logo

The Use Internet of Things

47 Pages11521 Words119 Views
   

Added on  2020-03-04

The Use Internet of Things

   Added on 2020-03-04

ShareRelated Documents
Running head: PRIVACY AND SECURITY ISSUES IN IOTPrivacy and Security issues in IoT: A Systematic literature reviewName of the Student:Name of the University:Author note:
The Use Internet of Things_1
1PRIVACY AND SECURITY ISSUES IN IOTAbstractThe use internet of things though is expected to be potential, major concern is the major invasionfor the privacy and security. The report is a systematic review of literature for security andprivacy preserving solutions, extracted from the media and literature. The same is expected to bemotivating to develop solution of the security and privacy, by the end users. The assumption’svalidity has to be proved, as it could not be assumed simply that the end users would have theconsistent will to the solutions engagement. This topic can also be a potential source for thefuture research.
The Use Internet of Things_2
2PRIVACY AND SECURITY ISSUES IN IOTAcknowledgementConducting the research study enhances me to improve my knowledge as well as analyticalability. It gave me the chance to face challenges all the while and conquer them. It will not bepossible to conduct the research without the significant direction of my professors, companionsand every one of who have added to this advancing knowledge. I also want to thank mysupervisor __________ for helping me in my research work as well as give their full supportduring the research process. I would also thank all the participants within this study for givingtheir time and helping me out. From the support of people, I am inspired to work on the researchin this subject area. Finally, thank you to my family members those help me and encourage me.Thank You.
The Use Internet of Things_3
3PRIVACY AND SECURITY ISSUES IN IOTTable of ContentsChapter 1: Introduction........................................................................................................71.1 Background of the study............................................................................................71.2 Research Aims and Objectives..................................................................................81.2.1 Aims of the study....................................................................................................81.2.2 Objectives of the study...........................................................................................81.3 Research Questions....................................................................................................81.4 Problem Statement.....................................................................................................91.5 Rationale of the study................................................................................................91.6 Structure of the study...............................................................................................101.7 Related works..........................................................................................................11Figure 1: Security and privacy in IOT.......................................................................13Chapter 2: Research Methodology....................................................................................152.1 Preface.....................................................................................................................152.2 The process of methodology....................................................................................152.2.1 Planning the review..............................................................................................152.2.2 Reviewing objectives as well as research questions.............................................152.3 Search sources.........................................................................................................162.4 Search strategy.........................................................................................................172.5 Inclusion and exclusion criteria...............................................................................182.6 Conducting the review.............................................................................................192.7 Methodological quality assessment.........................................................................192.8 Ethical considerations..............................................................................................202.9 Time horizons..........................................................................................................202.10 Summary................................................................................................................20
The Use Internet of Things_4
4PRIVACY AND SECURITY ISSUES IN IOTChapter 3: Findings and analysis.......................................................................................213.1 Preface.....................................................................................................................213.2 Qualitative analysis..................................................................................................21Figure 3: Use of IOT..................................................................................................22Figure 2: Barriers in IOT...........................................................................................25Figure 4: Trends of IOT security...............................................................................28Figure 5: IOT security challenges..............................................................................343.3 Summary..................................................................................................................36Chapter 4: Conclusion and recommendations...................................................................384.1 Conclusion...............................................................................................................384.2 Linking with objective.............................................................................................384.3 Recommendations....................................................................................................394.4 Limitation and future scope.....................................................................................41References......................................................................................................................42Appendix........................................................................................................................48Table 1: Gantt chart...................................................................................................48
The Use Internet of Things_5
5PRIVACY AND SECURITY ISSUES IN IOTList of table and figuresFigure 1: Security and privacy in IOT...........................................................................................13Figure 2: Barriers in IOT...............................................................................................................16Figure 3: Use of IOT......................................................................................................................28Figure 4: Trends of IOT security...................................................................................................31Figure 5: IOT security challenges..................................................................................................34Table 1: Gantt chart.......................................................................................................................48
The Use Internet of Things_6
6PRIVACY AND SECURITY ISSUES IN IOTChapter 1: Introduction1.1 Background of the studyUse of internet of things becomes an integral part of daily life. The forces driving it aswell as the advantages motivating it are increasingly numerous as a large number oforganization, industries as well as technologies catch the IoT big. An IoT Day – Smart home getsready by itself, for supporting the daily routine of the IoT user (Sicari et al. 2015). The alarmgets activated and locking of the door by the Smartphone (Arias et al. 2015). Milk would beadded in the list, by the refrigerator to the regular list of the store shopping, for the parcels to getready to be picked, while on the way from the work to the home. The car is driven by itself, withthe help of numerous sensors embedded. It automatically directs itself to the spot of parking,detected by it from the applications networked by the notifications received from the parking baysensors of the city.priHowever, all advantages of internet of things have brought huge risks of privacy loss aswell as security issues (Da Xu et al. 2014). The basic security weakness of internet of things isincreasing as the number of devices staying behind the firewall of network. As there are a largenumber of devices attached with the process, there might be chances for hacking. On the otherhand, as internet of things applications usually collects huge number of data, data retrieval aswell as processing is integral part of entire IoT environment. In this case, most of the data ispersonal as well as requires to be protected with the help of the encryption.
The Use Internet of Things_7
7PRIVACY AND SECURITY ISSUES IN IOT1.2 Research Aims and Objectives1.2.1 Aims of the studyThe research has aims to identify the privacy as well as security issues involved with theuse of internet of things. In order to address the issues, factors and challenge to minimize theissues are achieved in the present research. The IoT day is going to make the dreamful days to bematerialized in the very near future. The research paper and report contributes the privacy relatedresearch of an existing IoT as an overview, for identifying the focusing areas and highlightingthe areas, demanding higher priority of attention. 1.2.2 Objectives of the studyThe objectives of the research can be explained as followed. To find out the privacy as well as security issues included in the use of internet ofthingsTo identify and evaluate the factors responsible for creating privacy as well assecurity issues involved with internet of thingsTo address the challenges faced while minimizing the issues in IoTTo recommend solutions for overcoming the challenges in IoT1.3 Research QuestionsThe research questions can be listed as followed.What are the privacy and security issues involved with applications of internet ofthings?What are the factors create privacy and security issues in internet of things? What are the challenges faced while removing the security issues in IoT?
The Use Internet of Things_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Blockchain in IoT
|76
|20208
|189

RFID and Mobile Fusion for Authenticated ATM transaction
|111
|27574
|62

Role of Motivation in Organization
|77
|15797
|174

Case Study on Automobile Industry - Fiat Chrysler
|40
|14236
|275

Research Report on Safety Management System
|70
|16034
|30

Tourism Assignment: Impact of Online Technology
|40
|7941
|458