Security and Privacy Issues in Internet of Things
VerifiedAdded on 2023/06/14
|8
|6754
|320
AI Summary
This report discusses the security and privacy issues in Internet of Things, including insecure web interface, insufficient authorization, insecure network services, and lack of transport encryption. It also provides recommendations to prevent cyber attacks and protect personal data.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Security and Privacy Issues in Internet of Things
Name of the Student
Name of the University
Name of the Student
Name of the University
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ABSTRACT – The Internet of things has been an ever-evolving process that has gained significance since the last decade. With
the increase in use of the technology the security issues of the technology has been the only instance of problem for this
platform. The internet engineer task force members have been trying to design an authentication and authorization mechanism
for the devices that use Internet of Things as a platform for their mode of operation. The main reason of concern regarding the
security of Internet of Things is that the attacks possessed on the Internet of Things platform affects the virtual as well as the
physical infrastructure.
1. Purpose of the report
This report will discuss about the main problem of
security that is mainly due to the fragmentation of the
platform that makes the platform less robust and
enables the cyber criminals to attack the platform and
gain personal data. Privacy protection of the
computing devices that uses Internet of Things
requires personal configuration security settings. This
report will provide literature review of the security
and privacy prospective of the platform and evaluate
the literature regarding the processes of overcoming
the loopholes that are present in the internet of
Things platform.
2. Topic:
Security and privacy in Internet of Things
3. Expect format of the report
The report will discuss about the security and
privacies terminology that must be maintained in order to
prevent the computing devices from being attacked by the
cyber criminals. The report presents a literature review of
topic related to the security and the maintenance of
privacy in the platform. The report discusses about the
steps that must be taken in order to keep the platform free
of cyber militants. The various methodologies are then
discussed that must be undertaken to keep the platform
protected.
4. Problem statement
Unauthorized personnel gain access to the personal data
of genuine clients. The privacy of the clients is at stake
due to the lack of robustness of the platform. The data of
a client is gained and the data is modulated in a format
that causes ill effect in the clients profile and the data is
modulated in order to harm the goodwill and status of the
client.
Introduction
Rapid development in the advancement in the
infrastructure of the hardware and software has been the major
reason behind the emergence of internet serving devices that
provides complete connectivity f the computing devices
(Alrawais, Alhothaily, & Cheng, 2017). The total number of
devices utilizing internet is expected to increase by a huge
number in the next 20 years (Oravec, 2017, July). With an
increase in growth of the Internet using devices the usage of
the platform of Internet of Things has increased to a great
extent. The emergence of internet of things has brought in
several advantages like that of increase in the connectivity
among the computers that are connected in the same
networking module (Li & Da Xu, 2017). With the advantage
of increased connectivity, the disadvantage of less robustness
of the platform comes in disguise. Despite the advantages, that
the Internet of Things the only aspect of concern of this
platform is the security of the platform. The aspect of data
being accessed by unauthorized personnel acts to be the major
threat. The challenges thrown by the cyber criminal on the
platform of Internet of Things can be dethroned by the
methodologies that are being used in daily basis. The security
aspect of the data base seems to be the major concern in
today’s world. The security problem regarding the social
networking comes in disguise with the advantages that are
been enjoyed due to the platform of Internet of things. These
challenges caused by the cyber criminals in the platform of the
Internet of things are both physical as well as virtual in nature.
The security problems that are physical in nature consist of the
hacks that include the hardware terminology and controlling
the hardware without proper authentication of the user. The
virtual hacks include gaining access to the personal portal of
an individual without proper authentication and modulating
the data in accord to harm the personnel. After performing
rigorous experiments regarding the aspect of security in the
field of Internet of things, procedures of facing these cyber
criminals have been found out with the help of the usage of
the platform of Internet of Things. After the advancement in
the process of retaining, the services of the security processes
in the field of Internet of Things the privacy of the users and
the clients are at a better security stature. This advancement in
the technology still yields loopholes that must be incarnated
by the service providers or the clients in order to stay
protected from the cyber criminals.
Structure of the report with the contents of the
report
The report will discuss about the approach that must be taken
in order to suggest the methodologies of the cyber criminals
that tend to access the data in n unauthorized manner. The
report will also discuss about understanding the supply chain
risk of the intruders that gain access to the data without having
any permit to the access data. This report will also discuss
about the acknowledging the cyber criminals have possessed
the address of the threat t hat in both virtual and physical
ways. This report will further discuss about the security
methodologies that must be followed by the clients in order to
keep the computing device free form any kind of cyber
crimes. This report will provide the literature review of the
functioning of the Network intrusion detection technique in
the increase in use of the technology the security issues of the technology has been the only instance of problem for this
platform. The internet engineer task force members have been trying to design an authentication and authorization mechanism
for the devices that use Internet of Things as a platform for their mode of operation. The main reason of concern regarding the
security of Internet of Things is that the attacks possessed on the Internet of Things platform affects the virtual as well as the
physical infrastructure.
1. Purpose of the report
This report will discuss about the main problem of
security that is mainly due to the fragmentation of the
platform that makes the platform less robust and
enables the cyber criminals to attack the platform and
gain personal data. Privacy protection of the
computing devices that uses Internet of Things
requires personal configuration security settings. This
report will provide literature review of the security
and privacy prospective of the platform and evaluate
the literature regarding the processes of overcoming
the loopholes that are present in the internet of
Things platform.
2. Topic:
Security and privacy in Internet of Things
3. Expect format of the report
The report will discuss about the security and
privacies terminology that must be maintained in order to
prevent the computing devices from being attacked by the
cyber criminals. The report presents a literature review of
topic related to the security and the maintenance of
privacy in the platform. The report discusses about the
steps that must be taken in order to keep the platform free
of cyber militants. The various methodologies are then
discussed that must be undertaken to keep the platform
protected.
4. Problem statement
Unauthorized personnel gain access to the personal data
of genuine clients. The privacy of the clients is at stake
due to the lack of robustness of the platform. The data of
a client is gained and the data is modulated in a format
that causes ill effect in the clients profile and the data is
modulated in order to harm the goodwill and status of the
client.
Introduction
Rapid development in the advancement in the
infrastructure of the hardware and software has been the major
reason behind the emergence of internet serving devices that
provides complete connectivity f the computing devices
(Alrawais, Alhothaily, & Cheng, 2017). The total number of
devices utilizing internet is expected to increase by a huge
number in the next 20 years (Oravec, 2017, July). With an
increase in growth of the Internet using devices the usage of
the platform of Internet of Things has increased to a great
extent. The emergence of internet of things has brought in
several advantages like that of increase in the connectivity
among the computers that are connected in the same
networking module (Li & Da Xu, 2017). With the advantage
of increased connectivity, the disadvantage of less robustness
of the platform comes in disguise. Despite the advantages, that
the Internet of Things the only aspect of concern of this
platform is the security of the platform. The aspect of data
being accessed by unauthorized personnel acts to be the major
threat. The challenges thrown by the cyber criminal on the
platform of Internet of Things can be dethroned by the
methodologies that are being used in daily basis. The security
aspect of the data base seems to be the major concern in
today’s world. The security problem regarding the social
networking comes in disguise with the advantages that are
been enjoyed due to the platform of Internet of things. These
challenges caused by the cyber criminals in the platform of the
Internet of things are both physical as well as virtual in nature.
