Report: Emerging Threats and Countermeasures in IoT Security

Verified

Added on  2023/01/11

|4
|866
|38
Report
AI Summary
This report provides an analysis of emerging threats and countermeasures in the context of Internet of Things (IoT) security. It examines various research papers and articles that address cybersecurity challenges, vulnerabilities, and potential solutions within the IoT landscape. The report highlights key issues such as the increasing number of cyber threats, data privacy concerns, and the need for robust security measures in smart homes and other IoT applications. It discusses the limitations of current approaches, including the lack of legal solutions and the focus on technological measures over physical device security. The report also explores the impact of new IoT features on security and privacy, emphasizing the need for comprehensive strategies to address evolving threats. The analysis covers a range of perspectives, from the challenges faced by Australia in adopting technology to the importance of assessing security vulnerabilities using methodologies like OCTAVE. The report aims to provide a comprehensive overview of the current state of IoT security and offers insights into the ongoing efforts to develop effective countermeasures.
Document Page
Emerging Threats and counter measurements
Name
Institution
Professor
Course
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abomhara, M. & Koien, G. (2015). Cybersecurity and the internet of things: vulnerabilities,
threats, intruders and attacks. Journal of Cybersecurity and Mobility, 4(1), 65-88.
The authors outline success and challenges facing the Internet of Things (IoT). Increase
in cyber threats, attacks and services has been a challenge in the technology world. It is notable
that cyber threats, intruders and vulnerabilities are significant issues affecting technology
actualization. Despite the authors’ contribution to IoT, the article does not outline a possible
legal solution to the cybersecurity challenges.
Ahmed, A. W., Ahmed, M. M., Khan, O. A., & Shah, M. A. (2017). A comprehensive analysis
on the security threats and their countermeasures of IoT. Int. J. Adv. Comput. Sci. Appl.
(“IJACSA”), 8(7), 489-501.
The article focuses on pervasive networks which are only meant to provide the required
IoT services by either analyzing or processing sets of data. The authors assert that IoT has shown
tremendous progress by creating complex interconnections of devices. The article highlights
major cybersecurity issues, possible solutions as well as future directions on IoT security.
Important to note is that authors focus on data security and privacy besides infrastructure
concerns.
Ali, B., & Awad, A. (2018). Cyber and physical security vulnerability assessment for IoT-based
smart homes. Sensors, 18(3), 817.
The authors evaluate the development and implementation of smart homes through the
use of IoT technology. The article pinpoints out that IoT technology is becoming a game changer
in the application of smart homes due its efficiency and convenience. As much as technology
improves quality of life, the article discusses security lapses such as authenticity, confidentiality,
and data integrity. The authors use OCTAVE methodology to assess security vulnerabilities in
smart homes.
Document Page
Austin, G., & Slay, J. (2016). Australia’s response to advanced technology threats: An agenda
for the next government. UNSW Canberra, Canberra, Australian Centre for Cybersecurity
Discussion Paper, 3.
The article focuses on Australia adoption of technology in various fields such as
healthcare and commerce. The government of Australian understands technology faces security
breaches which require legal intervention. The federal government has moved with speed to
implement new security policies that address cybersecurity issues. To achieve international
cybersecurity standards, Australia has embarked on education programs. Beside legal measures,
technological solutions have not been addressed adequately.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis of the security
concerns of the internet of things (IoT). International Journal of Computer Applications,
111(7).
The article evaluates researches that have been underway for almost a decade on IoT and
resolutions achieved. There is a consensus that IoT has reached significant milestones, but
security and privacy of data remain a perennial challenge. The article is well articulate on
security issues and problems associated with IoT, its architecture and confidentiality of data
collected from different environments. The main focus has been on technological measures
without much concerns on physical device security.
Zhou, W., Jia, Y., Peng, A., Zhang, Y., & Liu, P. (2018). The effect of IoT new features on
security and privacy: New threats, existing solutions, and challenges yet to be solved.
IEEE Internet of Things Journal.
The article describes IOT as a new feature in the field of technology that comes with its
security and privacy benefits as well as lapses. Despite intensive research on IoT and its security
parameters, most of the threats remain unsolved. The article focus is on IoT new features,
available solutions and its unresolved security challenges. The authors capitalise only new
Document Page
features and possible solutions without evaluating some of the already existing cybersecurity
issues.
Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things:
threats and challenges. Security and Communication Networks, 7(12), 2728-2742.
The authors assert that the paradigm of IoT envisions for pervasive connections and
communication of interconnected devices. It mainly focuses on data privacy issues as well as IoT
new opportunities that can change human life. It encompasses extensive data collection and
tracking from different technology environments which in turn poses unique security challenges
such as data privacy. The article is quite distinctive in exploring new security features in IoT
without examining data security measures.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon