Literature Review: Security, Privacy, and IoT Applications

Verified

Added on  2023/01/20

|9
|2313
|74
Literature Review
AI Summary
This literature review delves into the multifaceted world of the Internet of Things (IoT), examining its evolution as an emerging technology and its widespread applications across various sectors. The review highlights critical security issues, including device hacking, data breaches, and privacy concerns related to data sharing and vulnerabilities in smart home environments. It explores various security measures, such as channel frequency changes to thwart jamming attacks, traffic encryption, and the implementation of robust security protocols. The paper discusses the importance of building security by default features, coordinating software updates, and ensuring secure communication channels to protect IoT devices. Furthermore, it emphasizes the need for inter-device communication and the development of best practices and guidelines to ensure the secure and effective utilization of IoT technologies. The review concludes by underscoring the importance of implementing proper security applications for the continued development and advancement of IoT.
Document Page
Running head: INTERNET OF THINGS
LITERATURE REVIEW ON INTERNET OF THINGS
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
INTERNET OF THINGS
Table of Contents
Literature Review............................................................................................................................2
IoT- an emerging technology.......................................................................................................2
Security issues faced with IoT.....................................................................................................2
Security offered by IoT................................................................................................................3
Privacy concern related to IoT.....................................................................................................4
IoT security measures..................................................................................................................5
Protecting IoT devices.................................................................................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Document Page
2
INTERNET OF THINGS
Literature Review
IoT- an emerging technology
The main aim of this paper is to prepare a literature review on the topic IoT. IoT is one of
the most emerging technologies that are being developed for the purpose of making the
surroundings smart. With the implementation of IoT it became easy to interact with everyone.
Internet of tings has become the extension of internet connectivity and allows every physical
device to interact with each other. IoT has found great importance in healthcare industry, in
educational fields and in the fields of automobiles. This is basically referred to the interrelated
computing devices that have the potential to share data over a network without human
interference.
Security issues faced with IoT
Internet of things is basically a technology that provides an effective way of interacting
with the devices. Nowadays IoT applications are being implemented within houses for making it
smart house. However while deploying IoT within a particular device it is observed that there
arises a huge number security related concerns. Several articles have stated that there are huge
gap in the IoT technology when it comes on security. With the continuous lack in security it is
observed that the technology is facing serious operational issues. These issues are high profile
attacks, device hacking or mass exploitation of the device. Thus it becomes essential to have a
proper security evaluation that will ensure proper safety towards the home based IoT devices.
Apart from this there are several researchers who came up with new thoughts for standardizing
the IoT application however none of them agreed on a particular solution. Thus it becomes
important to have a better knowledge about the impacts of using IoT in home based applications.
Document Page
3
INTERNET OF THINGS
Internet of things has been implemented into the mobile cloud computing so that it can provide a
better way of data processing that can be operated outside of mobile devices. Internet of things
provides better and efficient way of communicating with the people. IoT offers a wireless
communication. Over the time it is being observed that cloud computing has been integrated
with IoT for providing better communication among the devices and peoples. According to the
author Stergiou et al.,(2018), there are several opportunities achieved with the use of IoT in data
sharing. IoT has been implemented in bucket for transport and to provide a better and smart
solution. Smart power grids are also been implemented for providing more renewable resources.
This ensures that the power consumed by user gets reduced so that it can provide better benefits
towards the environment. IoT has also implemented in homes and airports for making lives
better and provides better facility towards the users.
Security offered by IoT
With the huge implementation of technology it is observed that there are several areas of
concern that are needed to be focused on. According to the author Meng et al., (2018), the
devices present within the IoT environment has the tendency to share data over internet this
makes the data vulnerable to hackers. With increase in communication and data sharing process
the chances of data breaches also increases. Several authors have showed their concern related to
the safety environment provided with information system so that they can provide better safety
towards the data stored. With the implementation of internet of tings smart homes are being
developed in such a way that it will ensure providing proper control over the home appliances.
IoT security is a major concern as there is a high need to have a proper safety towards the
connected networks and devices. According to the author Stergiou et al.,(2018), there is a need to
have a proper modeling methodology for studying the home based IoT devices. This study helps
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
INTERNET OF THINGS
in evaluating the security factors and related to the application. It becomes important to have
proper research technique that will help in the time of attacks. In this paper it is observed that
author states different method that will help in developing a better security for the home based
IoT devices. The paper has described several methodologies that help in analyzing the security
properties offered by an IoT based home devices. In addition to this the paper has also described
the mitigation, attack techniques and stakeholders related concerns.
Privacy concern related to IoT
According to the author Stergiou et al.,(2018), it becomes important to provide better
privacy towards the IoT devices so that it can ensure better facility at the time of accessing the
device. The major security and privacy challenges that are faced with smart homes includes
jamming attacks on physical layer. The main aim of jamming attack is to disrupt the