The security problems that are physical in nature consist of the
hacks that include the hardware terminology and controlling
the hardware without proper authentication of the user. The
virtual hacks include gaining access to the personal portal of
an individual without proper authentication and modulating
the data in accord to harm the personnel. After performing
rigorous experiments regarding the aspect of security in the
field of Internet of things, procedures of facing these cyber
criminals have been found out with the help of the usage of
the platform of Internet of Things. After the advancement in
the process of retaining, the services of the security processes
in the field of Internet of Things the privacy of the users and
the clients are at a better security stature. This advancement in
the technology still yields loopholes that must be incarnated
by the service providers or the clients in order to stay
protected from the cyber criminals.
Structure of the report with the contents of the
report
The report will discuss about the approach that must be taken
in order to suggest the methodologies of the cyber criminals
that tend to access the data in n unauthorized manner. The
report will also discuss about understanding the supply chain
risk of the intruders that gain access to the data without having
any permit to the access data. This report will also discuss
about the acknowledging the cyber criminals have possessed
the address of the threat t hat in both virtual and physical
ways. This report will further discuss about the security
methodologies that must be followed by the clients in order to
keep the computing device free form any kind of cyber
crimes. This report will provide the literature review of the
functioning of the Network intrusion detection technique in
order to keep the computing device free from the cyber attacks
based on the platform of the Internet of things. This report will
also provide the literature review of the functionality of Host
Intrusion detection sensor s to keep the computing device free
from cyber attacks that will be based on the platform of the
Internet of Things (Ericsson, 2014). This report will ls provide
the literature review of the methodologies that are undertaken
in order to complete the process of cryptography and the
technicality that are involved in the completion of the process
of Honeypot in order to keep the computing device protected
from the cyber attacks. This report will also provide the
advantages and the disadvantages of the platform for the
security related to the platform of Internet of Things. This
report will also discuss about the future research scope of the
platform with respect to the platform of the Internet of Things.
based on the platform of the Internet of things. This report will
also provide the literature review of the functionality of Host
Intrusion detection sensor s to keep the computing device free
from cyber attacks that will be based on the platform of the
Internet of Things (Ericsson, 2014). This report will ls provide
the literature review of the methodologies that are undertaken
in order to complete the process of cryptography and the
technicality that are involved in the completion of the process
of Honeypot in order to keep the computing device protected
from the cyber attacks. This report will also provide the
advantages and the disadvantages of the platform for the
security related to the platform of Internet of Things. This
report will also discuss about the future research scope of the
platform with respect to the platform of the Internet of Things.
Literature Review
According to Li & Da Xu, 2017, Internet of things
has been gaining the global acceptance from the audience all
over the globe. This global acceptance increases the usage of
the technology Internet of Thing are nothing but simple
electronic devices which has the transmitter and the receiver
embedded in the electronic device that enables them to
communicate and transact over the platform of the digital
communication and the internet. With the benefit of gaining
the advantage of gaining communication through put the
globe comes the disadvantage of security in disguise. Security
of the data base has been the major issue for the application of
the Internet of things in regular life.
Security Issues
1) Insecure Web Interface
According to O’Neill, M. 2016, the most important
aspect that affects the infrastructure of the computing system
is the Web Interface of the company. The security aspect of
the Web Interface is also the major concern for the
organizations that are dependent on this feature as their
networking system. Web interface proves to be important as it
cuts as the link between the user and the computing device.
An attack on the web interface allows the cyber criminal to
get access on the direct interface of the networking system.
Modulations made on the interface reflects instantly on the
web media and the clients of the database and the web service
aces a lot of problem as the data that is to be present in the
web is modulated and wrong information is posted in the web
leading to the conflict between the user and the employees of
the organization who provide the web services.
Recommendation
According to Kraijak & Tuwanut, 2015, the
methodologies that are undertaken to prevent the attack on the
Web Interfaces are setting up of password and user name
different from the initial username and the password that was
already set during the installation if the web services. This
aspect of changing the initial password and the username
gives the web services robustness in the accounting of the
database of the web. Another methodology that is being used
in the process to protecting the web interface from the cyber
criminals are by processing of the password recovery method
as in case the password of the web service is changed by the
cyber criminal then the genuine client can gain access of the
data in the web service with the help of the restoring password
methodology. Another way of terminating the risk of ten
cyber attack in the web interface is by setting reference for the
password so that the password that is set is well strong for the
cyber criminals to harm the web interface and the gain access
to the front end of the web interface.
2) Insufficient authorization
According to Hahn 2017, the inefficient
methodology that is applied in the usage of the process from
securing the web services has been acting as one of the major
causes for the security issues in the field of Internet of things.
The computing devices that deploy the methodology of the
authentication of the user of the web services is very
inefficient as the imposters can use the identity of the genuine
clients and gain access to the web services and modulate the
information that harms the clients who use the web service.
This security problems faced is due to the fact that the
password complexity of the web services are not as strong as
it is required for preventing the imposters to gain access to the
personal accent source data that are private in nature. Another
reason of insufficient authentication problem is that
credentials of the data base are very poorly protected which
matches the credentials vulnerable to the imposters. The
authentication systems that are applied in the data base are one
factor authentication system. The ability of the one factor
authentication is limited and v the robustness of the platform
is affected due to this terminology of one factor authentication
methodology. Insecurity in the password recovery
methodology is availed due to the fact the lack of robustness
in the setting of the password. The control of rile based access
is not well maintained which leads to the fact of lack of
authentication robustness of the data base.
Recommendation
According to Hu, 2016, The password that is being
set for the database has to be strong enough to be cracked by
the imposters in order to keep the database protected from the
imposters are by ensuring that the password that s et for the
data base is strong enough to be cracked. To prevent the
access of the imposters the most important thing that should
be checked is the positioning of the granular access control.
To keep the data base protected the granular access control
must be placed in the right place and the use of the granular
access control, us be made efficiently. The password that is set
for the database must be recoverable by the client in case of
misplacing the password.
