Security Challenges and Countermeasures in IoT

Verified

Added on  2021/04/16

|12
|489
|132
Presentation
AI Summary
The assignment explores the security risks and attacks associated with IoT applications, such as smart home automation systems, office automation systems, and smart parking systems. It also discusses the use of poor passwords, absence of encryption, low-priced devices, and delayed security updates as vulnerabilities. The document highlights the importance of monitoring IoT devices, networks, and using automated tools for intrusion detection. Additionally, it suggests advanced access control, data encryption algorithms, and data analytics tools for further improvement.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Security in the
Internet of
Things
Final Blog Entry & Evaluation of the Value of
Project Documentation

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
IoT is being used in industrial sectors
Newer IoT applications being developed
Smart Home Automation System
Office Automation System
Smart Parking System
Benefits of the Applications – Speed, Accuracy, &
Quality
Document Page
IoT Applications –
Disadvantages
Security & Privacy Issues
Device-related Security Attacks
Smartphones
Networking Equipment
Computer Systems
Electrical Appliances
Home Appliances
Document Page
Security Vulnerabilities
Devices are the primary threat agents
Vulnerabilities used by malicious entities
Information breaches, hacking, or manipulation
attacks
Attacks due to device interactions

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Security Vulnerabilities
Use of poor passwords
Absence of encryption
Low priced devices opted by the users
Delay in security updates
Document Page
Set of Control &
Countermeasures
Monitoring of IoT Devices
Monitoring of the networks
Use of Automated Tools
Intrusion detection tools
Network scanners
Network monitors
Document Page
Set of Control &
Countermeasures
Proper Governance
Development & implementation of strict laws
Implementation of Intellectual Property (IP) laws
and rights

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Further Improvements
Advanced Access Control
Advanced Data Encryption Algorithms
Use of Data Analytics Tools
Document Page
Evaluation of the Value of Project
Documentation
Answers to the research questions
Inclusion of the security attacks and risks
Listing of the popular attack agents and mediums
Recommendation of the control and
countermeasures
Description of the methodology used
Listing of the references and sources
Final acceptance on the deliverables
Document Page
Evaluation of the Value of Project
Documentation
Overview and details covered in Introduction
Problem Overview – Security risks & attacks
Related Work – Further attacks and measures
Methodology - Control and countermeasures
Conclusion and references

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Suggestions for
Improvement
Listing of research questions and aims should
have been included.
Reflective journal or details
There is no use of any figures, charts, or any other
graphics.
The conclusion section could have been
elaborated
Document Page
References
Ling, Z., Luo, J., Xu, Y., Gao, C., Wu, K., & Fu, X. (2017). Security
Vulnerabilities of Internet of Things: A Case Study of the Smart
Plug System. IEEE Internet Of Things Journal, 4(6), 1899-1909.
doi: 10.1109/jiot.2017.2707465
Sang, Y., & Gao, X. (2013). Security Issues and Protective
Measures of the Internet of Things Architecture. Advanced
Materials Research, 765-767, 1007-1010. doi:
10.4028/www.scientific.net/amr.765-767.1007
Sasikala, B. (2017). Internet of Things: A Survey on Security
Issues Analysis and Countermeasures. International Journal Of
Engineering And Computer Science. doi: 10.18535/ijecs/v6i5.41
Yousuf, T., Mahmoud, R., Aloul, F., & Zualkernan, I. (2015).
Internet of Things (IoT) Security: Current Status, Challenges and
Countermeasures. International Journal For Information Security
Research, 5(4), 608-616. doi:
10.20533/ijisr.2042.4639.2015.0070
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]