Critical Analysis of IoT Security: Risks, Breaches, and Mitigation

Verified

Added on  2020/05/16

|2
|725
|35
Report
AI Summary
This report, focusing on the security aspects of the Internet of Things (IoT), begins with an abstract that introduces IoT as a network option connecting inanimate objects through sensors, while acknowledging security limitations. The report defines IoT and security breaches, detailing various attack types such as denial of service, social engineering, data theft, man-in-the-middle attacks, and botnets. A business case highlights a security breach in a wirelessly connected sniper rifle due to a default password vulnerability. The analysis emphasizes the need for stronger security measures, proposing the use of random, one-time-use default login details that users must change. The conclusion underscores the ongoing nature of security concerns and the importance of continuous testing and improvement in digital device manufacturing. The report references several sources to support its findings.
Document Page
Critical Thinking
Internet of Things
Baljinder Kaur
Abstract – Internet of Things is one of
the upcoming network options which
enables inanimate objects be connected
via a network and use of sensors. The
technology however has its own
limitations since its security can be
breached and can lead to a massive and
fatal loss of data. Nevertheless, the risk of
security breach cannot be completely
avoided but can be reduced.
Keywords – Internet of Things; Security;
Attack; Breach; Vulnerability;
I. INTRODUCTION
Internet of Things refers to a system of
interrelated computing devices that are
connected through the internet [1]. This is
done by using sensors which enable the
devices get stimulated by something in
their environment or from another device.
The device will then react by performing
another action after the stimulus is
detected or received.
II. LITERATURE
A security breach is an incident that results
in unauthorized access of data,
applications, services, networks or devices
by bypassing their underlying security
mechanisms. This occurs when an
application, individual or device accesses a
confidential, private or unauthorized
logical perimeter [2]. Therefore, a security
breach is like digital trespassing.
For Internet of Things a security breach
can be on a sensor, the network as a whole
or just a device. By attacking any part of
the system, one can elicit actions that are
different from what should happen.
There are different types of attacks that
one can launch on a system. The major
attacks on IoT are: Denial of service where
the network is made unable to perform its
usual tasks by being flooded by spam
requests, social engineering which
involves manipulating people to give up
confidential information, data and identity
theft, man-in-the-middle attack where an
attacker intercepts communication
between two systems and botnets which
are a group of systems that are combined
for remotely taking control and
distributing malware [3].
III. BUSINESS CASE
A pair of security researchers
demonstrated at a Black hat hacker
conference in 2015 how to hack a
wirelessly connected sniper rifle from a
company by the name TrackPoint. The
device allowed attackers to exploit the
vulnerabilities remotely or when connected
to the network by logging into its network
which had a default password.
Once logged in, one had administrative
access to the device. This could enable one
to completely disable the device or even
change its targets.
IV. ANALYSIS
The security breach in this case is due to
the weak password set for the device. In
this case a default password is used. As
long as someone has that password or can
guess the password and they are within the
device’s range they are able to control the
device.
To solve this issue, the company needs to
create random default login details for one
time use on each of the devices as they are
manufactured. The credentials should then
be changed by the user after they are
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
deployed. This will make it difficult for
one to guess the credentials and log into
the device’s API.
V. CONCLUSION
Security is an issue that should always be
thought about since a system is never truly
secure. It is always only a matter of time
before a vulnerability is discovered.
However, when creating or manufacturing
a digital device, it is always good to test it
to ensure it passes the basic and most
common security tests
REFERENCES
[1] A. Meola, "What is the Internet of Things (IoT)?," 19 December 2016. [Online].
Available: http://www.businessinsider.com/what-is-the-internet-of-things-definition-
2016-8?IR=T. [Accessed 1 February 2018].
[2] Techpedia, "Security Breach," 2018. [Online]. Available:
https://www.techopedia.com/definition/29060/security-breach. [Accessed 1 February
2018].
[3] L. Toms, "5 Common Cyber Attacks in the IoT - Threat Alert on a Grand Scale," 29
April 2016. [Online]. Available: https://www.globalsign.com/en/blog/five-common-
cyber-attacks-in-the-iot/. [Accessed 1 February 2018].
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]