logo

Security in Internet of Things

   

Added on  2020-02-24

8 Pages1638 Words41 Views
Security in Internet of
Things (IoT)
8/28/2017

Security in IoT
Introduction
Security has become a prime topic of research with the emergence of numerous security attacks
and occurrences. Internet of Things (IoT) is a concept that includes a wide variety of services,
devices and networks to achieve a particular objective. There are various different entities that
are involved at the same time in an application that is built using IoT as the base technology. Due
to this reason, it has been observed that there are many security risks and concerns that have
taken place in IoT applications and services.
Descriptions of such occurrences along with the countermeasures that may be used to put a
check on the same have been covered in the report.
IoT Security Risks and Events
Physical Attacks
There are a number of physical security attacks that may be executed in case of the IoT
applications.
These applications involve a number of different devices such as small and large household
appliances, laptops, tablets, Smartphones etc. There may be cases wherein the attackers might
steal or cause damage to these devices which will be threatening from the security point of view.
There are various nodes in the different networks that are used in the IoT applications. Any
damage to these nodes may be done to gain access to the materials and information associated
with a particular node.
There are also attacks that may be launched by the attackers which may lead to quick drainage of
the battery of the devices. This may cause a negative impact on the availability of the services
and the application and may be negative from the security aspect as well (Kumar and Patel,
2014).
Network Attacks
There are a wide variety of network based security attacks that may be executed in association
with an IoT application.
2

Security in IoT
RFID attacks in the form of spoofing or cloning may be executed by the attackers. In these
attacks, the attacker may impersonate an RFID signal in order to read and record the data that is
transmitted using the same in an unauthorized manner. There are also a number of attempts that
may be done by the malevolent entities to gain unauthorized access to the data with the aid of
RFID tags. If the attackers succeed in the process, then they may use their access to read or
delete the information (Dominikus and Kraxberger, 2011).
RFID Attacks
There is man in the middle attack that may also take place using the networking channels and
communication protocols. The attackers may use the network nodes to eavesdrop on the network
and monitor the activities taking place on the network in an unauthorized manner. Routing of the
protocols may also be tampered which may impact the confidentiality and availability of the
information. There are also sniffer attacks that may take place.
3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ITC571 - Emerging Technologies and Innovation Report
|7
|1215
|161

Common Network Attacks And Standard Network Defense Mitigation
|8
|1360
|23

CSI2102 - Information Security: Assignment
|17
|1220
|277

Wireless Network Technology and Preventive Techniques
|12
|2757
|322

Internet of Things: A Review of Literature and Security Issues
|8
|810
|321

Internet of Things (IoT) Security - PDF
|7
|2624
|141