Analysis of Contemporary Network Security Issues in IoT Devices Report

Verified

Added on  2023/01/17

|9
|2037
|42
Report
AI Summary
This report delves into the realm of network security, specifically focusing on the vulnerabilities and challenges within the Internet of Things (IoT) ecosystem. It begins by introducing the concept of IoT and its growing prevalence, highlighting the increasing number of interconnected devices and the associated security risks. The report then explores various security issues, including computer attacks, software vulnerabilities, and DNS-based threats, providing a comprehensive overview of the landscape. It examines potential attack scenarios, illustrating how intruders can exploit interconnected devices to launch malware and gain unauthorized access. Furthermore, the report identifies specific vulnerabilities within IoT systems, such as a lack of authentication, encryption, and input/output filtering, and the use of outdated devices. To address these challenges, the report proposes several solutions, including the importance of security considerations when purchasing IoT devices, the inclusion of security measures in code development, and the implementation of updated software and firewalls. The report concludes by emphasizing the significance of addressing IoT security concerns to safeguard the benefits of this technology.
Document Page
1
Running head: NETWORK SECURITY ISSUES
Network Security Issues
Student’s Name
School Affiliation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
NETWORK SECURITY ISSUES
Table of Contents
Introduction......................................................................................................................................3
Security Issues.................................................................................................................................4
Attack Scenarios..............................................................................................................................6
Vulnerabilities..................................................................................................................................8
Solution............................................................................................................................................8
Conclusion.......................................................................................................................................8
References......................................................................................................................................10
Appendixes....................................................................................................................................11
Document Page
3
NETWORK SECURITY ISSUES
Introduction
IoT refers to a framework of interrelated electronic gadgets, mechanical as well as digital
devices, objects, individuals which can be supplied with a unique identifiers as well as the
capability to exchange information over the network with no need for human to other human or
human beings to computer association. In the last few years, the idea of the internet of things has
drawn the attention of several individuals and it was initially introduced by Kevin Ashton. Due
to speedy improvements in mobile communication, Radio Frequency Identification, Wireless
sensor network as well as cloud computing amongst IoT gadgets have become more suitable
compared to the past. The gadgets used in IoT have a capacity of cooperating with each other,
and these devices are of different categories such as smartphones, laptops, personal computers,
tablets, PDA among other mobile embedded gadgets (Hossain, Fotouhi, & Hasan, 2015). The
IoT gadgets comprise of less effective sensors as well as wireless conversations systems to
converse with one another and move important data to the system which is centralized. The data
incoming from the IoT gadgets is then processed in that central system and then moved to the
targeted destinations. Due to the rapid advancement of communication as well as the technology
of the internet, our daily thinks and routines are narrowed on the fictional vacuum of the virtual
world. Individuals of capable of working, shopping and chatting, although human beings live in
the world which is real, thus, it is hard to replace whole human duties with the completely
automated living. There exists a boundary limit of the fictional vacuum that controls the future
advancement of the internet in order to better services.
The IoT has fruitfully introduced the fictional space as well as the real world on a similar
platform. The main focus of IoT is the setting of a suitable environment as well as self-conscious
independent gadgets like smart living, smart health, smart items as well as smart cities.
Document Page
4
NETWORK SECURITY ISSUES
Currently, the introduction rate of the IoT gadgets is very high, various gadgets are connected
through the internet (Yang et al., 2017). On the other hand, the majority of these gadgets and
programs are not created to address the security as well as confidential attacks and it increments
various security and confidential issues in the field of the IoT connections like confidentiality,
data integrity, authentication, secrecy, and access control among others. Each and every day IoT
gadgets are intended by intruders and invaders. According to the previous studies, 70 % of the
gadgets of the IoT are very simple to invade. In addition, a suitable technique is extremely
required to secure the gadgets linked to the internet against attackers as well as hackers.
Security Issues
A standout amongst the clearest cybersecurity challenges in the current mechanical biological
community is that of IT security in IoT gadgets. As we approach an increasingly interconnected
society with progressively shrewd items linked with the cloud, the threats likewise increment and
susceptibility which should be distinguished as well as rectified duplicate (Borgohain, Kumar, &
Sanyal, 2015). The Internet of Things (IoT) is a mechanical achievement that is totally changing
our day by day life. There are various IoT security issues which include the following:
Computer attacks - are the most widely recognized danger in a cloud domain. They can be
Denial of Service (D-DOS) assaults, malware spread in IoT gadgets, abuses, assaults on the
client's protection or even alteration of the electronic segments of the gadget.
Software vulnerabilities - Another significant security challenge lies in the vulnerabilities of IoT
applications and programming. This security issue come up if the softwares being used in IoT
devices are outdated and not upgraded to the latest version giving chance to attackers.
Below are some of the security issues of the network infrastructure:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
NETWORK SECURITY ISSUES
