
from practical at any point when they are physically connected to devices. The Jiuhong Yu,
Mengfei Wang, Jinfan Liu, Karlo Abnosian, 2021, explained that making use of simple measures
like strong administrative passwords or making use of two factor authentication can contribute in
preventing Iot hacks. Data transfer is also domain related to Iot as lots of devices are using
outdated, flawed encryption or non encrypted protocols while sending data over the cloud. That
further leads to threat of data been stolen or theft credentials and hijacking of devices identifies.
So it can be understand that Iot devices are not much different from website so data transfer
security needs to be taken seriously otherwise it resulted in host of dangerous attacks.
As per view of AlHogail (2018), there are various things which needs to be considered by
manager in order to deploy a secure Iot. Such as device security, as there are number of devices
that are connect to internet. Therefore there are more changes of security issue like devices
tampering, cyberattacks and many more. Deploying security or upgrading devices whenever
required is good practices that contribute in successful implementation of secure Iot. So, as per
view of Xu Wu, 2021, before making use of devices they needs to be evaluated on terms of
security capabilities. Password is another security options that could be deploy Iot or two factors
authentication that will helps in protecting data bases or essential information from being stolen.
Strong security policies and better training provided to individual related to Iot deployment are
also some of the good security measure.
Outline of structure of literature review
The research has conduct on crucial information related to domain where iot security
needs to be address. Furthermore it has included detailed related to evaluation of sources from
which information related to the topic has been taken so that it can be easily reliable by several
individuals. It has also consist literature gap which helps in understanding what new study has
been made on topic to gather relevant information.
Evaluation of sources
5
negatively impact on an individual.
According to another author named as Marksteiner & et.al., (2017), there is another
domain in relation to Iot which needs to be considered that is remote interfaces. Most of the users
are not much interested to change their administrative credentials that allows making changes or
access to devices setting interfaces. Web interfaces is most dangerous as it can be easily access
from practical at any point when they are physically connected to devices. The Jiuhong Yu,
Mengfei Wang, Jinfan Liu, Karlo Abnosian, 2021, explained that making use of simple measures
like strong administrative passwords or making use of two factor authentication can contribute in
preventing Iot hacks. Data transfer is also domain related to Iot as lots of devices are using
outdated, flawed encryption or non encrypted protocols while sending data over the cloud. That
further leads to threat of data been stolen or theft credentials and hijacking of devices identifies.
So it can be understand that Iot devices are not much different from website so data transfer
security needs to be taken seriously otherwise it resulted in host of dangerous attacks.
As per view of AlHogail (2018), there are various things which needs to be considered by
manager in order to deploy a secure Iot. Such as device security, as there are number of devices
that are connect to internet. Therefore there are more changes of security issue like devices
tampering, cyberattacks and many more. Deploying security or upgrading devices whenever
required is good practices that contribute in successful implementation of secure Iot. So, as per
view of Xu Wu, 2021, before making use of devices they needs to be evaluated on terms of
security capabilities. Password is another security options that could be deploy Iot or two factors
authentication that will helps in protecting data bases or essential information from being stolen.
Strong security policies and better training provided to individual related to Iot deployment are
also some of the good security measure.
Outline of structure of literature review
The research has conduct on crucial information related to domain where iot security
needs to be address. Furthermore it has included detailed related to evaluation of sources from
which information related to the topic has been taken so that it can be easily reliable by several
individuals. It has also consist literature gap which helps in understanding what new study has
been made on topic to gather relevant information.
Evaluation of sources
5
It can be evaluated that information has been taken from valid, reliable sources so that
other individually can easily trust. Books and journals were major sources of collecting related
information so that study can be made useful and meaningful. Moreover, the books and journal
taken were published by well known author so the information collected are more accurate and
reliable. The sources that are taken also belong to recent study which helps in acquiring
knowledge or information of current thereby making study more fruitful.
Reason for proposal
The reason for making the study is to understand five domains of IOT security need to
be addressed so that people can easily connect with each others. So, it will helps in
understanding the way various physical devices can be secured so that individual can share
information to various individual.
Qualitative or quantitative study
Qualitative study is used in order to complete the project which involves collection and
analysis of non numerical data to understand specific information or data.
