Internet of Things (IoT) Security Issues and Solutions Analysis Report
VerifiedAdded on 2020/04/07
|8
|1948
|40
Report
AI Summary
This report provides a comprehensive overview of the security issues plaguing the Internet of Things (IoT). It begins by defining the challenges of IoT security and highlights the skepticism surrounding the technology due to its vulnerabilities. The report summarizes two research papers on IoT security, focusing on protection of business and personal information, and the challenges of network connectivity and long lifecycles. It then identifies hardware issues, such as processor limitations and power consumption, as significant factors impacting IoT security. The impact of these issues, including unpatched systems and weak passwords, are discussed, and the importance of security considerations during product design is emphasized. The report concludes by offering important lessons, including the need for robust testing frameworks across device ranges, capacity and latency considerations, and thorough manufacturing tests. It stresses the importance of proactive security measures for both manufacturers and users. This report aims to address the security concerns from IoT and how it can be addressed.

RUNNING HEAD: INTERNET OF THINGS (IOT): SECURITY ISSUES AND
SOLUTIONS 1
INTERNET OF THINGS (IOT): SECURITY ISSUES AND SOLUTIONS
Student Name
Institute Name
SOLUTIONS 1
INTERNET OF THINGS (IOT): SECURITY ISSUES AND SOLUTIONS
Student Name
Institute Name
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

INTERNET OF THINGS (IOT): SECURITY ISSUES AND SOLUTIONS 2
Contents
Description of the challenge.......................................................................................................3
Summary of two peers research paper on IoT...........................................................................3
Issues not addressed in research paper.......................................................................................5
Impact of above discussed issues...............................................................................................5
Important lessons.......................................................................................................................6
Reference....................................................................................................................................8
Contents
Description of the challenge.......................................................................................................3
Summary of two peers research paper on IoT...........................................................................3
Issues not addressed in research paper.......................................................................................5
Impact of above discussed issues...............................................................................................5
Important lessons.......................................................................................................................6
Reference....................................................................................................................................8

INTERNET OF THINGS (IOT): SECURITY ISSUES AND SOLUTIONS 3
Description of the challenge
The concept of Internet of Things or IoT has received a lot of hype in last decade especially
for its scope of implementation. Right from the starting of 2015, there are number of experts
that have claimed that they year will existential time for this concept. At the same time, the
overall development is sluggish with poor growth owing to IoT safety that has resulted in
doubts. There is a wave in the society to prove that there are a lot flaws in the connecting
each document with internet. People are obviously very sceptic about it however, there is lack
of awareness as well (Ahlmeyer & Chircu, 2016). Challenges of Internet of Things or IoT
are real and should be addressed first. With time, it has proved that any kind of emerging
technology has faced a fair amount of issues. Issues in IoT security are reality since it must
not be discouraged people from growing the IoT applications.
As a part of development process, any kind of IoT based applications with security as well as
testing framework plays a significant part. To create a more secured as well as attack immune
internet of things helps in enabling the devices as well as application. The report will address
security concerns from IoT and how it can be addressed (Botta et al, 2016).
Summary of two peers research paper on IoT
Research paper 1
The concept of IoT based security is very like mobile safety which consist of the overall
protection of business information as well as personal which can be stored, transmitted and
collected from number of devices connects with the internet. This consist of the protection
from any kind of malware based threats which has no authority or power to access the device.
There three important themes that are present in the academic paper and practitioner
investigated for number of IoT related security analysis (Ahlmeyer & Chircu, 2016). Firstly,
it is important to have call to action based documents that highlight it as the security concern
Description of the challenge
The concept of Internet of Things or IoT has received a lot of hype in last decade especially
for its scope of implementation. Right from the starting of 2015, there are number of experts
that have claimed that they year will existential time for this concept. At the same time, the
overall development is sluggish with poor growth owing to IoT safety that has resulted in
doubts. There is a wave in the society to prove that there are a lot flaws in the connecting
each document with internet. People are obviously very sceptic about it however, there is lack
of awareness as well (Ahlmeyer & Chircu, 2016). Challenges of Internet of Things or IoT
are real and should be addressed first. With time, it has proved that any kind of emerging
technology has faced a fair amount of issues. Issues in IoT security are reality since it must
not be discouraged people from growing the IoT applications.
As a part of development process, any kind of IoT based applications with security as well as
testing framework plays a significant part. To create a more secured as well as attack immune
internet of things helps in enabling the devices as well as application. The report will address
security concerns from IoT and how it can be addressed (Botta et al, 2016).
Summary of two peers research paper on IoT
Research paper 1
The concept of IoT based security is very like mobile safety which consist of the overall
protection of business information as well as personal which can be stored, transmitted and
collected from number of devices connects with the internet. This consist of the protection
from any kind of malware based threats which has no authority or power to access the device.
There three important themes that are present in the academic paper and practitioner
investigated for number of IoT related security analysis (Ahlmeyer & Chircu, 2016). Firstly,
it is important to have call to action based documents that highlight it as the security concern
You're viewing a preview
Unlock full access by subscribing today!