3) Insecure Network Services
According to Li & Da Xu, 2017, Insecure Network
services deals with the methodologies that are caused due to
the vulnerabilities of the networking system that requires
Internet of Things in the process of the infrastructural
methodology. The platform of Internet of Things provides the
intruders the access in an unauthorized manner to the data that
is associate in nature. Vulnerable services that are provided by
the Internet of Things are proven to be the main reason behind
the lack of robustness of the network services. Another main
reason of this lack of robustness of the platform is the buffer
over flow of the networking services. The overflow of the
buffer provides the imposters an opportunity to gain access t
the personal data of the clients who has been using the
platform network services for the transaction purpose. The
According to Li & Da Xu, 2017, Internet of things
has been gaining the global acceptance from the audience all
over the globe. This global acceptance increases the usage of
the technology Internet of Thing are nothing but simple
electronic devices which has the transmitter and the receiver
embedded in the electronic device that enables them to
communicate and transact over the platform of the digital
communication and the internet. With the benefit of gaining
the advantage of gaining communication through put the
globe comes the disadvantage of security in disguise. Security
of the data base has been the major issue for the application of
the Internet of things in regular life.
Security Issues
1) Insecure Web Interface
According to O’Neill, M. 2016, the most important
aspect that affects the infrastructure of the computing system
is the Web Interface of the company. The security aspect of
the Web Interface is also the major concern for the
organizations that are dependent on this feature as their
networking system. Web interface proves to be important as it
cuts as the link between the user and the computing device.
An attack on the web interface allows the cyber criminal to
get access on the direct interface of the networking system.
Modulations made on the interface reflects instantly on the
web media and the clients of the database and the web service
aces a lot of problem as the data that is to be present in the
web is modulated and wrong information is posted in the web
leading to the conflict between the user and the employees of
the organization who provide the web services.
Recommendation
According to Kraijak & Tuwanut, 2015, the
methodologies that are undertaken to prevent the attack on the
Web Interfaces are setting up of password and user name
different from the initial username and the password that was
already set during the installation if the web services. This
aspect of changing the initial password and the username
gives the web services robustness in the accounting of the
database of the web. Another methodology that is being used
in the process to protecting the web interface from the cyber
criminals are by processing of the password recovery method
as in case the password of the web service is changed by the
cyber criminal then the genuine client can gain access of the
data in the web service with the help of the restoring password
methodology. Another way of terminating the risk of ten
cyber attack in the web interface is by setting reference for the
password so that the password that is set is well strong for the
cyber criminals to harm the web interface and the gain access
to the front end of the web interface.
2) Insufficient authorization
According to Hahn 2017, the inefficient
methodology that is applied in the usage of the process from
securing the web services has been acting as one of the major
causes for the security issues in the field of Internet of things.
The computing devices that deploy the methodology of the
authentication of the user of the web services is very
inefficient as the imposters can use the identity of the genuine
clients and gain access to the web services and modulate the
information that harms the clients who use the web service.
This security problems faced is due to the fact that the
password complexity of the web services are not as strong as
it is required for preventing the imposters to gain access to the
personal accent source data that are private in nature. Another
reason of insufficient authentication problem is that
credentials of the data base are very poorly protected which
matches the credentials vulnerable to the imposters. The
authentication systems that are applied in the data base are one
factor authentication system. The ability of the one factor
authentication is limited and v the robustness of the platform
is affected due to this terminology of one factor authentication
methodology. Insecurity in the password recovery
methodology is availed due to the fact the lack of robustness
in the setting of the password. The control of rile based access
is not well maintained which leads to the fact of lack of
authentication robustness of the data base.
Recommendation
According to Hu, 2016, The password that is being
set for the database has to be strong enough to be cracked by
the imposters in order to keep the database protected from the
imposters are by ensuring that the password that s et for the
data base is strong enough to be cracked. To prevent the
access of the imposters the most important thing that should
be checked is the positioning of the granular access control.
To keep the data base protected the granular access control
must be placed in the right place and the use of the granular
access control, us be made efficiently. The password that is set
for the database must be recoverable by the client in case of
misplacing the password.
3) Insecure Network Services
According to Li & Da Xu, 2017, Insecure Network
services deals with the methodologies that are caused due to
the vulnerabilities of the networking system that requires
Internet of Things in the process of the infrastructural
methodology. The platform of Internet of Things provides the
intruders the access in an unauthorized manner to the data that
is associate in nature. Vulnerable services that are provided by
the Internet of Things are proven to be the main reason behind
the lack of robustness of the network services. Another main
reason of this lack of robustness of the platform is the buffer
over flow of the networking services. The overflow of the
buffer provides the imposters an opportunity to gain access t
the personal data of the clients who has been using the
platform network services for the transaction purpose. The
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
major reason behind the improper access of data in the
networking services are the opening of the ports that are
accessible by the means of UPnP. The UDP services that are
exploitable in nature also acts as the gateway for the imposters
to gain access to the data as the imposters exploits the UDP
gateway to enter into the database of the clients and modulate
the same. Usage of the DOS via Network Fuzzing is also the
major reason of the data insecurity of the Insecure Networking
services. This fuzzing of the networking infrastructure via the
DS infrastructure has attracted many cyber criminals to poach
against the databases that are stored in the network services.
Recommendation
According to O’Neill, M. 2016, the
recommendations that are required for the protection of the
data from the in secured data services is by the means of the
fact that the ports that are needed and the ports that are not in
use must be closed as the data that is present in the networking
system will ensure the fact that the leakage of the data from
the other ports are minimized and the data security and
privacy is maintained. In case the ports of the database that are
not in use cannot be closed due to the complications in the
infrastructure of the system the entire data is passed through
the UPnP. This also ensures that the data that is passed
through the network is secured and the encryption of the data
is efficient. The strategy of fuzzing attacks ensure the fact are
diminished and the concern for the buffer over flow is taken
into consideration. These recommendation ensures the fact
that the data that si stored in the processing of the overflow of
the buffer. .
4) Lack of Transport Encryption
According to Hahn 2017, this exchanges data with
the Internet of Things device. In order to do this it follows an
unencrypted format. This leads a way for cyber criminals to
steal the data for ill purposes. Some security susceptibilities
that could lead to this particular issue are as follows. The
services that are unencrypted via the internet.SSL or TLS that
are poorly implemented.SSL or TLS that are misconfigured.
Recommendation
According to Hanck & Markantonakis, 2015, the
recommendations that must be taken in order secure the data
that are in the processing of the database is by the
methodologies that will include the fact that the encryption of
the data includes the protocols. The mostly used protocols are
namely the TLS and the SSL. This fact ensures the processing
of the data that will ensure that thee encryption of the data is
performed with efficiency .hence it is ensured that the data is
encrypted using various protocols. Such protocols include
TLS and SSL while transmitting them through networks.
