A Comprehensive Analysis of Security in the Internet of Things

Verified

Added on  2023/06/11

|12
|555
|406
Report
AI Summary
This report provides an overview of security issues and vulnerabilities within the Internet of Things (IoT), highlighting the interconnected network of computing devices and digital machines. It outlines various applications of IoT, including wearables, smart grids, connected cars, and smart cities, while also addressing critical security concerns such as limited device capabilities, prediction and detection inefficiencies, and vulnerability management challenges. The report emphasizes the importance of secure communication channels, regular updates, authentication, authorization, and securing applications across mobile, cloud, and web platforms. Research areas like smart gadgets, IoT applications, smart home automation, connected logistics, and blockchain integration are also explored. Key vulnerabilities discussed include improper authentication, exploitable web interfaces, insecure network services, inadequate transport encryption, and privacy concerns. Security measures such as using Trusted Platform Modules (TPM), Trusted Network Connect (TNC) standards, isolating infected devices, layered security systems, and data encryption are recommended to mitigate risks and secure legacy systems with industrial control systems. The report concludes with a list of references to support the information and analysis provided.
Document Page
SECURITY OF
INTERNET OF THINGS
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION
IOT OR INTERNET OF THINGS IS REFEREED AS THE
NETWORK OF COMPUTING DEVICES, OBJECTS, DIGITAL
MACHINES AND MECHANICAL DEVICES WHICH ARE
INTERRELATED. WITHOUT THE NEED OF HUMAN TO
COMPUTER OR HUMAN O HUMAN INTERACTION,
THESE DEVICES HAVE THE POTENTIAL TO TRANSFER
INFORMATION OVER A NETWORK.
Document Page
APPLICATIONS WEARABLES
SMART GRIDS
CONNECTED CAR
CONNECTED HEALTH
INDUSTRIAL INTERNET
SMART RETAIL.
SMART CITY
Document Page
SECURITY ISSUES
LESS STORAGE, PROCESSING CAPABILITY AND MEMORY
OF DEVICES
UNABLE TO PREDICT SECURIY ISSUES
NOT ALWAYS EFFICEINT IN DETECTING INCIDENTS AND
VULBERABILITIES
UANBLE TO MANAGE VULNERABILITIES
HAVING HIGH VULNERABILITY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Continued… ENSURING A SECURE COMMUNICATION CHANNEL
MANAGING THE UPDATES ON THE DEVICES
RGULARLY
AUTHENTICATION AND AUTHORZATION PROBLEMS
SECURING THE APPLICATIONS THAT ARE PRESENT
IN THE MOBILE, CLOUD AND WEB (Gubbi et al.,
2013)
MAINTAING THE SECURITY OF DATA AND PRIVACY
Document Page
RESEARCH WORKS SMART GADJETS
IoT APPLICATIONS (Chen et al., 2014)
SMART HOME AUTOMATION
CONNECTED LOGISTICS
ASSOCIATING IT WITH BLOCKCHAIN
SMART TRAFFIC
Document Page
VULNERABILITES
IMPROPER AUTHENTICATION AND AUTHORIZATION
ISSUES
EXPLOITABLE WEB INTERFACE
NETWROK SERICES WHICH ARE NOT SECURE
NOT ENOUGH TRANSPORT ENCRYPTION
PRIVACY CONCERNS
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Continued… CLOUD INTERFACES WHICH ARE NOT SECURE
MOBILE INTERFACES WHICH ARE NOT SECURE
INADEQUATE SECURITY FEATURES (Fortino & Trunfio, 201
FIRMWARE AND SOFTWARE SAFETY ISSUES
ERASURE OF ALL PERSONAL INFORMATION
Document Page
SECURITY MEASURES
USAGE OF A TPM OR TRUSTED PLATFORM MODULE
FOR AUTHRIZATION PURPOSES
FOR CHECKING MALICIOUS FORMWARE OR
UPDATES, THE TNC OR TRUSTED NETWORK
CONNECT STANDARDS NEED TO BE CHECKED
(Balani & Hathi, 2016)
THE INFECTED DEVICES NEED TO BE ISOLATED
AND REMEDIATED WITH SECURITY PROTOCOLS
AND SOFTWARES
Document Page
Continued…
ONCE THE DEVICES ARE COMPROMISED, A LAYERED
DECURITY SYSTEM CAN MINIMIZE THE DAMAGE THE
HACKER CAN CAUSE (Theoleyre & Pang, 2013)
EVERY DEVICE SHOULD HAVE PROPER DATA
ENCRYPTION
WITH THE HELP OF INDUSTRIAL CONTROL SYSTEMS,
THE LEGACY SYSTEMS NEED TO BE SECURED
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
1645-1660.
Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). A vision of IoT: Applications, challenges,
and opportunities with china perspective. IEEE Internet of Things journal, 1(4), 349-359.
Balani, N., & Hathi, R. (2016). Enterprise IoT: A Definitive Handbook. CreateSpace
Independent Publishing Platform.
Theoleyre, F., & Pang, A. C. (Eds.). (2013). Internet of Things and M2M Communications. River
Publishers.
Fortino, G., & Trunfio, P. (Eds.). (2014). Internet of things based on smart objects: Technology,
middleware and applications. Springer Science & Business Media.
Document Page
THANK YOU
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]