INTERNET OF THINGS (IOT): SECURITY ISSUES AND SOLUTIONS 4
and those using IoT devices must carefully pay some attention on security related issues.
Secondly, the technical part of the document also says that can be analyse IoT threats of
security and focus on answers as how it can be solved with security challenges impacting
IoT. Thirdly, there are number of legal based foundations documents that look at the security
as well as privacy regulations along with laws and their overall application to IoT.
Research paper 2
IoT Security
IoT System Security Issues and Solution Approaches
Devices with no communication activity at all are now can be connected easily with nearby
network with the help of IoT systems. These kinds of systems also help in discovering the
elements that were unseen previously and had also provided new kind of insights. When data
was collected through varied connected machineries were analysed in proper manner with
new base of information. Such characteristics make the function IoT very promising
technique for elevated level of effectiveness by decreasing the overall cost or rise in the level
of sales (Tanaka et al, 2016). But the discussion is also based on security threats in IoT
activities, the IoT accelerated consortium along with collaborative program with different
people from industry has also underscored the requirement for calculating the base for
handling following three challenges: -
1. Rise in the number of network connected with IoT devices
2. The challenge of perfect surveillance with manual guide
3. Long life cycle
and those using IoT devices must carefully pay some attention on security related issues.
Secondly, the technical part of the document also says that can be analyse IoT threats of
security and focus on answers as how it can be solved with security challenges impacting
IoT. Thirdly, there are number of legal based foundations documents that look at the security
as well as privacy regulations along with laws and their overall application to IoT.
Research paper 2
IoT Security
IoT System Security Issues and Solution Approaches
Devices with no communication activity at all are now can be connected easily with nearby
network with the help of IoT systems. These kinds of systems also help in discovering the
elements that were unseen previously and had also provided new kind of insights. When data
was collected through varied connected machineries were analysed in proper manner with
new base of information. Such characteristics make the function IoT very promising
technique for elevated level of effectiveness by decreasing the overall cost or rise in the level
of sales (Tanaka et al, 2016). But the discussion is also based on security threats in IoT
activities, the IoT accelerated consortium along with collaborative program with different
people from industry has also underscored the requirement for calculating the base for
handling following three challenges: -
1. Rise in the number of network connected with IoT devices
2. The challenge of perfect surveillance with manual guide
3. Long life cycle
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