Another mode of prevention of the task is that the entire
proprietary of the encryption mode is controlled by the
accepted module of the TLS and the SSL module. To ensure
that the encryption techniques used for protecting data while
transporting are accepted and not proprietary encryption
protocols.
5) Privacy Concerns
According to Premnath & Haas, 2015, privacy
concerns are faced when personal data is collected but not
well secured. It can be discovered by reviewing the data that
has been collected and activates the device. The security
vulnerability, which can lead to such issues, is the collection
of useless personal information. The privacy concern acts to
be the major problem as the data that are stored in the
processing of the data by the imposters. This fact ensures the
feature that the data that is present in the database gets
accessed by the imposters.
Recommendation:
According to Kraijak & Tuwanut, 2015, the recommendations
that are will act helpful for the progression of the data privacy
and the security of the data regarding the identification of the
source of the access as this will help on tracking of the lost
data and regaining the data might also be possible for the
progression of the privacy. This will ensure that the data
collected is de-identified this will ensure that a specific
retention limit is set for collected data. The encryption of the
data must be done properly. This will ensure that the data
collected is protected by encryption.
6) Insecure Cloud Interface
According to Kraija & Tuwanut, 2015, it is
concerned with the issues related to cloud interface which is
used to interact with Internet of Things device. This would
result in poor data transporting in unencrypted format. This
allows an attacker the access to the data. Factors that can lead
to these issues are enumeration of account, details exposed in
network traffic. The traffic that is made to pass through the
cloud computing networking system ensures the fact that the
interface that the cloud computing format is using lacks the
robustness of the infrastructure. This ensures the fact that the
data stored in the cloud will ensure the fact that the data will
regain the progression of the data.
Recommendation:
According to Premnath & Haas, 2015, some measures that can
be taken to prevent them include the methodology that intend
on the methodology of the resetting the password and the
security instances of the database. This includes setting new
passwords and the passwords resetting from that which are
applied in default mode. The changing to default users and
default passwords during initial setup acts helpful in the
purpose of the detection of the problems. The number of
attempts must be fixed in order to set the security tire for the
organization. By setting the bar for the processing of the
security chain it disables the imposters to guess the password
of the account which in turn helps the organization to keep the
database protected. This fact ensure that account logs out after
several failed to login. For securing the access to the database
networking services are the opening of the ports that are
accessible by the means of UPnP. The UDP services that are
exploitable in nature also acts as the gateway for the imposters
to gain access to the data as the imposters exploits the UDP
gateway to enter into the database of the clients and modulate
the same. Usage of the DOS via Network Fuzzing is also the
major reason of the data insecurity of the Insecure Networking
services. This fuzzing of the networking infrastructure via the
DS infrastructure has attracted many cyber criminals to poach
against the databases that are stored in the network services.
Recommendation
According to O’Neill, M. 2016, the
recommendations that are required for the protection of the
data from the in secured data services is by the means of the
fact that the ports that are needed and the ports that are not in
use must be closed as the data that is present in the networking
system will ensure the fact that the leakage of the data from
the other ports are minimized and the data security and
privacy is maintained. In case the ports of the database that are
not in use cannot be closed due to the complications in the
infrastructure of the system the entire data is passed through
the UPnP. This also ensures that the data that is passed
through the network is secured and the encryption of the data
is efficient. The strategy of fuzzing attacks ensure the fact are
diminished and the concern for the buffer over flow is taken
into consideration. These recommendation ensures the fact
that the data that si stored in the processing of the overflow of
the buffer. .
4) Lack of Transport Encryption
According to Hahn 2017, this exchanges data with
the Internet of Things device. In order to do this it follows an
unencrypted format. This leads a way for cyber criminals to
steal the data for ill purposes. Some security susceptibilities
that could lead to this particular issue are as follows. The
services that are unencrypted via the internet.SSL or TLS that
are poorly implemented.SSL or TLS that are misconfigured.
Recommendation
According to Hanck & Markantonakis, 2015, the
recommendations that must be taken in order secure the data
that are in the processing of the database is by the
methodologies that will include the fact that the encryption of
the data includes the protocols. The mostly used protocols are
namely the TLS and the SSL. This fact ensures the processing
of the data that will ensure that thee encryption of the data is
performed with efficiency .hence it is ensured that the data is
encrypted using various protocols. Such protocols include
TLS and SSL while transmitting them through networks.
Another mode of prevention of the task is that the entire
proprietary of the encryption mode is controlled by the
accepted module of the TLS and the SSL module. To ensure
that the encryption techniques used for protecting data while
transporting are accepted and not proprietary encryption
protocols.
5) Privacy Concerns
According to Premnath & Haas, 2015, privacy
concerns are faced when personal data is collected but not
well secured. It can be discovered by reviewing the data that
has been collected and activates the device. The security
vulnerability, which can lead to such issues, is the collection
of useless personal information. The privacy concern acts to
be the major problem as the data that are stored in the
processing of the data by the imposters. This fact ensures the
feature that the data that is present in the database gets
accessed by the imposters.
Recommendation:
According to Kraijak & Tuwanut, 2015, the recommendations
that are will act helpful for the progression of the data privacy
and the security of the data regarding the identification of the
source of the access as this will help on tracking of the lost
data and regaining the data might also be possible for the
progression of the privacy. This will ensure that the data
collected is de-identified this will ensure that a specific
retention limit is set for collected data. The encryption of the
data must be done properly. This will ensure that the data
collected is protected by encryption.
6) Insecure Cloud Interface
According to Kraija & Tuwanut, 2015, it is
concerned with the issues related to cloud interface which is
used to interact with Internet of Things device. This would
result in poor data transporting in unencrypted format. This
allows an attacker the access to the data. Factors that can lead
to these issues are enumeration of account, details exposed in
network traffic. The traffic that is made to pass through the
cloud computing networking system ensures the fact that the
interface that the cloud computing format is using lacks the
robustness of the infrastructure. This ensures the fact that the
data stored in the cloud will ensure the fact that the data will
regain the progression of the data.
Recommendation:
According to Premnath & Haas, 2015, some measures that can
be taken to prevent them include the methodology that intend
on the methodology of the resetting the password and the
security instances of the database. This includes setting new
passwords and the passwords resetting from that which are
applied in default mode. The changing to default users and
default passwords during initial setup acts helpful in the
purpose of the detection of the problems. The number of
attempts must be fixed in order to set the security tire for the
organization. By setting the bar for the processing of the
security chain it disables the imposters to guess the password
of the account which in turn helps the organization to keep the
database protected. This fact ensure that account logs out after
several failed to login. For securing the access to the database
of the system it enables the factor that the data that is stored in
the data base is supported with 2 way authentication system.
