Case Study: IoT Devices, Security Attacks, Mitigation, and Protocols
VerifiedAdded on 2023/01/12
|9
|2452
|89
Case Study
AI Summary
This case study delves into the realm of Internet of Things (IoT) devices, analyzing their functionalities and applications across various sectors, including consumer, commercial, industrial, and infrastructure. It identifies and discusses prevalent security threats, such as Smurf attacks, botnets, and IP ...

CASE STUDY
1
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Introduction of different IOT devices and different type of IOT devices and their application3
Different attack which used to impact the performance of IOT devices in organization.......4
Different measure through impact of different attack on IOT devices can be reduced.........5
Different type of IOT devices protocols.................................................................................6
CONCLUSISON.............................................................................................................................7
REFERENCES................................................................................................................................9
2
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Introduction of different IOT devices and different type of IOT devices and their application3
Different attack which used to impact the performance of IOT devices in organization.......4
Different measure through impact of different attack on IOT devices can be reduced.........5
Different type of IOT devices protocols.................................................................................6
CONCLUSISON.............................................................................................................................7
REFERENCES................................................................................................................................9
2

INTRODUCTION
IOT devices are defined as system of interrelated computing devices, digital machines and
mechanical which helps organization in transfer data over a network. Bespoke Software
Development Company delivering software solutions, apps and websites to some of the UK's
leading brands. This report highlights the introduction of IOT devices and different type of IOT
devices and application of same. After that the report highlights three attack which are threaten
usage of IOT devices in the organization discussion and comparison of same in the organization.
After that the report highlights different measure through which impact of different IOT attack
can be reduced in the organization. After that the report highlights the two type of protocol
which are generally used with IOT devices in the organization. In the end the report highlights
the summary of the report (Meidan and et.al., 2017).
MAIN BODY
Introduction of different IOT devices and different type of IOT devices and their application
IOT devices are define as system of interrelated computing devices, digital machines and
mechanical which helps organization in unique identifier and transfer data over a network
without human resource of the nation. IOT devices is integrated with high definition technology
which helps them in communicating with other over internet smoothly. There are variant of IOT
devices some of them are as follows:
Consumer IOT devices: These are the type of devices which are generally directed to
improve the level of consumer satisfaction. Also, these are the type of devices which also help
the consumer in increasing the level of safety in the organization. Some of the consumer IOT
devices are home automation, wearable technology, application with remote monitoring
capability (Shuman and et.al., 2017).
Commercial IOT Devices: There are many different type of application which are
develop for carrying out different commercial purpose for different industry. IOT for health
and medical industry are generally used to monitor the health and emergency notification
system on remote basis. These devices used to help the different firm in monitoring blood
pressure and heart rate. IOT for transportation industry, these type of devices which used to
integrated communication, control and information processing across different transportation
3
IOT devices are defined as system of interrelated computing devices, digital machines and
mechanical which helps organization in transfer data over a network. Bespoke Software
Development Company delivering software solutions, apps and websites to some of the UK's
leading brands. This report highlights the introduction of IOT devices and different type of IOT
devices and application of same. After that the report highlights three attack which are threaten
usage of IOT devices in the organization discussion and comparison of same in the organization.
After that the report highlights different measure through which impact of different IOT attack
can be reduced in the organization. After that the report highlights the two type of protocol
which are generally used with IOT devices in the organization. In the end the report highlights
the summary of the report (Meidan and et.al., 2017).
MAIN BODY
Introduction of different IOT devices and different type of IOT devices and their application
IOT devices are define as system of interrelated computing devices, digital machines and
mechanical which helps organization in unique identifier and transfer data over a network
without human resource of the nation. IOT devices is integrated with high definition technology
which helps them in communicating with other over internet smoothly. There are variant of IOT
devices some of them are as follows:
Consumer IOT devices: These are the type of devices which are generally directed to
improve the level of consumer satisfaction. Also, these are the type of devices which also help
the consumer in increasing the level of safety in the organization. Some of the consumer IOT
devices are home automation, wearable technology, application with remote monitoring
capability (Shuman and et.al., 2017).
