IoT Security and Privacy Concerns: A Research Report for ITC595
VerifiedAdded on 2025/05/02
|11
|2453
|262
AI Summary
Desklib offers solved assignments and past papers to help students excel in their studies. Download this solved research project on security and privacy issues in IoT.

ITC595
Information Security
Assessment item 5
Research project
Security and Privacy related issues in IoT (Internet of Things)
Student Name:
Student ID:
Information Security
Assessment item 5
Research project
Security and Privacy related issues in IoT (Internet of Things)
Student Name:
Student ID:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Abstract
This paper is based on the study of the security and privacy issues which identity in the
section of the internet of things (IoT). This is the kind of system which has the ability to build
the interrelation in the technologies such as digital machines, computers, objects and people
that identify the unique identifiers. According to the study, these systems have the ability to
accumulate the data in the proper way and build the connection in the server which is helpful
to increase the network association devices. The RFID technology is the main element which
plays an essential role in the system of the healthcare industry so that get the safely transfer
the data and information in an effective way. Alternatively, the system gets affected to the
various issues like hacking, breach, disruption, information leaking and much more. The
system is based on the internet of things that need to resolve the issue related to privacy and
security concern. According to the learning, the internet of things is the kind system that has
adding devices which download the millions of bytes of the data on a daily basis. The RFID
(radio-frequency identification) is discussed in the below paper to explain the data
integration, visualisation, accessibility in the concern of the data transferring process.
Keywords: Internet of things (IoTs), Digital machines, Unique identifier, RFID (radio-
frequency identification)
This paper is based on the study of the security and privacy issues which identity in the
section of the internet of things (IoT). This is the kind of system which has the ability to build
the interrelation in the technologies such as digital machines, computers, objects and people
that identify the unique identifiers. According to the study, these systems have the ability to
accumulate the data in the proper way and build the connection in the server which is helpful
to increase the network association devices. The RFID technology is the main element which
plays an essential role in the system of the healthcare industry so that get the safely transfer
the data and information in an effective way. Alternatively, the system gets affected to the
various issues like hacking, breach, disruption, information leaking and much more. The
system is based on the internet of things that need to resolve the issue related to privacy and
security concern. According to the learning, the internet of things is the kind system that has
adding devices which download the millions of bytes of the data on a daily basis. The RFID
(radio-frequency identification) is discussed in the below paper to explain the data
integration, visualisation, accessibility in the concern of the data transferring process.
Keywords: Internet of things (IoTs), Digital machines, Unique identifier, RFID (radio-
frequency identification)

Table of Contents
Abstract......................................................................................................................................2
Introduction................................................................................................................................4
A. Research Problem..................................................................................................................5
B. Research Justification............................................................................................................6
Literature review........................................................................................................................7
Conclusion..................................................................................................................................9
References................................................................................................................................10
Abstract......................................................................................................................................2
Introduction................................................................................................................................4
A. Research Problem..................................................................................................................5
B. Research Justification............................................................................................................6
Literature review........................................................................................................................7
Conclusion..................................................................................................................................9
References................................................................................................................................10
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
The research report is based on the study of the internet of things (IoT) which helps to
identify the issues related to privacy and security to make the information more secure. The
IoT is the system which based on the extension of the internet connectivity in the devices
which related to the physical objects and embedded of the internet connection and electronic
hardware is helpful to build the communication process through the internet. On the other
hand, the heterogeneity is related to the high dynamic structure of IoT and innovative devices
which give an impact on the environment of the online data transfer process. The research
provides the proper format to give the explanation in an effective way like research problem
and research justification which give the learning of the issues based on the issues related to
the topic. The research project also provides the learning of the literature review which based
on the point of view of the authors in an effective way.
RFID (radio-frequency identification) is the technology of the IoT system which is helpful to
resolve the issues that based on the data transferring process and information providing a
process which happen in between the devices that connected in the same network. The
information of the RFID is based on the variation of the internet of things that need to be
resolved by the accuracy and information segregation so that build the proper systematic way.
So, the detailed information is based on the study of the issues and problems that depend on
the internet of things and typical unawareness of the collection of the data in the proper way.
The research report is based on the study of the internet of things (IoT) which helps to
identify the issues related to privacy and security to make the information more secure. The
IoT is the system which based on the extension of the internet connectivity in the devices
which related to the physical objects and embedded of the internet connection and electronic
hardware is helpful to build the communication process through the internet. On the other
hand, the heterogeneity is related to the high dynamic structure of IoT and innovative devices
which give an impact on the environment of the online data transfer process. The research
provides the proper format to give the explanation in an effective way like research problem
and research justification which give the learning of the issues based on the issues related to
the topic. The research project also provides the learning of the literature review which based
on the point of view of the authors in an effective way.
RFID (radio-frequency identification) is the technology of the IoT system which is helpful to
resolve the issues that based on the data transferring process and information providing a
process which happen in between the devices that connected in the same network. The
information of the RFID is based on the variation of the internet of things that need to be
resolved by the accuracy and information segregation so that build the proper systematic way.
So, the detailed information is based on the study of the issues and problems that depend on
the internet of things and typical unawareness of the collection of the data in the proper way.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