This includes the factor that the data that are stored in the
database of the organization is secured and the processing of
the data is more difficult because of the lack of prevention of
the data with respect to the processing of the security. This
fact will help to ensure that personal information is not shared
via internet, implement 2 factor authentication for better
security.
7) Insecure Mobile Interface
According to Li & Da Xu, 2017, unencrypted data or
weak authentication can let the attackers have the access to the
data of an Internet of Things device. Factors that can lead to
these factors include enumeration of account and personal
details exposed in network traffic.
Recommendation:
According to Hahn 2017, some measures to be taken to
prevent these threats includes ensuring that personal
information is not shared via internet. Default passwords and
usernames must changed while initial setup.
8) Insufficient Security Configurability
According to Lee & Lee, 2015, it is present when the
users of device have no ability to change its security controls.
The risk is that the Internet of Things device can be easily too
attacked. This can be done by unauthorized access to the data.
Factors that can lead to this threat is the lack of options in
password security, no security monitoring and no security
logging.
Recommendation:
According to Hahn 2017, some measures that can be
taken to prevent this kind of threats are that it separates
administrative users from normal users. This will help in
ensuring the ability to notify the end users of security events.
This factor will also help in ensuring the ability to provide
strong passwords.
Insecure Software
According to Bertino & Ferrari, 2018, software is
insecure when they contain hardcoded data such as
credentials. The inability of a software to get updated means
that the device is vulnerable to the security issue. The factors
leading to these threats are the updated file that is not
encrypted, the update is not verified before an upload and
when there is no update functionality.
Recommendation:
According to Hahn 2017, some measures that can be
taken to prevent these threats are also ensures that the update
server is secured. This will also help to ensure that the data
has the ability to update. This will help to ensure that the
updated file does not reveal any sensitive data. The factor will
help ensure that the file is transmitted via an encrypted
connection.
9) Poor Physical Security
According to O’Neill, M. 2016, Poor physical
security takes place when an attacker is able to disassemble a
device in order to get access to the storage medium as well as
the data stored in it. The weakness can also be detected when
an USB port is used to access a device that uses features
intended for maintenance. The factors that causes these threats
are getting access to software with the help of USB ports and
removing storage media.
Recommendation:
According to Kraijak & Tuwanut, 2015, measures to be taken
to prevent these threats are ensuring that the data storage
medium is not easily removed. Ensuring that the device
cannot be easily disassembled is also required. Ensuring that
the product has the ability to limit the capabilities of
administrative is also required for the processing of the data.
Ensuring that the product has the ability to limit the
capabilities of administrative is also required for the
processing of the data framework.
According to Li & Da Xu, 2017, Internet of Things has been
here, and will be here. By 2020, Gartner predicts that the
Internet of Things would be made up of 26 billion “units.”
The measures stated above will be nothing if
the manufacturers of Internet of Things devices do not
consider them.
Methodologies
Internet of Things has been acting as the major source of
communication among the field of the corporate sector as well
as in the field of the smart citizenship f the place where the
platform of internet of things is present. This ensures the fact
that with the introduction of the internet of things, the
organization that has implemented the internet of things for
the purpose of the providing efficiency in the field of
communication has been proving to be beneficial for the
organization. Despite all the advantages, the major
disadvantage that the organization faces is the problems
regarding the security and privacy of the databases of the
organization. This ensures the fact that the data that is stored
in the database of the organization is not well protected as the
framework of the database of the internet of things is not as
robust as it should be. This is due to the fact that the
organizations do not focus on the robustness of the database as
the turnover if the organization is not directly related to the
robustness of the organization. The use of various methods
has been made in order to make the platform of the internet of
things secure and maintain the privacy of the data centre
which is dependent on the robustness of the datacentre which
is based in the platform of the internet of tings.
Method 1
The first methodology that can be made use of for securing
the data that is stored in the datacentre that has been using the
platform of the internet of things. The use of strong password
setting can be used to secure the unauthorized access of the
the data base is supported with 2 way authentication system.
This includes the factor that the data that are stored in the
database of the organization is secured and the processing of
the data is more difficult because of the lack of prevention of
the data with respect to the processing of the security. This
fact will help to ensure that personal information is not shared
via internet, implement 2 factor authentication for better
security.
7) Insecure Mobile Interface
According to Li & Da Xu, 2017, unencrypted data or
weak authentication can let the attackers have the access to the
data of an Internet of Things device. Factors that can lead to
these factors include enumeration of account and personal
details exposed in network traffic.
Recommendation:
According to Hahn 2017, some measures to be taken to
prevent these threats includes ensuring that personal
information is not shared via internet. Default passwords and
usernames must changed while initial setup.
8) Insufficient Security Configurability
According to Lee & Lee, 2015, it is present when the
users of device have no ability to change its security controls.
The risk is that the Internet of Things device can be easily too
attacked. This can be done by unauthorized access to the data.
Factors that can lead to this threat is the lack of options in
password security, no security monitoring and no security
logging.
Recommendation:
According to Hahn 2017, some measures that can be
taken to prevent this kind of threats are that it separates
administrative users from normal users. This will help in
ensuring the ability to notify the end users of security events.
This factor will also help in ensuring the ability to provide
strong passwords.
Insecure Software
According to Bertino & Ferrari, 2018, software is
insecure when they contain hardcoded data such as
credentials. The inability of a software to get updated means
that the device is vulnerable to the security issue. The factors
leading to these threats are the updated file that is not
encrypted, the update is not verified before an upload and
when there is no update functionality.
Recommendation:
According to Hahn 2017, some measures that can be
taken to prevent these threats are also ensures that the update
server is secured. This will also help to ensure that the data
has the ability to update. This will help to ensure that the
updated file does not reveal any sensitive data. The factor will
help ensure that the file is transmitted via an encrypted
connection.
9) Poor Physical Security
According to O’Neill, M. 2016, Poor physical
security takes place when an attacker is able to disassemble a
device in order to get access to the storage medium as well as
the data stored in it. The weakness can also be detected when
an USB port is used to access a device that uses features
intended for maintenance. The factors that causes these threats
are getting access to software with the help of USB ports and
removing storage media.
Recommendation:
According to Kraijak & Tuwanut, 2015, measures to be taken
to prevent these threats are ensuring that the data storage
medium is not easily removed. Ensuring that the device
cannot be easily disassembled is also required. Ensuring that
the product has the ability to limit the capabilities of
administrative is also required for the processing of the data.
Ensuring that the product has the ability to limit the
capabilities of administrative is also required for the
processing of the data framework.
According to Li & Da Xu, 2017, Internet of Things has been
here, and will be here. By 2020, Gartner predicts that the
Internet of Things would be made up of 26 billion “units.”
The measures stated above will be nothing if
the manufacturers of Internet of Things devices do not
consider them.