DNS-Based threat Protection - Misusing DNS has ended up being an exceedingly powerful
approach to upset and impair systems. Assailants use DNS pathways to assault organizes in an
assortment of ways. For example, programmers frequently use DDoS assaults to flood DNS
servers with counterfeit solicitations, swap out real URLs for phony ones that reason sites to
have all the earmarks of being down when they're not, and make preoccupations that enable them
to stow away different kinds of assault. The reason DNS has turned into the strategy for decision
for such huge numbers of digital hoodlums is that ordinary framework security strategies are
unequipped for ensuring DNS. To beat this hazard, IT pioneers should search out cutting edge
arrangements that are explicitly structured and created to exhaustively and naturally shield DNS
from would-be assaults.
Lack of incorporation within protection Ecosystem - Numerous organizations employ the
utilization of an extensive number of unique security arrangements from a wide range of sellers.
This outcome in storehouses that are unequipped for cooperating and sharing basic data, which
results in a huge test to security groups who are capable to make a move in the midst of a
dynamic and regularly advancing security scene. To entangle matters further, security groups in
this circumstance additionally wind up suffocating in an ocean of expanding dangers with next to
zero clear courses on which risk to follow up on first and why. The arrangement is to make a
system that is comprised of frameworks, programming, and applications that can be completely
incorporated with each other with the objective of upgrading the execution of the whole
cybersecurity biological system. This sort of setup empowers security groups to increase more
noteworthy deceivability and remediate quickly to relieve hazard.
Document Page
6
NETWORK SECURITY ISSUES
Attack Scenarios
From the diagram above an IoT attack scenario is evident since the intruders can take
advantage of the interconnected devices to launch malware and infect those devices so as to
manage them without the user’s consent (Mahmoud, Yousuf, Aloul, & Zualkernan, 2015).
The connection of the IoT devices makes easy access of the private information which
decrease their security. Again, the organization is sending important information to the
servers which can be accessed by the attackers on the way. The network key is shared in this
organization allowing attackers connected to the internet accessing it and accessing
unauthorized information.
Considering the diagram above the network attack scenario can be depicted since the user
can be added to the system using preserved procedures to the server system. This scene
entails intruders successfully verifying and getting connected to the server by use of user
account comprised of weak passkey. Once an intruder authenticates fruitfully, preserved
procedures may be leveraged to run more attacks against the server.
Vulnerabilities
Since the machines are connected to the internet and there is an allowance of remote control
machines exposing confidential information of the users to unauthorized clients. There is a
lack of authentication while accessing the machines, encryption and there is no input as well
as output filtering. There is the usage of outdated gadgets and clients may forget to update
some components hence threatening the security of the system from the viruses. The storage
space is shared therefore giving chance for access to confidential information by
Document Page
7
NETWORK SECURITY ISSUES
unauthenticated users. In the above-shared network mostly settings are set to default which
lacks the capacity to make the structures more secure.
Solution
In order to overcome the above-mentioned vulnerabilities, it is important to consider and
check thoroughly the security of the IoT gadgets when purchasing them so as to uphold
security. Again the IoT system developers should consider including security measures in
their codes for the security of information. The manufacturers of the IoT gadgets need to
consider the security of these devices as primary while in all the stages of development so
that it can allow updates and upgrades to avoid threats from attackers. The network
infrastructure should be equipped with updated softwares and firewalls to avoid attacks from
the intruders. In addition all the users creating accounts or having accounts in the server
should observe using strong pass key to avoid attacks.
Conclusion
In the nutshell, we can conclude that IoT is one of the fascinating and most recent innovation
nowadays. Internet of Thing is utilized to characterize the system that comprises of various
electronic gadgets interconnected with smart innovation. Smart Cities, brilliant autos, smart
home apparatuses will be the following huge thing that will change the manner in which we
live, work and connect. As we are probably aware that each coin has opposite sides.
Essentially, IoT has a few dangers and vulnerabilities as well. By overcoming these dangers,
we can appreciate the administrations of the IoT frameworks.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
NETWORK SECURITY ISSUES
References
Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the internet of
things: Security and privacy issues. IEEE Internet Computing, 21(2), 34-42.
Borgohain, T., Kumar, U., & Sanyal, S. (2015). Survey of security and privacy issues of the
internet of things. arXiv preprint arXiv:1501.02211.
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of
existing protocols and open research issues. IEEE Communications Surveys &
Tutorials, 17(3), 1294-1312.
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues,
challenges, and open problems in the internet of things. In 2015 IEEE World Congress
on Services (pp. 21-28). IEEE.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT)
security: Current status, challenges, and prospective measures. In 2015 10th
International Conference for Internet Technology and Secured Transactions
(ICITST) (pp. 336-341). IEEE.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in
the Internet of Things: The road ahead. Computer networks, 76, 146-164.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in
Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250-1258.
Document Page
9
NETWORK SECURITY ISSUES
Appendixes
Topic Description
Introduction This entails the evolution of IoT and the
push or goodness of using IoT devices in
society.
Security issues This entails the security challenges facing
the IoT devices.
Attack scenarios This describes the scenarios of the IoT
system attacks and how the attacks are
carried out.
Vulnerabilities These the loopholes in the manufacturing of
the IoT devices.
Solution This entails the possible remedy to curb the
network security threats experienced in IoT.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]