Commercial IOT Devices: There are many different type of application which are
develop for carrying out different commercial purpose for different industry. IOT for health
and medical industry are generally used to monitor the health and emergency notification
system on remote basis. These devices used to help the different firm in monitoring blood
pressure and heart rate. IOT for transportation industry, these type of devices which used to
integrated communication, control and information processing across different transportation
3

system. IOT for building and home automation industry can be used to monitor and control
the mechanical, electrical and electronic system are used in various type of building.
Industrial IOT devices: These devices are also known as IIOT, these type of devices are
acquire and analyze data from variety of different connected equipment. This type of devices
generally helps regulating and monitoring variety of industrial system. In manufacturing
industry IOT generally equipped variety of sensing, communication and network capabilities. At
the same time IOT application in farming industry used to help the company in collecting data
on temperature, weather and humidity.
Infrastructure IOT devices: These are the type of the devices which are generally used
in monitoring and controlling operation of sustainable urban and rural natural infrastructure like
bridges, railways tracks and n and offshore wind farms. Different applications under
infrastructure IOT devices are Metropolitan scale development devices, Application
management devices, Environment monitoring devices and Living Lab devices (Kim and et.al.,
2018).
Different attack which used to impact the performance of IOT devices in organization
Discussion
Smurf attack: It is one of the growing forms of attack which is seen by IOT devices in
current scenario. One of such report highlights that there is rise of 300 percent serge in Smurf
attack in recent times. Smurf attack the type of malicious attempt which are made in the
organization to damage, steal or destroy different type of critical corporate data, compromise
website and disrupt operational infrastructure. This type of attack involves using IP spoofing
and ICMP to saturate the target network with traffic. Increasing number of attack due to increase
in number of IOT software are being deployed all around the world. Generally this type of attack
generally occur when their is lack of defences in ageing firmware or architectures.
Botnets: It is another type of attack which has created very adverse impact on different
IOT devices. In this type of attack hackers used to control million of the system under a malware
to carry out DDoS attack. These types of attack are generally used to carry out attack on specific
target system. Also these types of attack are very difficult to trace because botnets are located in
different geographical location in world.
4
the mechanical, electrical and electronic system are used in various type of building.
Industrial IOT devices: These devices are also known as IIOT, these type of devices are
acquire and analyze data from variety of different connected equipment. This type of devices
generally helps regulating and monitoring variety of industrial system. In manufacturing
industry IOT generally equipped variety of sensing, communication and network capabilities. At
the same time IOT application in farming industry used to help the company in collecting data
on temperature, weather and humidity.
Infrastructure IOT devices: These are the type of the devices which are generally used
in monitoring and controlling operation of sustainable urban and rural natural infrastructure like
bridges, railways tracks and n and offshore wind farms. Different applications under
infrastructure IOT devices are Metropolitan scale development devices, Application
management devices, Environment monitoring devices and Living Lab devices (Kim and et.al.,
2018).
Different attack which used to impact the performance of IOT devices in organization
Discussion
Smurf attack: It is one of the growing forms of attack which is seen by IOT devices in
current scenario. One of such report highlights that there is rise of 300 percent serge in Smurf
attack in recent times. Smurf attack the type of malicious attempt which are made in the
organization to damage, steal or destroy different type of critical corporate data, compromise
website and disrupt operational infrastructure. This type of attack involves using IP spoofing
and ICMP to saturate the target network with traffic. Increasing number of attack due to increase
in number of IOT software are being deployed all around the world. Generally this type of attack
generally occur when their is lack of defences in ageing firmware or architectures.
Botnets: It is another type of attack which has created very adverse impact on different
IOT devices. In this type of attack hackers used to control million of the system under a malware
to carry out DDoS attack. These types of attack are generally used to carry out attack on specific
target system. Also these types of attack are very difficult to trace because botnets are located in
different geographical location in world.
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

IP spoofing: It is another type of attack which generally used to impact IOT devices in
current scenario. This is the type of attack in which attacker used to convince a system which is
in general used to be in contact with different trusted entity this used to provide the access of
same to attacker. In this attack the attacker generally used to send the IP source address (Shah
and Venkatesan, 2018). Target host might accept the packet and used to act upon the same in the
market.
Comparison
Basis Smurf attack Botnets IP spoofing
Use This type of attack
generally uses ICMP
eco request target to
broadcast IP
addresses to attack
different IOT
software.