Methodologies
Internet of Things has been acting as the major source of
communication among the field of the corporate sector as well
as in the field of the smart citizenship f the place where the
platform of internet of things is present. This ensures the fact
that with the introduction of the internet of things, the
organization that has implemented the internet of things for
the purpose of the providing efficiency in the field of
communication has been proving to be beneficial for the
organization. Despite all the advantages, the major
disadvantage that the organization faces is the problems
regarding the security and privacy of the databases of the
organization. This ensures the fact that the data that is stored
in the database of the organization is not well protected as the
framework of the database of the internet of things is not as
robust as it should be. This is due to the fact that the
organizations do not focus on the robustness of the database as
the turnover if the organization is not directly related to the
robustness of the organization. The use of various methods
has been made in order to make the platform of the internet of
things secure and maintain the privacy of the data centre
which is dependent on the robustness of the datacentre which
is based in the platform of the internet of tings.
Method 1
The first methodology that can be made use of for securing
the data that is stored in the datacentre that has been using the
platform of the internet of things. The use of strong password
setting can be used to secure the unauthorized access of the
data by the cyber criminals. This ensures the fact that the data
that is stored in the data base that has been using the platform
of internet of things is secured from the unauthorized access
of the imposters. The methodology includes the factor that
the security of the database is completely dependent on the
strength of the password that is set for the protection I the data
that is stored in the database of the system. This ensures the
fact that ate imposters cannot get the access to the data that is
stored in the database that is dependent on the platform of the
internet of things. In case the password that is set is strong
enough the imposters cannot log into the account as decoding
the password acts as the major challenge to the security of the
data that are stored in the data centre of the data base that has
been u sing the platform of internet of things. The strength of
the password secures the fact that the data that is stored in the
processing of performing a task. This strength of the password
ensures the robustness of the data centre that is based on the
platform of the internet of things.
Method 2
Creating personal portals for the employees of the
organization acts to be the major reason behind the security of
the data of the employees. The data that are stored in the data
centre of the database that is based on the platform of the
internet of things. This personal profile creation defines the
fact that the employees are liable regarding the security of
their own data. The profile that is created for the employees of
the organization ensures the fact that the information of the
employee are stored in their personal portal which determines
the fact that the security of the data of the employees are in
the security process that the employees maintain for the
purpose of dealing with the imposters who like to gain access
to the data that are stored in the database of the system. This
ensures the fact that the data that are stored in data centre
which is based on the platform of the internet of things. This
fact takes into consideration that the data that is stored in the
procession of the accounting of the employee ensures the fact
that the data that is stored in the portal of the employee is
secured with proper and strong passwords that are set for the
processing of the data that are stored in the platform of the
database. This ensures the fact that the data that are stored in
the portal of the database is concerned regarding the data of
the employee.
Method 3
Installing firewall acts as the major technique that ensures the
fact that the data that is stored in the database of the
information centre that is based on the platform of the internet
of things ensures the fact that the unauthorized access to the
network is prevented. This prevention leads to the fact that the
data that is present in the data centre based on the platform of
internet of things is protected from the unauthorized access.
The firewall installation acts as the major reason behind the
propagation of procuring security. This ensures the fact that
the installed firewall provides a basic protection to the data
that is present in the data centre based on the platform of
internet of things. Despite the fact that the data is stored in the
database is protected by the firewall, different elementary
solutions are taken for the purpose of the protection of the
data that is present in the data centre based on the platform of
internet of things. The firewall protection can be vulnerable at
times due to the fact that the data that is present in the data
centre based on the platform of internet of things can be
accessed through the software that has been created which has
the ability to penetrate the protection barrier of the data base.
This is because the database of the system is vulnerable as the
barrier of the database is not updated and the database can be
attacked by the imposters.
Method 4
Real Time Password setting is used for the purpose of setting
the password each and every time the client tends to log in the
account of the system. This processing ensures the fact that
the data that is present in the data centre based on the platform
of internet of things has been facing the advantage of gaining
the accessibility to the portal that will ensure the real time
password ensures the fact that even if the employee forgets to
log out of the networking system, the computing system
automatically logs the employee off which will ensure that the
data that is present in the data centre based on the platform of
internet of things stays protected from the unauthenticated
access to the database. This acts to be one of the safest
methods for the performance of the security of the data.
Method 5
Updating the software has been acting as the only way to
protect the data that is present in the data centre based on the
platform of internet of things. The updated versions of the
database acts to be invincible by the imposters who are trying
to gain access in order to gain the data from the database f the
system. The protection that is provided by the updated
versions of the database is not vulnerable and penetrating
through the software is not possible n case the software is
updated. This fact ensures that the data that is present in the
data centre based on the platform of internet of things is
protected from the unauthorized access form the imposters.
This helps this method to gain an edge over all other
methodologies that are taken into consideration for keeping
the data that is present in the data centre based on the platform
of internet of things secured from the imposters.
Comparison
The comparisons among the different methodologies will act
helpful in order to ensure the fact that the technology that
must be used provides the maximum efficiency. The
comparisons will be provided under the subheading of the
following parameters: -
Efficiency
The most efficient technique for the protection of the data
base is setting a strong password. This process does not need
any kind of excess effort from the employees of the
organization as well as the organization. This is the most cost
that is stored in the data base that has been using the platform
of internet of things is secured from the unauthorized access
of the imposters. The methodology includes the factor that
the security of the database is completely dependent on the
strength of the password that is set for the protection I the data
that is stored in the database of the system. This ensures the
fact that ate imposters cannot get the access to the data that is
stored in the database that is dependent on the platform of the
internet of things. In case the password that is set is strong
enough the imposters cannot log into the account as decoding
the password acts as the major challenge to the security of the
data that are stored in the data centre of the data base that has
been u sing the platform of internet of things. The strength of
the password secures the fact that the data that is stored in the
processing of performing a task. This strength of the password
ensures the robustness of the data centre that is based on the
platform of the internet of things.
Method 2
Creating personal portals for the employees of the
organization acts to be the major reason behind the security of
the data of the employees. The data that are stored in the data
centre of the database that is based on the platform of the
internet of things. This personal profile creation defines the
fact that the employees are liable regarding the security of
their own data. The profile that is created for the employees of
the organization ensures the fact that the information of the
employee are stored in their personal portal which determines
the fact that the security of the data of the employees are in
the security process that the employees maintain for the
purpose of dealing with the imposters who like to gain access
to the data that are stored in the database of the system. This
ensures the fact that the data that are stored in data centre
which is based on the platform of the internet of things. This
fact takes into consideration that the data that is stored in the
procession of the accounting of the employee ensures the fact
that the data that is stored in the portal of the employee is
secured with proper and strong passwords that are set for the
processing of the data that are stored in the platform of the
database. This ensures the fact that the data that are stored in
the portal of the database is concerned regarding the data of
the employee.
