Internet of Things Security Analysis

Verified

Added on  2020/02/24

|14
|3285
|81
Report
AI Summary
This report analyzes the Internet of Things (IoT) and its security challenges. It discusses the inter-networking of smart devices, the risks associated with data privacy, and the need for robust security measures. Key issues include the number of connected devices, the importance of regular updates, and the potential misuse of personal data. The report also highlights the lack of standardization in data sharing and the impact of physical and network attacks on IoT systems. It concludes with recommendations for improving IoT security and ensuring user privacy.
Document Page
Running head: INTERNET OF THING
INFORMATION SECURITY
Name of Student
Name of University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INTERNET OF THING
Executive Summary
The following assignment is an analysis of the Internet of things and its application is the
basically performs the task of the inter-networking within various smart devices which has
ability to connect. The following report is developed considering the major aspect of security of
IoT.
Document Page
2INTERNET OF THING
Table of Contents
Introduction......................................................................................................................................3
2. The supportive descriptions.....................................................................................................3
2.1 challenges in the IOT.............................................................................................................3
2.2 The issues...................................................................................................................................4
2.3. The relevant internet of things technologies and their applications.....................................4
2.4. Clarification of the vague areas:...........................................................................................6
2.5. The probable research questions:..........................................................................................6
3. Summary of the issues:...............................................................................................................7
4. Problems that were not addressed or not addressed adequately in the discussions:....................7
5. Discussion on the impact of the above mentioned issues and their application in real world:. .8
6. The lessons learnt......................................................................................................................10
7. Conclusion.................................................................................................................................11
Document Page
3INTERNET OF THING
Introduction
The internet of things (IOT) is the basically performs the task of the inter-networking
within various smart devices which has ability to connect. When these devices are connected to
each other they has the ability of exchanging data and information. The devices can be vehicles
or household goods like microwave, AC or TV.
The assignments discusses the challenge in the field of the Internet of things and discusses the
issues in the IOT (Hossain et al., 2015). It further discusses about the relevant internet of things
technologies and their applications and also poses five probable research questions. It further
discusses the problems that were not addressed or not addressed adequately in the discussions
and finally addresses the lesson learnt from the research question.
2. The supportive descriptions
2.1 challenges in the IOT
The IOT has huge application in advancing the technology thus its usage is not going to
stop in the near time, however the issues related to the usage of the IOT is a huge challenge for
the industry to overcome. Some of the challenges are:
More the device, greater is the challenge
One of the challenges related to the IOT regarding its usage is the number of the devices.
More is the devices connected the weaker is the firewall; hence they are prone to be hacked (Jing
et al., 2014).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INTERNET OF THING
The updates
The other issue related to the IOT is the updates. To improve the security of the device
and to protect the device from hacking the device are needed to update the device regularly
(Abomhara & Køien, 2014). The regular up gradation is another limitation of the application of
the IOT.
The threat of the personal data
Another limitation of the IOT is the misuse of the personal data . The devices connected may
contain the personal data which can be used by the companies or the hackers. The misuse may
become dangerous if the personal data contains the details of the money transaction.
The lazy consumers
Other limitation of the IOT is that it requires the active costumers who can regularly
update their devices to keep their data safe. They keep tab on the new version of the software in
the market and install them to improve the security (Mahmoud et al., 2014). In the case of the
lazy customers who fails to keep the updated software face the problem of the hacking thus they
avoid the IOT applications.
The compatibility
Various devices may not be compatible with each other. Thus it huge challenge to
integrate the entire device under a single control (Li & Da Xu, 2017).
Document Page
5INTERNET OF THING
2.2 The issues
Although the IOT has huge application and it has designed to make the person life
smoother and closer to technology. The above described challenges are the reason that IOT has
failed in its goal. The lack of the security and misuse of the personal data are some of the major
reasons which limit the usage of the IOT (Zhao & Ge, 2013). Some parts of the Internet have
stayed inaccessible because of the Dodos or “Denial of Service” attacks. This took place against
the Dyn DNS servers.