communication that is going on between the smart devices and hub. The second most effective
attack is the wireless traffic analysis on network layer. These attacks are performed so that they
can disrupt the network traffic by spoofing out the IoT data. There are high implications of these
attacks as it affects the privacy of the system from inside. The third most important and
dangerous attack that is faced by mobile applications includes the over privileged attacks. The
attacks are mainly done with the help of internet and can lead to further impact. There are an
attack that provides access to unauthorized persons that further leads to hacking and impacting
the vital security of smart homes. The major reason behind the security issues is the weak
security protocols implemented by the technology. This helps the attackers to easily get through
the system for performing malicious activities. According to the author Meng et al., (2018), there
are several errors faced by the vendors while working at the application layer that fails to provide
proper authentication mechanism towards the network. Apart from all this there is one more
Document Page
5
INTERNET OF THINGS
issue that is faced is related to spoofing attack on voice user interface. In this type of attacks an
adversary tries to fool the VUI by using pre recorded voices. This can be used for the purpose of
retrieving sensitive data related to the individual.
IoT security measures
With the growing security impacts it becomes essential to implement proper measures
that will provide better security towards the smart home. According to the author Sivaraman et
al.,(2018) thwarting a jamming attack will help in protecting the house. Whenever a jammer is
being identified outside the house it becomes important to change the channel frequency so that
it can ensure proper pre shared channel with numbers. In addition to this a jammer frequency
framework is being implemented for the purpose of having a better knowledge regarding the
chances of getting effected by a jammer. Second way that is proposed for having a better
analysis of attacks is that the traffic attack needs to be exposed within the time. An effective
approach is offered that will ensure proper eavesdropping attack within the traffic encryption. In
addition to this storing wireless standards are being implemented that will provide better
standards and a better way of encrypting the data shared over the devices using internet. ZigBee
supports 128bit AESCCM encryption mode within the network layer. This ensures maximum
security towards a device.
Protecting IoT devices
According to the author Alrawi et al., (2019), it is important to implement proper
technology that will help in having a better regulating function. This will help in protecting the
devices from further security issues and will ensure better protection towards the data. In this
paper the author has described that it is important to build a security by default feature that will
ensure proper support towards the devices. This mechanism, was found for coordinating with the
Document Page
6
INTERNET OF THINGS
software updates and will also provide better support towards the third part vendors. This will
also facilitate the user with the disclosure of vulnerabilities. It is observed that the maximum
devices are built with fairly secure communication that is divided into two different channels
when they make any communication with their users. Thus it becomes important to ensure
proper security towards the devices used. The better security ensures proper usage of the system.
Proper usage and security measures will ensure a better way of generating the features of IoT.
Conclusion
Thus from the above paper it can be concluded that there is a need of proper security
measures within the IoT devices so that they can ensure proper safety towards the data shared. It
is highly recommended to have a proper inter device communication so that the devices can have
proper trust on the IoT components. Best practices and guidelines are needed to be developed
readily so that they can be utilized at the time of communication. There are several devices that
have been developed with good practices and benefits the users with proper interaction. The
report has described the benefits and the way internets of things are used. The report has
explained the major working of IoT along with the best implications in the market. Along with
this the report has also explained about the security challenges that are faced with the use of IoT.
The last part of the paper has described the ways in which the security challenges can be
overcome. It is important for every technology to have a better control over the security aspects.
Thus it is necessary to implement proper security applications that will ensure a better
development of the technology.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
INTERNET OF THINGS
References
Alrawi, O., Lever, C., Antonakakis, M., & Monrose, F. (2019). Sok: Security evaluation of
home-based iot deployments. In Proceedings of the IEEE Symposium on Security and
Privacy (S&P). https://doi. org/10.1109/SP.
Apthorpe, N., Reisman, D., & Feamster, N. (2017). A smart home is no castle: Privacy
vulnerabilities of encrypted iot traffic. arXiv preprint arXiv:1705.06805.
Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and
forensics: Challenges and opportunities.
Davies, N., Taft, N., Satyanarayanan, M., Clinch, S., & Amos, B. (2016, February). Privacy
mediators: Helping IoT cross the chasm. In Proceedings of the 17th International
Workshop on Mobile Computing Systems and Applications (pp. 39-44). ACM.
Emami-Naeini, P., Agarwal, Y., Cranor, L. F., & Dixon, H. (2019). Exploring How Privacy and
Security Factor into IoT Device Purchase Behavior.
Gaur, A., Scotney, B., Parr, G., & McClean, S. (2015). Smart city architecture and its
applications based on IoT. Procedia computer science, 52, 1089-1094.
Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P. M., Sundarasekar, R., & Thota, C.
(2018). A new architecture of Internet of Things and big data ecosystem for secured
smart healthcare monitoring and alerting system. Future Generation Computer
Systems, 82, 375-387.
Document Page
8
INTERNET OF THINGS
Meng, Y., Zhang, W., Zhu, H., & Shen, X. S. (2018). Securing Consumer IoT in the Smart
Home: Architecture, Challenges, and Countermeasures. IEEE Wireless
Communications, 25(6), 53-59.
Sivaraman, V., Gharakheili, H. H., Fernandes, C., Clark, N., & Karliychuk, T. (2018). Smart IoT
devices in the home: Security and privacy implications. IEEE Technology and Society
Magazine, 37(2), 71-79.
Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud
computing. Future Generation Computer Systems, 78, 964-975.
Wang, J., Amos, B., Das, A., Pillai, P., Sadeh, N., & Satyanarayanan, M. (2017, June). A
scalable and privacy-aware IoT service for live video analytics. In Proceedings of the 8th
ACM on Multimedia Systems Conference (pp. 38-49). ACM.
Zeng, E., Mare, S., & Roesner, F. (2017). End user security and privacy concerns with smart
homes. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017)(pp.
65-80).
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]