Method 3
Installing firewall acts as the major technique that ensures the
fact that the data that is stored in the database of the
information centre that is based on the platform of the internet
of things ensures the fact that the unauthorized access to the
network is prevented. This prevention leads to the fact that the
data that is present in the data centre based on the platform of
internet of things is protected from the unauthorized access.
The firewall installation acts as the major reason behind the
propagation of procuring security. This ensures the fact that
the installed firewall provides a basic protection to the data
that is present in the data centre based on the platform of
internet of things. Despite the fact that the data is stored in the
database is protected by the firewall, different elementary
solutions are taken for the purpose of the protection of the
data that is present in the data centre based on the platform of
internet of things. The firewall protection can be vulnerable at
times due to the fact that the data that is present in the data
centre based on the platform of internet of things can be
accessed through the software that has been created which has
the ability to penetrate the protection barrier of the data base.
This is because the database of the system is vulnerable as the
barrier of the database is not updated and the database can be
attacked by the imposters.
Method 4
Real Time Password setting is used for the purpose of setting
the password each and every time the client tends to log in the
account of the system. This processing ensures the fact that
the data that is present in the data centre based on the platform
of internet of things has been facing the advantage of gaining
the accessibility to the portal that will ensure the real time
password ensures the fact that even if the employee forgets to
log out of the networking system, the computing system
automatically logs the employee off which will ensure that the
data that is present in the data centre based on the platform of
internet of things stays protected from the unauthenticated
access to the database. This acts to be one of the safest
methods for the performance of the security of the data.
Method 5
Updating the software has been acting as the only way to
protect the data that is present in the data centre based on the
platform of internet of things. The updated versions of the
database acts to be invincible by the imposters who are trying
to gain access in order to gain the data from the database f the
system. The protection that is provided by the updated
versions of the database is not vulnerable and penetrating
through the software is not possible n case the software is
updated. This fact ensures that the data that is present in the
data centre based on the platform of internet of things is
protected from the unauthorized access form the imposters.
This helps this method to gain an edge over all other
methodologies that are taken into consideration for keeping
the data that is present in the data centre based on the platform
of internet of things secured from the imposters.
Comparison
The comparisons among the different methodologies will act
helpful in order to ensure the fact that the technology that
must be used provides the maximum efficiency. The
comparisons will be provided under the subheading of the
following parameters: -
Efficiency
The most efficient technique for the protection of the data
base is setting a strong password. This process does not need
any kind of excess effort from the employees of the
organization as well as the organization. This is the most cost
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
efficient technique that is used for the purpose of the
protection of the data that is present in the data centre based
on the platform of internet of things. This is because no
infrastructure is needed to b built in order to gain the security
regarding the unauthenticated access. The processing of the
data that is present in the data centre based on the platform of
internet of things stays protected from the cyber criminals.
Simplicity
The simplest method that can be used in the processing of the
storage of data is that the data that is present in the data centre
based on the platform of internet of things can be protected by
means of installing the firewall in the system. This is because
in today’s society all the networking system comes up pre
installed firewall systems. This ensures the fact that the data
that is present in the data centre based on the platform of
internet of things is protected from the imposters that are
proclaimed to be the most threat-causing element for the data
that is present in the data centre based on the platform of
internet of things.
Time saving in IOT
Time saving has been one of the most concerned topic in
today’s corporate sector. This is because the fact due to the
lack of productivity of the organization \with higher demands.
This fact leads to the case that the organization is unable to
dedicate much time for checking the robustness of the
architecture. This reason leads to the fact that the regular
updating of the software acts to be the best way to suite this
kind of strategy. This ensures the fact that the data that is
present in the data centre based on the platform of internet of
things is protected as no further measures are taken to justify
the fact that the data is always protected from the imposters in
order to check the sustainability of the processing of the data.
No extra effort or time is required for updating the software.
The software gets auto updated and the entire data base stays
protected.
Security
In terms of the security the most secured methodology that is
used for the data that is present in the data centre based on the
platform of internet of thing is the auto updating of the
software. This ensures the fact that the data stays protected as
the cyber criminals are unable to find the loop holes of the
updated versions of the database. This method ensures that the
data that is present in the data centre based on the platform of
internet of things stays protected from the imposters which
will lead to the case that the data stays protected.
The most secured and efficient methodology that must be
deployed to the data that is present in the data centre based on
the platform of internet of things is updating the software in a
regular basis. In this case of the software being updated in
regular interval of time leads t the fact that the data that is
present in the data centre based on the platform of internet of
things stays protected from the cyber criminals. This fact will
ensure that the data stays protected without keeping any track
of the entire system. This will ensure the fact that the data
stays protected without doing any hard work as the update is
automatically taken by the computing system. This technology
acts to be the only way that will ensure the fact that the cyber
criminals do not get the authentication to access the database.
This is due to the fact that the loop holes of the newly updated
and the latest versions of the software is not available. This
method acts as the most robust strategy for the protection of
the data that is present in the data centre based on the platform
of internet of things.
References
[1.] Bertino, E. (2016, June). Data security and privacy: concepts,
approaches, and research directions. In Computer Software and
Applications Conference (COMPSAC), 2016 IEEE 40th Annual (Vol. 1,
pp. 400-407). IEEE.
[2.] Bertino, E., & Ferrari, E. (2018). Big Data Security and Privacy. In A
Comprehensive Guide through the Italian Database Research over the
Last 25 Years (pp. 425-439). Springer, Cham.
[3.] Dalipi, F., & Yayilgan, S. Y. (2016, August). Security and privacy
considerations for IoT application on smart grids: Survey and research
challenges. In Future Internet of Things and Cloud Workshops
(FiCloudW), IEEE International Conference on (pp. 63-68). IEEE.
[4.] Hahn, J. (2017). Security and privacy for location services and the
internet of things. Library Technology Reports, 53(1), 23.
[5.] Hancke, G. P., & Markantonakis, K. (Eds.). (2017). Radio Frequency
Identification and IoT Security: 12th International Workshop, RFIDSec
2016, Hong Kong, China, November 30--December 2, 2016, Revised
Selected Papers (Vol. 10155). Springer.
[6.] Hu, F. (2016). Security and privacy in Internet of things (IoTs): Models,
Algorithms, and Implementations. CRC Press.
[7.] Kraijak, S., & Tuwanut, P. (2015). A survey on IoT architectures,
protocols, applications, security, privacy, real-world implementation and
future trends.
[8.] Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications,
investments, and challenges for enterprises. Business Horizons, 58(4),
431-440.
[9.] Li, S., & Da Xu, L. (2017). Securing the internet of things. Syngress.