INTERNET OF THINGS (IOT): SECURITY ISSUES AND SOLUTIONS 5
Issues not addressed in research paper
Hardware issues: - right from the starting the concept of IoT or Internet of Things based
hardware has always an issue. With much hype and immediate interest in IoT machineries
like chipmaker like ARM as well as Intel are forcing the processor for elevated level of
security with new generation and realistic scene that doesn’t look closer to security gap. The
issue is with modern level architecture for the chips that made especially for IoT devices and
the prices will also go up and make it costlier (Gubbi et al, 2013). The complex design will
need more power for battery which is an issue for IoT applications. There are number of
affordable kind wearable with IoT devices that won’t utilise such kind of chips means that
there is requirement for better kind approach.
Impact of above discussed issues
One crucial factors are that is based on the concept of networking appliances and there are
other devices is new, security is not always about prioritizing during design of the products.
IoT products are usually have unpatched and old operating systems as well as software. In
addition, the end user fails to transform the default kind of passwords on smart devices and
normally don’t select a strong password. The IoT based devices are provided with distinct
kind of identifiers and the capacity to transfer data for network (Jing et al, 2014). The already
embedded sensor devices are utilised in industrial communication called as machine to
machine with smart energy based grids, home as well as building automation with vehicle
communication and wearable devices and other devices for computing for most of
communication in IoT. There are number of vulnerabilities that frightening enough to found
IoT devices. Thus, the system bought IoT security in addition to the fore.
Producers and the users can connect with device that must spend time and try to understand
the devices can collect data and information is shared as well as with whom and how data is
received. Moreover, when the data is stored is crucial and it includes the stringent for the
Issues not addressed in research paper
Hardware issues: - right from the starting the concept of IoT or Internet of Things based
hardware has always an issue. With much hype and immediate interest in IoT machineries
like chipmaker like ARM as well as Intel are forcing the processor for elevated level of
security with new generation and realistic scene that doesn’t look closer to security gap. The
issue is with modern level architecture for the chips that made especially for IoT devices and
the prices will also go up and make it costlier (Gubbi et al, 2013). The complex design will
need more power for battery which is an issue for IoT applications. There are number of
affordable kind wearable with IoT devices that won’t utilise such kind of chips means that
there is requirement for better kind approach.
Impact of above discussed issues
One crucial factors are that is based on the concept of networking appliances and there are
other devices is new, security is not always about prioritizing during design of the products.
IoT products are usually have unpatched and old operating systems as well as software. In
addition, the end user fails to transform the default kind of passwords on smart devices and
normally don’t select a strong password. The IoT based devices are provided with distinct
kind of identifiers and the capacity to transfer data for network (Jing et al, 2014). The already
embedded sensor devices are utilised in industrial communication called as machine to
machine with smart energy based grids, home as well as building automation with vehicle
communication and wearable devices and other devices for computing for most of
communication in IoT. There are number of vulnerabilities that frightening enough to found
IoT devices. Thus, the system bought IoT security in addition to the fore.
Producers and the users can connect with device that must spend time and try to understand
the devices can collect data and information is shared as well as with whom and how data is
received. Moreover, when the data is stored is crucial and it includes the stringent for the

INTERNET OF THINGS (IOT): SECURITY ISSUES AND SOLUTIONS 6
privacy settings that requires to be activated in accompanying the software. Just like any
other device, it is very important to implement the upgraded software and patch the
vulnerabilities as well as make sure that all kinds of application related with the computer
device is timely and properly updated with any harm occurs (Li & Da Xu, 2017). It is also
important to note that a hacker can hack the system at any time and they can do so by being
from remotest of place.
Important lessons
The best method to reduce the hardware based security challenges for IoT is to have strong
testing framework in various places. Following is the detailed discussion: -
1. Device range: there is coverage based networks with IoT devices is highly paramount.
One need to be very particular about the range based metrics for the application. For
example, while using Zigbee based technology that helps in empowering the device
network that one will have to measure about number of repeaters that one need to
settle to give range of communication range for the machineries. However, it is also
important to understand that one cannot put any number on repeater blindly since rise
in number of repeaters the ability of the system reduction (Sicari et al, 2015). Thus,
device range also evaluates will enable people to find the right spot where one can
increase the range without reaching the breaking point.
2. Capacity and latency: the capacity is based on bytes per second also called as bps and
it handles the speed of the network while the concept of latency also denotes the
complete time spent on transferring the data that exist between the endpoint of
application. It is important that developers always look for methods to rise the
capacity of the IoT application to boost the level of performance. Issues in several
factors is inversely proportionate and it resulted in improving the level of degrades
privacy settings that requires to be activated in accompanying the software. Just like any
other device, it is very important to implement the upgraded software and patch the
vulnerabilities as well as make sure that all kinds of application related with the computer
device is timely and properly updated with any harm occurs (Li & Da Xu, 2017). It is also
important to note that a hacker can hack the system at any time and they can do so by being
from remotest of place.
Important lessons
The best method to reduce the hardware based security challenges for IoT is to have strong
testing framework in various places. Following is the detailed discussion: -
1. Device range: there is coverage based networks with IoT devices is highly paramount.
One need to be very particular about the range based metrics for the application. For
example, while using Zigbee based technology that helps in empowering the device
network that one will have to measure about number of repeaters that one need to
settle to give range of communication range for the machineries. However, it is also
important to understand that one cannot put any number on repeater blindly since rise
in number of repeaters the ability of the system reduction (Sicari et al, 2015). Thus,
device range also evaluates will enable people to find the right spot where one can
increase the range without reaching the breaking point.
2. Capacity and latency: the capacity is based on bytes per second also called as bps and
it handles the speed of the network while the concept of latency also denotes the
complete time spent on transferring the data that exist between the endpoint of
application. It is important that developers always look for methods to rise the
capacity of the IoT application to boost the level of performance. Issues in several
factors is inversely proportionate and it resulted in improving the level of degrades
You're viewing a preview
Unlock full access by subscribing today!

