Privacy Issues of IoT

   

Added on  2023-03-17

12 Pages3390 Words89 Views
Running head: PRIVACY ISSUES OF IOT
Privacy issues of IoT
Name of the Student:rajat
Name of the University
Author’s Note:
Privacy Issues of IoT_1
1PRIVACY ISSUES OF IOT
Table of Contents
Introduction................................................................................................................................2
Research Questions................................................................................................................2
Date Collection.......................................................................................................................2
Background study.......................................................................................................................2
Aims and Significance...............................................................................................................8
Research Plan.............................................................................................................................9
Publication Plan.....................................................................................................................9
Conclusion..................................................................................................................................9
Reference..................................................................................................................................11
Privacy Issues of IoT_2
2PRIVACY ISSUES OF IOT
Introduction
The incorporation of the IoT based devices may have numerous security issues on our
society as well as in commercial organizations in terms of the security issues. This research
proposal will be identifying the privacy issues of the IoT based devices. The following unit of
this research proposal will be listing the research questions in an organized manner.
Research Questions
o What are the privacy issues of IoT?
o How can be issues be resolved?
Date Collection
Secondary data collection procedure will be followed in the paper. 30 peer-reviewed
papers will be considered in the paper in the background study which will be helping to
address the research gap. The paper will be concluding with a Gantt chart presenting the task
plan and the publication plan. The ensuing unit of this research proposal will be providing the
background story of the paper where reputed scholars have stated and argue about the
security issues of the IoT devices.
Background study
As discussed by Balte, Kashid and Patil (2015), there are lots of security issues with
IoT devices such as the side channel attacks. The researcher of the paper focuses on the
different categories of security issues of the IoT devices which are used in the automobile
industry. The investigators of the paper stated that the side channel attacks are very much
common in the IoT devices which are connected in the open network (Alrawaiset al. 2015).
The information of the IoT devices are compromised during this security attack as mentioned
by the researcher of this resource, at the same time it can also be said that the compromise in
Privacy Issues of IoT_3
3PRIVACY ISSUES OF IOT
the location settings of the IoT devices is the other privacy concern of the IoT devices (Yi,
Qin and Li 2015). The investigators of this resources stated that data visualization and the
data aggregation are the other security concerns of most of the IoT devices which are used in
the global commercial organizations for transferring data (Iyengar, Kundu, and Pallis 2018).
The paper also discusses the configuration issues of the IoT devices which can lead to other
issues such as the compatibility issues and scalability issue (Yang et al. 2017). The
investigator of the paper argued that cyber security attacks such as the side channel attacks
could have an undesirable impact on the users of the IoT devices. Most of the sensitive
information are compromised during these security attacks as instructed by the researchers
(Lee and Lee 2015). The paper also identifies the role and the ability of the social engineers
who are involved in this type of security breaches. This paper have both benefits as well as
limitations, the prime advantage of the paper is that it focuses on most of the complexities of
the side channel attacks are increasingly found in most of the IoT devices. The usage of the
cryptographic keys during the attacks was mentioned by the researcher of the paper in a
professional manner (Lee et al. 2015). Though, the paper has lots of limitations as well. The
prime disadvantage of the paper is it does not discuss the other cyber security risks such as
the threats of ransomware in the IoT devices. But Caron et al. (2016), stated that cyber
security issues such as the threat coming from IoT malware and ransomware can have a
significant undesirable impact in the IoT devices which are always connected in open private
networks. This investigator contradicts with the discussion made by Balte, Kashid and Patil
(2015) who stated that side channel attacks are the most common security attacks in the IoT
devices. The gap in the literature of these two paper is both of them failed to discuss the
effective risk coming from cyber security issues such as the side channel attacks and
ransomeware.
Privacy Issues of IoT_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Privacy Issues of IoT
|13
|3345
|59

Privacy Issues of IoT
|14
|3402
|79

Advantages and Disadvantages of IoT
|14
|3681
|54

Analyzing The Security Challenges of IoT Devices
|12
|4267
|74

Security Issues In IoT
|12
|4945
|61

Internet of Things Security and Privacy
|12
|2833
|99