logo

Security Issues in IoT

   

Added on  2022-12-09

13 Pages3029 Words492 Views
RESEARCH PAPER 0
Internet of Things

RESEARCH PAPER 1
Table of Contents
Question 1.................................................................................................................. 2
Introduction and background.................................................................................. 2
Problem statements................................................................................................ 2
Objectives of the research...................................................................................... 2
Contribution of the findings..................................................................................... 3
Question 2.................................................................................................................. 3
Literature review..................................................................................................... 3
Question 3.................................................................................................................. 5
Research methodology............................................................................................ 5
Research design...................................................................................................... 7
Research strategy................................................................................................... 7
Data collection technique........................................................................................ 7
Data analysis........................................................................................................... 7
Question 4.................................................................................................................. 8
Types of questionnaire............................................................................................ 8
Multiple choice questions..................................................................................... 8
Likert-type scales................................................................................................. 8
Examples of questions............................................................................................ 9
Question 5.................................................................................................................. 9
Key aspects of research ethics................................................................................ 9
References............................................................................................................... 11

RESEARCH PAPER 2
Question 1
Introduction and background
IoT is defined as an ecosystem of linked physical objects which are
accessible with the help of internet connections. It is an advanced version of
information and communication technology that has the potential to connect
two or more computing devices with physical things. The thing in this
technology may be an individual with a heart monitor that is connected to
computer devices by using sensors and networks. It is examined that it is a
very important technology from the perspective of communication because
it has the capability to send or receive data over a long distance. The major
problem linked with this information and communication technology is
security due to which many companies are suffering from the data breach
and hacking issues. The major focus of this research is to evaluate the
working process of IoT and describe security issues and threats linked with
IoT enabled networks.
Problem statements
There are the following problems statements included in this
research:
Security is the biggest issue in the IoT technology that impacts on the
performance of networks
Proper configuration of networks is another problem that faced by the
consumers while implementing IoT systems
The overall performance of IoT depends on the proper communication
and it is very complex to reduce cyber-attacks and threats from IoT
networks.
All these problem statements help the author for conducting research in
which security of data is a common problem occurred in the IoT networks
which will be analyzed in this investigation.

RESEARCH PAPER 3
Objectives of the research
There are numerous goals of this investigation which are described below:
To enhance skills in the area of ICT
To demonstrate the key idea behind IoT technology
To identify the privacy issues linked with IoT
To highlight the importance of IoT in the future generation
Contribution of the findings
This research will play a major contribution in the area of research
because it is completely based on the ICT where the author will describe
the concept of IoT along with the security threats. Moreover, the findings of
this research will help the readers for understanding the importance of IoT
in future and privacy threats related to the IoT and companies can easily
monitor the performance of IoT enabled devices by reducing the rate of
security issues. In the area of ICT IoT play a crucial character because of
their ability to improve the performance of the developer's networks and
reduce communication gaps by delivering wireless networks and sensors.
Question 2
Literature review
Alrawais, Alhothaily, Hu, & Cheng, (2017) argued that the IoT is a
modern ICT technology which is growing very fast and many business
communities are using this technology because of their ability to reduce the
work load and improve overall performance. From this paper, it has found
that the authors used qualitative and secondary techniques along with the
content analysis that helped to reduce drawbacks of the research and
improve the effectiveness of the investigation (Balte, Kashid, & Patil, 2015).
It is highlighted that the author selected wireless networks, sensors,
computing devices and so on as depended variables and internet connection
as an independent variable. The findings of this Frustaci, Pace, Aloi, &

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Risks and Issues in IoT Technology
|7
|3094
|74

Internet of Things: Privacy Issues and Contents
|9
|1402
|116

Threats to Internet of Things Devices
|18
|4722
|17

Challenges of Internet of Things in Health care sector
|8
|1491
|206

Vulnerabilities with Internet of Things 0 Name STUDENT ID IT SECURITY Introduction IoT
|7
|1808
|461

Use of Block Chain Technology to secure the ‘Internet of Things’
|6
|1160
|407