In this type of attack
the attacker generally
uses DDos to attack
different IOT devices
in general.
In this type of attack
attacker uses packet
of IP source to attack
different IOT devices.
Purpose This is generally used
in the organization to
saturate a target
network with traffic
and purpose of using
same is that it can be
automated to generate
huge amount of
network congestion.
Purpose of this type
of attack is that it is
overwhelming for the
target system
bandwidth and
processing capability.
This attack is
generally perform in
the organization with
the purpose of getting
access to the other
companies IOT
devices which is
communicating with
other devices.
Different measure through impact of different attack on IOT devices can be reduced
Antivirus Software: IT is one of the best measure through which attack of IOT can be reduced
in the organization. Using different Antivirus software in the organization used to help the
organization in getting notification of any threat which may occur in the organization. On the
5
current scenario. This is the type of attack in which attacker used to convince a system which is
in general used to be in contact with different trusted entity this used to provide the access of
same to attacker. In this attack the attacker generally used to send the IP source address (Shah
and Venkatesan, 2018). Target host might accept the packet and used to act upon the same in the
market.
Comparison
Basis Smurf attack Botnets IP spoofing
Use This type of attack
generally uses ICMP
eco request target to
broadcast IP
addresses to attack
different IOT
software.
In this type of attack
the attacker generally
uses DDos to attack
different IOT devices
in general.
In this type of attack
attacker uses packet
of IP source to attack
different IOT devices.
Purpose This is generally used
in the organization to
saturate a target
network with traffic
and purpose of using
same is that it can be
automated to generate
huge amount of
network congestion.
Purpose of this type
of attack is that it is
overwhelming for the
target system
bandwidth and
processing capability.
This attack is
generally perform in
the organization with
the purpose of getting
access to the other
companies IOT
devices which is
communicating with
other devices.
Different measure through impact of different attack on IOT devices can be reduced
Antivirus Software: IT is one of the best measure through which attack of IOT can be reduced
in the organization. Using different Antivirus software in the organization used to help the
organization in getting notification of any threat which may occur in the organization. On the
5

basis of same organization can take different decision in the organization to overcome this sort
of threat in the organization. Generally Antivirus software in the organization used to build a
security web around IOT devices or also it can be incorporated with all the new IOT devices
which are procure in the organization not only that, organization also has to make sure that they
used to regularly update the Antivirus software of the company in the market. As all Antivirus
software are generally has 1 to 2 year license only (Bhawiyuga, Data and Warda, 2017).
Don’t Enable Universal plug and Play features: In this measure organization has to
make sure that they used to not allow different devices to enable Universal plug and Play
features. As this are the feature through which one device used to connect with other device
globally. So if organization need not to communicate with other device globally so organization
has to make sure that they used to not Universal plug and Play features this will eventually
create the variety of issue for the attacker to attack different IOT devices in the organization. Not
only that this measure also used to help the company in making different IOT devices more
convenient in the organization as organization do not used to configure each of these devices
separately. Also, in case there is an attack, outside entities might be able to gain access to
multiple devices simultaneously. Hence, it is a good practice to turn off the UPnP feature on
every device.
Reduce your use of cloud technology: It is another measure which can be used by the
organization to reduce the impact of different attack on IOT devices. As it has seen that all the
organization generally over depended upon the different cloud technology. All the organization
has there point to be keep as cloud technology used to increase the efficiency of the business in
the organization. So organization has to make sure that they used to not used use cloud
technology in the organization to carry out different important function in the organization. As it
will not allowed the different attacker to get access of different operation of the business. Also,
organization has to make sure that they used to evaluate the safety of different cloud technology
on regular basis so that impact can be reduce.
Different type of IOT devices protocols
Hyper Text Transfer Protocol (HTTP): It is type of network protocol of IOT devices.
This protocol generally used to form different sort of foundation so that data communication can
be performed over the web. This id one of the most protocol which are used by IOT devices in
6
of threat in the organization. Generally Antivirus software in the organization used to build a
security web around IOT devices or also it can be incorporated with all the new IOT devices
which are procure in the organization not only that, organization also has to make sure that they
used to regularly update the Antivirus software of the company in the market. As all Antivirus
software are generally has 1 to 2 year license only (Bhawiyuga, Data and Warda, 2017).
