IoT Security: Confidentiality, Integrity, Availability & Biometrics

Verified

Added on  2023/06/14

|5
|1074
|138
Homework Assignment
AI Summary
This assignment delves into various aspects of Internet of Things (IoT) security. It begins by examining the CIA triad—Confidentiality, Integrity, and Availability—in the context of ATM security, emphasizing the importance of PIN protection, transaction integrity, and continuous system uptime. The assignment calculates the number of possible PIN combinations a thief would need to try, highlighting the vulnerabilities of simple PIN-based security. It then discusses the challenges and costs associated with implementing biometric authentication systems, including issues with accuracy and the need for diverse biometric solutions. The analysis covers false positive and false negative scenarios in biometric authentication, emphasizing the potential consequences of each. Finally, the assignment addresses a ciphertext decoding using a substitution method with a given key, illustrating a basic cryptographic technique. Desklib offers this solution and many other resources for students.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: INTERNET OF THINGS 1
Internet of Things
Institution
Date
Name
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Q1.
Confidentiality
One is able to use their card’s Personal Identification Number (PIN) to securely access
their bank account through the ATM. It is normal that the PIN is secret on the framework and
furthermore during the exchange in the transmission channel.
The PIN that is used by the bank account owner must be well secured to a level which it
can never be compromised by black hats. To further ensure the security of the user, the PIN must
be encrypted in a secure transaction during authentication (Henderson, 2015).
Integrity
The ATM client envisions that the exchange that he or she is performing goes well with
no incidental changes.
The level of Integrity: The framework should dependably be right on all counts of the
cash. All withdrawals must be deducted accurately with no errors. Hence, the respectability of
exchanges must be kept since any exchange will straightforwardly influence the client.
Availability
The ATM should constantly be paying little heed to any situation that may bring it to a
pause or into a state that is not operational, but it needs to be accessible to each client always
(Henderson, 2015).
The degree of accessibility: The ATM being constantly operational and serviceable will
enhance the bank's monetary development.
Document Page
Q2.
In this scenario, the thief will have to enter a 4 digit Personal Identification Pin. In a
single digit, he can just enter a most extreme decimal of 10; that is entering either
0,1,2,3,4,5,6,7,8 or 9.
Presently, the most extreme pins he is required to enter is the same as the number of
decimals he can give in every digit in each one of the four digits. For example, if the four digit
number is WXYZ, the cheat can just give 10 conceivable decimals in each of the four digits.
That is 10 out of W, X, Y and in Z.
At long last, the aggregate number of pins required will be:
10*10*10*10 = 10000.
Q3
Using biometrics can be overwhelming in the event that you have in excess of one
individual to utilize the framework. One individual will be called each opportunity to help in
signing into the framework.
Also, biometrics can be exceptionally costly since its market is still by one means or
another cracked or fractured. One would need to buy different devices from different vendors
(Saini & Rana, 2014). Like purchasing a finger impression scanner, an iris scanner or a voice
acknowledgment structure, and other various items.
It is furthermore known that biometric information simply like some other sort of
information is put away on servers. In the event that the servers are not all around secured, they
can be powerless against assaults.
Document Page
Accuracy: Beyond any doubt, biometrics can neglect to approve the points of interest of a
man on numerous events. Numerous individuals would timid far from this and simply execute
secret word security components (these are passwords and personal identification numbers).
Approaches to counter these protests:
Biometric framework sellers and designers need to think of better methodologies for
using biometrics. For example, they should actualize a biometric framework that takes into
account the enlistment of a few people into a single framework. This will help in disposing of the
issue of getting out a single individual to do the validation each other time.
Sellers should now broaden into giving undeniable and diversified biometric frameworks
to customers. One merchant ought to have the capacity to give a fingerprint reader, an iris
scanner and a voice acknowledgment framework keeping in mind the end goal to decrease the
expenses.
Q4
A False Positive Situation is a point at which an unauthenticated client is acknowledged
yet they expected to be rejected. A false negative is a point at which the validated client is
dismissed yet he or she ought to have been acknowledged (Saini & Rana, 2014).
False negatives can be extremely awful when for example, where biometrics is used as
the fundamental technique for confirmation for getting into any asset preface. A false negative in
this manner and this circumstance implies that a person who ought to be permitted to get into the
premise will be denied access. This, in this way, implies any benefit upkeep won't be done as no
one will be verified by the framework.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Q5
Decoding content by utilizing substitution is genuinely simple. With this technique,
diverse movements are utilized to conceal the letter conveyance. A given move is used in each
letter of the content. From that point, a catchphrase is rehashed severally as required to
accomplish comparable length. In our instance, the key provided was 234. So for each letter in
the ciphertext, we move as indicated by the key 234. The shifts are shown as below:
NTJ WKH XKA MKW WUJ JYZ TXM WKX ZKU HE
234 234 234 234 234 234 234 234 234 23
PWN YNL ZME OMA AXN LBD VAQ YNB BNY JH
The letters are shifted to the front as indicated by the 234 key. On the off chance that the
letter is N for example, its plain content is moved twice; that is through O and getting to letter P,
therefore making its plain content P. The same is rehashed for different letters.
With this, the last unscrambled message subsequently progresses toward becoming:
PWNYNLZMEOMAAXNLBDVAQYNBBNYJH
References
Henderson, A. (2015). The CIA Triad: Confidentiality, Integrity, Availability.
Greve, D. N., & Fischl, B. (2017). False positive rates in surface-based anatomical
analysis. NeuroImage.
Saini, R., & Rana, N. (2014). Comparison of various biometric methods. International Journal
of Advances in Science and Technology, 2(1), 24-30.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]