logo

Security Analysis for IOT Components in Industries.

   

Added on  2022-08-22

12 Pages2908 Words18 Views
 | 
 | 
 | 
Running head: SECURITY ANALYSIS FOR IOT COMPONENTS IN INDUSTRIES
SECURITY ANALYSIS FOR IOT COMPONENTS IN INDUSTRIES
Name of the student:
Name of the university:
Author Note:
Security Analysis for IOT Components in Industries._1

SECURITY ANALYSIS FOR IOT COMPONENTS IN INDUSTRIES1
Table of Contents
1. Introduction............................................................................................................................2
2. Discussion..............................................................................................................................2
2.1. Comparison and discussion of three recent variants of attacks against IoT devices......2
2.2. Identification and Evaluation of the three various countermeasures and formal security
protection techniques against IoT attacks..............................................................................6
2.3. Two authentication protocols specified to IoT devices...................................................7
3. Conclusion..............................................................................................................................8
References..................................................................................................................................9
Security Analysis for IOT Components in Industries._2

SECURITY ANALYSIS FOR IOT COMPONENTS IN INDUSTRIES2
1. Introduction
The ‘Internet of Things (IoT)’ is the concept of creating network between the daily
life objects with embedded software, sensors and electronic network for the sole purpose of
exchanging data to extract relevant information from them (Jalali et al. 2016). Organizations
are renovating their infrastructures into smart offices that incorporates connectivity by
Internet amongst the devices used in the workplace to improve the various aspects of life and
enhancing a flexible work structure. These smart devices with the power of AI and algorithm,
network connectivity and methods of collecting data improves the functionality of the work
system at large.
The most popular smart device incorporated by various companies are the smart inter-
connected printers that provides other services than just network printing (Tsiropoulou,
Paruchuri and Baras 2017). These printers are able to monitor the ink level and paper
availability and automatically updates the inventory system for the requirement of new
cartridges without any manual interaction. The smart bulbs used in the companies can adjust
the brightness and colour balance in the cabins and thus save both energy and cost at the
same time (Khutsoane, Isong and Abu-Mahfouz 2017). The smart asset trackers are one of
the best innovations of IoT as it helps in tracking the devices of the office.
2. Discussion
2.1. Comparison and discussion of three recent variants of attacks against IoT
devices.
Variants of Attacks Specifications
Botnets A network of systems that are assembled together for
remotely taking control over the devices to distribute
Security Analysis for IOT Components in Industries._3

SECURITY ANALYSIS FOR IOT COMPONENTS IN INDUSTRIES3
malware.
Botnet operators with the help of command and control
servers (C&C servers) control the smart systems in the
network (Stiawan et al. 2019).
Criminals use botnets on a large scale to: a) to steal
confidential information, b) exploit the data from online-
banking systems, c) for spamming and phishing mails or
DDos-attacks.
Botnets that connect independent smart and connected
objects called thingbots put the smart devices in danger due
to the hacking of the network via Internet.
Different devices of botnets or thingbots are computers,
laptops, tablets, smartphones, and many more.
The two main characteristics of botnets are: a) they use the
connection of Internet to breach into the network and can
function only with the presence of an Internet connection, b)
with the help of the high-speed Internet connectivity, the
botnets or thingbots can automatically transmit data from
one device to another via a network (Kolias et al. 2017).
The anti-spam technology is able to detect very easily if one
machine sends numerous identical mails to various other
devices for spamming (Huang et al. 2020). However, it is
difficult to detect whether the devices that are used to send
the spam mails are a part of the botnet network system or
not.
Security Analysis for IOT Components in Industries._4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment about What Do You Mean by Network Security?
|11
|2396
|19

Botnet: Variants, Architecture, Operations, Threats and Mitigation Techniques
|12
|2460
|68

Security and Privacy Challenges for IoT
|8
|2522
|92

Computer Security: DDoS Attacks
|11
|2444
|233

Cyber Security Principles: Overview of IoT Attacks and Prevention Technologies
|5
|888
|360

Technological innovation | Concepts
|13
|3100
|44