[10.] Maras, M. H. (2015). Internet of Things: security and privacy
implications. International Data Privacy Law, 5(2), 99.
[11.] O’Neill, M. (2016). Insecurity by design: Today’s IoT device security
problem. Engineering, 2(1), 48-49.
[12.] Oravec, J. A. (2017, July). Emerging “cyber hygiene” practices for the
Internet of Things (IoT): Professional issues in consulting clients and
educating users on IoT privacy and security. In Professional
Communication Conference (ProComm), 2017 IEEE International (pp.
1-5). IEEE.
[13.] Premnath, S. N., & Haas, Z. J. (2015). Security and privacy in the
internet-of-things under time-and-budget-limited adversary model. IEEE
Wireless Communications Letters, 4(3), 277-280.
[14.] Roy, S., & Manoj, B. S. (2016). IoT enablers and their security and
privacy issues. In Internet of Things (IoT) in 5G Mobile
Technologies (pp. 449-482). Springer, Cham.
[15.] Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted iot-based
scada systems security: A review of the state of the art and future
challenges. IEEE Access, 4, 1375-1384.
[16.] Zhou, W., & Piramuthu, S. (2014, June). Security/privacy of wearable
fitness tracking IoT devices. In Information Systems and Technologies
(CISTI), 2014 9th Iberian Conference on(pp. 1-5). IEEE.
protection of the data that is present in the data centre based
on the platform of internet of things. This is because no
infrastructure is needed to b built in order to gain the security
regarding the unauthenticated access. The processing of the
data that is present in the data centre based on the platform of
internet of things stays protected from the cyber criminals.
Simplicity
The simplest method that can be used in the processing of the
storage of data is that the data that is present in the data centre
based on the platform of internet of things can be protected by
means of installing the firewall in the system. This is because
in today’s society all the networking system comes up pre
installed firewall systems. This ensures the fact that the data
that is present in the data centre based on the platform of
internet of things is protected from the imposters that are
proclaimed to be the most threat-causing element for the data
that is present in the data centre based on the platform of
internet of things.
Time saving in IOT
Time saving has been one of the most concerned topic in
today’s corporate sector. This is because the fact due to the
lack of productivity of the organization \with higher demands.
This fact leads to the case that the organization is unable to
dedicate much time for checking the robustness of the
architecture. This reason leads to the fact that the regular
updating of the software acts to be the best way to suite this
kind of strategy. This ensures the fact that the data that is
present in the data centre based on the platform of internet of
things is protected as no further measures are taken to justify
the fact that the data is always protected from the imposters in
order to check the sustainability of the processing of the data.
No extra effort or time is required for updating the software.
The software gets auto updated and the entire data base stays
protected.
Security
In terms of the security the most secured methodology that is
used for the data that is present in the data centre based on the
platform of internet of thing is the auto updating of the
software. This ensures the fact that the data stays protected as
the cyber criminals are unable to find the loop holes of the
updated versions of the database. This method ensures that the
data that is present in the data centre based on the platform of
internet of things stays protected from the imposters which
will lead to the case that the data stays protected.
The most secured and efficient methodology that must be
deployed to the data that is present in the data centre based on
the platform of internet of things is updating the software in a
regular basis. In this case of the software being updated in
regular interval of time leads t the fact that the data that is
present in the data centre based on the platform of internet of
things stays protected from the cyber criminals. This fact will
ensure that the data stays protected without keeping any track
of the entire system. This will ensure the fact that the data
stays protected without doing any hard work as the update is
automatically taken by the computing system. This technology
acts to be the only way that will ensure the fact that the cyber
criminals do not get the authentication to access the database.
This is due to the fact that the loop holes of the newly updated
and the latest versions of the software is not available. This
method acts as the most robust strategy for the protection of
the data that is present in the data centre based on the platform
of internet of things.
References
[1.] Bertino, E. (2016, June). Data security and privacy: concepts,
approaches, and research directions. In Computer Software and
Applications Conference (COMPSAC), 2016 IEEE 40th Annual (Vol. 1,
pp. 400-407). IEEE.
[2.] Bertino, E., & Ferrari, E. (2018). Big Data Security and Privacy. In A
Comprehensive Guide through the Italian Database Research over the
Last 25 Years (pp. 425-439). Springer, Cham.
[3.] Dalipi, F., & Yayilgan, S. Y. (2016, August). Security and privacy
considerations for IoT application on smart grids: Survey and research
challenges. In Future Internet of Things and Cloud Workshops
(FiCloudW), IEEE International Conference on (pp. 63-68). IEEE.
[4.] Hahn, J. (2017). Security and privacy for location services and the
internet of things. Library Technology Reports, 53(1), 23.
[5.] Hancke, G. P., & Markantonakis, K. (Eds.). (2017). Radio Frequency
Identification and IoT Security: 12th International Workshop, RFIDSec
2016, Hong Kong, China, November 30--December 2, 2016, Revised
Selected Papers (Vol. 10155). Springer.
[6.] Hu, F. (2016). Security and privacy in Internet of things (IoTs): Models,
Algorithms, and Implementations. CRC Press.
[7.] Kraijak, S., & Tuwanut, P. (2015). A survey on IoT architectures,
protocols, applications, security, privacy, real-world implementation and
future trends.
[8.] Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications,
investments, and challenges for enterprises. Business Horizons, 58(4),
431-440.
[9.] Li, S., & Da Xu, L. (2017). Securing the internet of things. Syngress.
[10.] Maras, M. H. (2015). Internet of Things: security and privacy
implications. International Data Privacy Law, 5(2), 99.
[11.] O’Neill, M. (2016). Insecurity by design: Today’s IoT device security
problem. Engineering, 2(1), 48-49.
[12.] Oravec, J. A. (2017, July). Emerging “cyber hygiene” practices for the
Internet of Things (IoT): Professional issues in consulting clients and
educating users on IoT privacy and security. In Professional
Communication Conference (ProComm), 2017 IEEE International (pp.
1-5). IEEE.
[13.] Premnath, S. N., & Haas, Z. J. (2015). Security and privacy in the
internet-of-things under time-and-budget-limited adversary model. IEEE
Wireless Communications Letters, 4(3), 277-280.
[14.] Roy, S., & Manoj, B. S. (2016). IoT enablers and their security and
privacy issues. In Internet of Things (IoT) in 5G Mobile
Technologies (pp. 449-482). Springer, Cham.
[15.] Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted iot-based
scada systems security: A review of the state of the art and future
challenges. IEEE Access, 4, 1375-1384.
[16.] Zhou, W., & Piramuthu, S. (2014, June). Security/privacy of wearable
fitness tracking IoT devices. In Information Systems and Technologies
(CISTI), 2014 9th Iberian Conference on(pp. 1-5). IEEE.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.