Don’t Enable Universal plug and Play features: In this measure organization has to
make sure that they used to not allow different devices to enable Universal plug and Play
features. As this are the feature through which one device used to connect with other device
globally. So if organization need not to communicate with other device globally so organization
has to make sure that they used to not Universal plug and Play features this will eventually
create the variety of issue for the attacker to attack different IOT devices in the organization. Not
only that this measure also used to help the company in making different IOT devices more
convenient in the organization as organization do not used to configure each of these devices
separately. Also, in case there is an attack, outside entities might be able to gain access to
multiple devices simultaneously. Hence, it is a good practice to turn off the UPnP feature on
every device.
Reduce your use of cloud technology: It is another measure which can be used by the
organization to reduce the impact of different attack on IOT devices. As it has seen that all the
organization generally over depended upon the different cloud technology. All the organization
has there point to be keep as cloud technology used to increase the efficiency of the business in
the organization. So organization has to make sure that they used to not used use cloud
technology in the organization to carry out different important function in the organization. As it
will not allowed the different attacker to get access of different operation of the business. Also,
organization has to make sure that they used to evaluate the safety of different cloud technology
on regular basis so that impact can be reduce.
Different type of IOT devices protocols
Hyper Text Transfer Protocol (HTTP): It is type of network protocol of IOT devices.
This protocol generally used to form different sort of foundation so that data communication can
be performed over the web. This id one of the most protocol which are used by IOT devices in
6

general. This is generally used when amount of data to be published is high in quantity to be
published. HTTP is generally used to help the organization or IOT devices to present the
different cases in more attractive way in front of the consumer in the market. As Additive
manufacturing/3D printing is one of the use cases of the HTTP protocol. For example it used to
connect different 3D printers in the network and used to print the 3 dimensional objects and pre
determine process prototypes. There are many disadvantage of this protocol as well as this
protocol is not preferred by many organization as this protocol is very expensive to be procure at
the same time energy saving and life of battery is not that good also used to create many
constraints in the organization (Bendavid and et.al., 2018).
Bluetooth: It is one of the most commonly used protocols by all organization; this
protocol is one of the most widely used protocols for short range of communication in the
organization. It is widely used protocol in short range communication. It is standard IOT
protocol for different wireless data transmission. One of the biggest reasons for all the
organization to use this protocol in the organization is that it is one of the most cheapest protocol
which can be used by the organization in the market. As it cost very low to procure the same in
the organization at the same time it also used to consume low energy version of Bluetooth
protocol for the organization this eventually used to consume less power and play an important
role in connecting IOT devices in the organization. This type of protocol is generally used in the
smart wearables, smart phones and other small mobile devices. So that small fragment of data
can be exchanges without high power and memory in the organization. One of the biggest issues
which are faced due to use of same in the organization is that it only used to connect the
different devices when they are very close to each other in the organization (Guo, Chen and
Tsai, 2017).
CONCLUSISON
After going through the above report it has been concluded that there are many different
type of IOT devices which are being used in the organization. This eventually used to improve
the performance of the business. As with the help of the same all the organization used to
communicate and evaluate different communication very easily with the help of different
network. After that the report highlights different attack which used to impact the IOT devices
performance in the organization. As this used to impact the performance of the business very
adversely. After that the report highlights the different measure through which impact of
7
published. HTTP is generally used to help the organization or IOT devices to present the
different cases in more attractive way in front of the consumer in the market. As Additive
manufacturing/3D printing is one of the use cases of the HTTP protocol. For example it used to
connect different 3D printers in the network and used to print the 3 dimensional objects and pre
determine process prototypes. There are many disadvantage of this protocol as well as this
protocol is not preferred by many organization as this protocol is very expensive to be procure at
the same time energy saving and life of battery is not that good also used to create many
constraints in the organization (Bendavid and et.al., 2018).