2.3. The relevant internet of things technologies and their applications
The relevant technology which is related to the security issues of the IOT is given in the
table.
Technology Applications
Internet of Thing network security This part is concerned with the making the
firewall for the devices which are strong
enough to prevent the data from being hacked.
Thus providing security of the devices
The authentication of the internet of things The authentication part is concerned with the
task of identifying the owner of the device as
he has only right to operate the device. If the
authentication then the device should remain
locked and a message should sent to the user
that someone is trying to access his device.
The encryption The encryption of the internet of thing is
Document Page
6INTERNET OF THING
concerned with providing extra security to the
devices which can be in form of the password,
thumb scanning or facial recognition.
Public key infrastructure The public key infrastructure is an important
part of the application of the IOT as its
function is to secure the electronic transfer of
the information which can contain financial
transaction details or a confidential mail.
The security analytics This has been aggregating, collecting,
normalizing and monitoring data from the IoT
devices. Moreover it has been delivering
actionable alerting and reporting over
particular activities.
The security of the application
programming device
The API is the software which the set of
protocols and codes used for designing the
application software (Farooq et al., 2015). The
application software is used for the exchange
of data between various devices which is main
work of the IOT.
2.4. Clarification of the vague areas:
The common people have been uncertain about the type of the data which is
created by the IOT and how the data processing takes place. However in other designs the data of
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INTERNET OF THING
the IOT are kept in the cloud computer which makes an easy access to the data. The cloud
centric architectures keep the cloud in the core devices (Roman, Zhou & Lopez, 2013). The
applications are kept above and the network of the smart things beneath that.
2.5. The probable research questions:
In keeping mind the challenges of the Internet of things various question rises related to
the security and the usage of the IOT some of them are enlisted are:
1. Can the big data in the IOT be completely secure?
2. Will the IOT be made compatible to include all the devices?
3. Can IoT devices be designed such that nature restricts the people from getting exploited?
4. Will there a threat of job losses as the IOT is making devices and robots more
operational?
5. What should be the privacy policies related to the usage of the Internet of things?
3. Summary of the issues:
The above described issues related to the security and privacy in the IOT poses a serious
threat to the user data. The above question summarizes will there will be privacy of the data and
what the privacy policies related to the data (Granjal, Monteiro & Silva, 2015). Other question
arises about the compatibility issue whether the entire device can be configured under the single
IOT. The other issue related to the IOT is whether it will have bad effect on the country economy
and will be reduction in the jobs as the robot will take over the human’s job (Zhang et al., 2014).
There has been news of data breaches in the company and they have suffered a
huge loss in terms of data and money. The survey conducted by the website shows that only few
enterprises who have felt confident that they have strong firewall and can protect their data from
Document Page
8INTERNET OF THING
hacking. The analysis presented is important and to the point in related to the issues of security.
They could be utilized for generating the spam through emailing the content to the other devices.
The contents gathered by the devices could be sent unknowingly to the parties also.
4. Problems that were not addressed or not addressed adequately in the discussions:
There are primary two issues which have been ignored but it is important related to the security
of the data they are:
The rush of the production
The application of the IOT has created a huge demand among customers and the
companies are mass producing these device. To full fill the demand of the customer companies
are compromising the security of these data from being hacked. As the result the failure in this
device to have a proper security has been a considerable risk. Moreover various IoT devices have
not possessed the storage or power required to host the endpoint security software.
Lack in the standardization for sharing of the data:
Although there has been rules and regulation related to the sharing and usage of the
information, the IOT still lacks a proper standards to use and share the personal data of the
customer. Each company designs and makes their own rules and regulation related to the sharing
and usage of the information. This must be without the baseline for bare minimum.