INTERNET OF THINGS (IOT): SECURITY ISSUES AND SOLUTIONS 7
than other. There are data intensive devices as well which can be applied and tested
thoroughly for right balance in capacity and latency (Farooq et al, 2015).
3. Manufacturing test: it is rare that company build IoT device right from the starting on
their own. Many time, companies will use elements and modules that are
manufactured by other in the application. Evaluation of such modules on your own for
right kind of functioning is very crucial. The produces always assemble the line based
testing from their end however one must properly verify it beforehand (Roman et al,
2013). In addition, while putting all kind of modules at one place or on a board based
evaluation is needed to ensure that there are no mistakes that are introduced due to
wiring. The evaluation of manufacturability is crucial to ensure the applications that
can work as per its intentions.
than other. There are data intensive devices as well which can be applied and tested
thoroughly for right balance in capacity and latency (Farooq et al, 2015).
3. Manufacturing test: it is rare that company build IoT device right from the starting on
their own. Many time, companies will use elements and modules that are
manufactured by other in the application. Evaluation of such modules on your own for
right kind of functioning is very crucial. The produces always assemble the line based
testing from their end however one must properly verify it beforehand (Roman et al,
2013). In addition, while putting all kind of modules at one place or on a board based
evaluation is needed to ensure that there are no mistakes that are introduced due to
wiring. The evaluation of manufacturability is crucial to ensure the applications that
can work as per its intentions.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

INTERNET OF THINGS (IOT): SECURITY ISSUES AND SOLUTIONS 8
Reference
Ahlmeyer, M., & Chircu, A. M. (2016). SECURING THE INTERNET OF THINGS: A
REVIEW. Issues in Information Systems, 17(4).
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the
security concerns of internet of things (IoT). International Journal of Computer
Applications, 111(7).
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A
vision, architectural elements, and future directions. Future generation computer
systems, 29(7), 1645-1660.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of
things: Perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Li, S., & Da Xu, L. (2017). Securing the Internet of Things. Syngress.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and
privacy in distributed internet of things. Computer Networks, 57(10), 2266-2279.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust
in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
Tanaka, S., Fujishima, K., Mimura, N., Dr. Eng.,Ohashi, T.,& Tanaka, M. (2016). IoT
SECURITY IoT SYSTEM SECURITY ISSUES AND SOLUTION APPROACHES.
Reference
Ahlmeyer, M., & Chircu, A. M. (2016). SECURING THE INTERNET OF THINGS: A
REVIEW. Issues in Information Systems, 17(4).
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the
security concerns of internet of things (IoT). International Journal of Computer
Applications, 111(7).
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A
vision, architectural elements, and future directions. Future generation computer
systems, 29(7), 1645-1660.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of
things: Perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Li, S., & Da Xu, L. (2017). Securing the Internet of Things. Syngress.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and
privacy in distributed internet of things. Computer Networks, 57(10), 2266-2279.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust
in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
Tanaka, S., Fujishima, K., Mimura, N., Dr. Eng.,Ohashi, T.,& Tanaka, M. (2016). IoT
SECURITY IoT SYSTEM SECURITY ISSUES AND SOLUTION APPROACHES.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.