Bluetooth: It is one of the most commonly used protocols by all organization; this
protocol is one of the most widely used protocols for short range of communication in the
organization. It is widely used protocol in short range communication. It is standard IOT
protocol for different wireless data transmission. One of the biggest reasons for all the
organization to use this protocol in the organization is that it is one of the most cheapest protocol
which can be used by the organization in the market. As it cost very low to procure the same in
the organization at the same time it also used to consume low energy version of Bluetooth
protocol for the organization this eventually used to consume less power and play an important
role in connecting IOT devices in the organization. This type of protocol is generally used in the
smart wearables, smart phones and other small mobile devices. So that small fragment of data
can be exchanges without high power and memory in the organization. One of the biggest issues
which are faced due to use of same in the organization is that it only used to connect the
different devices when they are very close to each other in the organization (Guo, Chen and
Tsai, 2017).
CONCLUSISON
After going through the above report it has been concluded that there are many different
type of IOT devices which are being used in the organization. This eventually used to improve
the performance of the business. As with the help of the same all the organization used to
communicate and evaluate different communication very easily with the help of different
network. After that the report highlights different attack which used to impact the IOT devices
performance in the organization. As this used to impact the performance of the business very
adversely. After that the report highlights the different measure through which impact of
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

different attack can be reduced in the organization. After that the report concludes different type
of protocol which can is being used in the organization.
8
of protocol which can is being used in the organization.
8

REFERENCES
Books and Journals
Meidan, Y and et.al., 2017, April. ProfilIoT: a machine learning approach for IoT device
identification based on network traffic analysis. InProceedings of the symposium on
applied computing (pp. 506-509).
Shuman, M. A. R and et.al., 2017. Automatic IoT device social network expansion. U.S. Patent
9,847,961.
Kim, R. Y and et.al., 2018. Systems and methods for interaction with an IoT device. U.S. Patent
10,158,536.
Shah, T. and Venkatesan, S., 2018, August. Authentication of IoT device and IoT server using
secure vaults. In 2018 17th IEEE International Conference On Trust, Security And
Privacy In Computing And Communications/12th IEEE International Conference On Big
Data Science And Engineering (TrustCom/BigDataSE) (pp. 819-824). IEEE.
Bhawiyuga, A., Data, M. and Warda, A., 2017, October. Architectural design of token based
authentication of MQTT protocol in constrained IoT device. In 2017 11th International
Conference on Telecommunication Systems Services and Applications (TSSA) (pp. 1-4).
IEEE.
Bendavid, Y and et.al., 2018. IoT Device Security: Challenging “A Lightweight RFID Mutual
Authentication Protocol Based on Physical Unclonable Function”. Sensors, 18(12),
p.4444.
Guo, J., Chen, R. and Tsai, J. J., 2017, April. A mobile cloud hierarchical trust management
protocol for IoT systems. In 2017 5th IEEE International Conference on Mobile Cloud
Computing, Services, and Engineering (MobileCloud) (pp. 125-130). IEEE.
9
Books and Journals
Meidan, Y and et.al., 2017, April. ProfilIoT: a machine learning approach for IoT device
identification based on network traffic analysis. InProceedings of the symposium on
applied computing (pp. 506-509).
Shuman, M. A. R and et.al., 2017. Automatic IoT device social network expansion. U.S. Patent
9,847,961.
Kim, R. Y and et.al., 2018. Systems and methods for interaction with an IoT device. U.S. Patent
10,158,536.
Shah, T. and Venkatesan, S., 2018, August. Authentication of IoT device and IoT server using
secure vaults. In 2018 17th IEEE International Conference On Trust, Security And
Privacy In Computing And Communications/12th IEEE International Conference On Big
Data Science And Engineering (TrustCom/BigDataSE) (pp. 819-824). IEEE.
Bhawiyuga, A., Data, M. and Warda, A., 2017, October. Architectural design of token based
authentication of MQTT protocol in constrained IoT device. In 2017 11th International
Conference on Telecommunication Systems Services and Applications (TSSA) (pp. 1-4).
IEEE.
Bendavid, Y and et.al., 2018. IoT Device Security: Challenging “A Lightweight RFID Mutual
Authentication Protocol Based on Physical Unclonable Function”. Sensors, 18(12),
p.4444.
Guo, J., Chen, R. and Tsai, J. J., 2017, April. A mobile cloud hierarchical trust management
protocol for IoT systems. In 2017 5th IEEE International Conference on Mobile Cloud
Computing, Services, and Engineering (MobileCloud) (pp. 125-130). IEEE.
9
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.