5. Discussion on the impact of the above mentioned issues and their application in real
world:
Problems Discussions Applications
Document Page
9INTERNET OF THING
Physical
Attacks
The physical attacks are targeting the
hardware of the IoT system which also
includes the breaching at the sensor
layer. They also require the physical
proximity of that system. However it
also includes the reduction of the
efficacy of IoT hardware (Ahlmeyer &
Chircu, 2016). The hackers can also
tamper with the nodes to control over
the sensor devices or nodes in the IoT
environment. The hackers are also
trying to extract the code, data and
materials. The other way the hacker can
hack the system is by injecting the
malicious code; through this hackers
can deploy physically the malicious
nodes between the legitimate nodes at
the IoT network. The malicious nodes
are called the MitM or man-in-the-
middle attacks which can control the
operations and the data flowing
between the linked codes.
The IoT companies are also expanding
the range of physical security. This will
happen as soon as their smart devices
connect to the database of the business
through the internet (Al-Fuqaha et al.,
2015). The internet device might be
present in the outside premises, which is
away from the established protected
perimeters. Therefore the location of the
device is important in order to keep the
equipment safe and secure and
simultaneously totally functional in the
external world.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10INTERNET OF THING
Network
attacks
The other attack is the network attack
which targets the network layer of the
IoT system; moreover it can be carried
out from the distance without being in
the premise. The Dodos attacks have
been on the top of all other network
attack which has compromised the IoT
security risks. It typically involves the
server from replying to the legitimate
requests (Sadeghi, Wachsmann &
Waidner, 2015). The usage of the
sniffing application, the attacker can
see the traffic analysis and change them
by inferring information which is on
the basis of pattern of the
communication between the devices in
the network of IoT.
The major problem of the network
attacks is the eavesdropping. The
exchange of the data or the
communication of the network happens
in a clear text or in an unsecured format,
which allows the hackers to access the
data paths in the network for changing
or interpreting the traffic (Lake et al.,
2014). To stop the network attack the
strong encryption of the data is used as
good applications which are based on
cryptography. Then the data could not
be read by the others as it transmits
through the network.
6. The lessons learnt
Analyzing above security of the physical and network attack it can be analyzed that the
idea behind the usage of the IOT in home can reduce the loads of work and bring closer to the
Document Page
11INTERNET OF THING
technology. However IOT is still at testing phase and various upgrades needs to be done at its
application (Kumar, Vealey & Srivastava, 2016). The first challenge is to solve the security
related question and the privacy of the data. The devices connected through the IOT and the
public key infrastructure which is an important part of the application of the IOT as its function
is to secure the electronic transfer of the information which can contain financial transaction
details or a confidential mail which is the prime target of the customers. The company has been
mass producing this device in order to full fill the demand of the customer companies are
compromising the security of these data from being hacked which is at considerable risk.
Various customers are unable to update their IOT infrastructure which has put the risk on their
personal data (Sicari et al., 2015) . The Defense department of the country has undertaken the
responsibility to take up the IoT enterprises which can come up with the roadmap to support and
make that clear to users. The choice for either manual or automatic updates must be provided to
every client.
7. Conclusion
From the above assignment it can be concluded that the application of the IOT has huge
application and revolutionized the way the devices are exchanging the data. However the
security and privacy threats imposed by them have limited their use. The challenges included
more the device, greater is the challenge, the updates, the threat of the personal data, the lazy
consumers and the compatibility. Various questions have been raised in related to the security of
the IOT. In keeping mind the challenges of the Internet of things various question raises related
to the security and the usage of the IOT. The two primary excuses the rush of the production and
the Lack in the standardization for sharing of the data. For such causes, the IoT could get pushed
back for longer time than it actually needed to be.
Document Page
12INTERNET OF THING
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13INTERNET OF THING
8. References:
Bokhara, M., & Køien, G. M. (2014, May). Security and privacy in the Internet of Things:
Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014
International Conference on (pp. 1-8). IEEE.
Ahlmeyer, M., & Chircu, A. M. (2016). SECURING THE INTERNET OF THINGS: A
REVIEW. Issues in Information Systems, 17(4).
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of
things: A survey on enabling technologies, protocols, and applications. IEEE Communications
Surveys & Tutorials, 17(4), 2347-2376.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security
concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of
existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3),
1294-1312.
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues,
challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE
World Congress on (pp. 21-28). IEEE.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things:
Perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]