6
other individually can easily trust. Books and journals were major sources of collecting related
information so that study can be made useful and meaningful. Moreover, the books and journal
taken were published by well known author so the information collected are more accurate and
reliable. The sources that are taken also belong to recent study which helps in acquiring
knowledge or information of current thereby making study more fruitful.
Reason for proposal
The reason for making the study is to understand five domains of IOT security need to
be addressed so that people can easily connect with each others. So, it will helps in
understanding the way various physical devices can be secured so that individual can share
information to various individual.
Qualitative or quantitative study
Qualitative study is used in order to complete the project which involves collection and
analysis of non numerical data to understand specific information or data.
6
REFERENCES
Books and journals
AlHogail, A., (2018). Improving IoT technology adoption through improving consumer
trust. Technologies, 6(3). p.64.
Gupta, B. B. & Quamara, M., (2020). An overview of Internet of Things (IoT): Architectural
aspects, challenges, and protocols. Concurrency and Computation: Practice and
Experience, 32(21). p.e4946.
Jiuhong Yu, Mengfei Wang, Jinfan Liu, Karlo Abnosian, 2021. "Service management mechanisms in
the internet of things: an organized and thorough study", Journal of Ambient Intelligence and
Humanized Computing.
Khalid Haseeb, Ikram Ud Din, Ahmad Almogren, Naveed Islam, 2020 "An Energy Efficient and
Secure IoT-Based WSN Framework: An Application to Smart Agriculture", Sensors, vol. 20.
pp. 2081,.
Marksteiner, S & et.al., (2017), November. An overview of wireless IoT protocol security in the
smart home domain. In 2017 Internet of Things Business Models, Users, and
Networks (pp. 1-8). IEEE.
Naveed Islam and et.al., 2019. "A framework for topological based map building: A solution to
autonomous robot navigation in smart cities", Future Generation Computer Systems,.
Perwej, Y & et.al., (2019). The internet of things (IoT) and its application
domains. International Journal of Computer Applications, 975. p.8887.
Perwej, Y & et.al., (2019). The Internet-of-Things (IoT) Security: A Technological Perspective
and Review. International Journal of Scientific Research in Computer Science,
Engineering and Information Technology (IJSRCSEIT), ISSN, pp.2456-3307.
Rizvi, S & et.al., (2020). Identifying the attack surface for IoT network. Internet of Things, 9,
p.100162.
Xu Wu, 2021. "Cross-domain trust management mechanism for internet of things
systems", Peer-to-Peer Networking and Applications.
7
Books and journals
AlHogail, A., (2018). Improving IoT technology adoption through improving consumer
trust. Technologies, 6(3). p.64.
Gupta, B. B. & Quamara, M., (2020). An overview of Internet of Things (IoT): Architectural
aspects, challenges, and protocols. Concurrency and Computation: Practice and
Experience, 32(21). p.e4946.
Jiuhong Yu, Mengfei Wang, Jinfan Liu, Karlo Abnosian, 2021. "Service management mechanisms in
the internet of things: an organized and thorough study", Journal of Ambient Intelligence and
Humanized Computing.
Khalid Haseeb, Ikram Ud Din, Ahmad Almogren, Naveed Islam, 2020 "An Energy Efficient and
Secure IoT-Based WSN Framework: An Application to Smart Agriculture", Sensors, vol. 20.
pp. 2081,.
Marksteiner, S & et.al., (2017), November. An overview of wireless IoT protocol security in the
smart home domain. In 2017 Internet of Things Business Models, Users, and
Networks (pp. 1-8). IEEE.
Naveed Islam and et.al., 2019. "A framework for topological based map building: A solution to
autonomous robot navigation in smart cities", Future Generation Computer Systems,.
Perwej, Y & et.al., (2019). The internet of things (IoT) and its application
domains. International Journal of Computer Applications, 975. p.8887.
Perwej, Y & et.al., (2019). The Internet-of-Things (IoT) Security: A Technological Perspective
and Review. International Journal of Scientific Research in Computer Science,
Engineering and Information Technology (IJSRCSEIT), ISSN, pp.2456-3307.
Rizvi, S & et.al., (2020). Identifying the attack surface for IoT network. Internet of Things, 9,
p.100162.
Xu Wu, 2021. "Cross-domain trust management mechanism for internet of things
systems", Peer-to-Peer Networking and Applications.
7
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.