A. Research Problem
The issue factor which identifies in the research that there is various kind of threat which
involve in the smart device that can harm the devices like a personal computer, smart devices,
laptops and much more (Amyx, 2017). The proper information gets from the study that there
is various kind of untrusted and endangered network connection that gives negative impact
directly on the system used by the user. The issue and problem are related to the personal
information which constantly transfers on the internet such as bank account details which
may leak through the untrusted network connection (Ahanger & Aljumah, 2019). The
vulnerability in the software used is the main issue which makes the impact on the device
system and gives attack on the personal computers so it is necessary to keep up to date the
system to reduce the risk impact.
The impact Wi-Fi network and hotspots are the kind of connection networking which
basically depend on the frequent internet connection but this is also a harmful element which
gives impact on the systems and harms the internal storage on the system (Alabdulsalam, et.
al.,2018). On the other hand, the malicious applications are the also harmful element which
gives a negative impact on the smart devices and targeted on their internal body. Malicious
application has the untrusted feature which attracts the users to uses in an effective way and
steals the personal information of the user in an inappropriate way (Bures, et. al., 2018). This
application not only targeting the smart devices but also gives an impact on leaking the
information related to the individual person.
The issue factor which identifies in the research that there is various kind of threat which
involve in the smart device that can harm the devices like a personal computer, smart devices,
laptops and much more (Amyx, 2017). The proper information gets from the study that there
is various kind of untrusted and endangered network connection that gives negative impact
directly on the system used by the user. The issue and problem are related to the personal
information which constantly transfers on the internet such as bank account details which
may leak through the untrusted network connection (Ahanger & Aljumah, 2019). The
vulnerability in the software used is the main issue which makes the impact on the device
system and gives attack on the personal computers so it is necessary to keep up to date the
system to reduce the risk impact.
The impact Wi-Fi network and hotspots are the kind of connection networking which
basically depend on the frequent internet connection but this is also a harmful element which
gives impact on the systems and harms the internal storage on the system (Alabdulsalam, et.
al.,2018). On the other hand, the malicious applications are the also harmful element which
gives a negative impact on the smart devices and targeted on their internal body. Malicious
application has the untrusted feature which attracts the users to uses in an effective way and
steals the personal information of the user in an inappropriate way (Bures, et. al., 2018). This
application not only targeting the smart devices but also gives an impact on leaking the
information related to the individual person.

B. Research Justification
The justification of the research is based on the learning of the various features like there
issues, problem, neutral impact and negative variation in the terms of the computer system
which may harm the personal information of the particular person. The research is only when
the authors of the various papers provide their point of view in the proper way which is
helpful to identify the various aspects of the issues of security in the terms of the internet of
things (Caron, et. al., 2016). The literature review is the main feature which gives aid to make
the innovative learning of the IoT system and their technology in the effective like RFID
(radio-frequency identification), NFC, ZigBee, Z-wave and much more. The below section of
literature review properly defines the particular technology of the internet of things in the
area of the healthcare industry.
The research justification is only possible when the proper data process accomplish under the
secure technology of the internet of things (Hassan & Madani, 2017). The proper way to get
accurate learning is possible after provides the literature review so that get the information
from the various authors of the papers. The RFID (radio-frequency identification) not only
applicable for issues identification but also build the proper radio frequency to transfer the
data in the appropriate way to reduce the impact of the risk in an effective way.
The justification of the research is based on the learning of the various features like there
issues, problem, neutral impact and negative variation in the terms of the computer system
which may harm the personal information of the particular person. The research is only when
the authors of the various papers provide their point of view in the proper way which is
helpful to identify the various aspects of the issues of security in the terms of the internet of
things (Caron, et. al., 2016). The literature review is the main feature which gives aid to make
the innovative learning of the IoT system and their technology in the effective like RFID
(radio-frequency identification), NFC, ZigBee, Z-wave and much more. The below section of
literature review properly defines the particular technology of the internet of things in the
area of the healthcare industry.
The research justification is only possible when the proper data process accomplish under the
secure technology of the internet of things (Hassan & Madani, 2017). The proper way to get
accurate learning is possible after provides the literature review so that get the information
from the various authors of the papers. The RFID (radio-frequency identification) not only
applicable for issues identification but also build the proper radio frequency to transfer the
data in the appropriate way to reduce the impact of the risk in an effective way.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Literature review
As per the view of Abdulrahman, et. al., 2016, the smart devices get affected by the various
elements like hacking information, leaking process and information misuses which gives the
negative impact on the system working frequency. The internet of things is the kind of system
which builds the communication process through the internet in between the system to
transfer the data and information. The internet of things is the main element which plays an
essential role in the data passing process across the internet which based on the proper
frequency of the data communication process that possible through the proper connection
network. The healthcare is the area where the IoT system implemented to get the information
which may harm the information of the patients in an effective way (Kim, 2017).
According to the view of Caron, et. al., 2016, the RFID (radio-frequency identification) is the
kind of IoT system which properly identifies the harmful elements that give a negative impact
on the information of the patients. The RFID is the technology which gives aid to track the
tags that associated the data of the patients and segregate the objects according to their
frequency and feature. The healthcare industry has the various information of the critical
patients that need to be secured by the effective technology which is possible through the
RFID that has the ability to build the communication protocol for the electronic devices to get
the information in the proper secure way.
In the words of Hassan & Madani, 2017, the radio frequency identification system is the main
protocol which plays an important role in the local device networks so that get the issues
which related to the information leaking and hacking of the patient's data. Most of the outside
sources have the bad intention to give a negative impact on the confidential information of
the patients which is the main issue of the organisation. The RFID system can implement in
the small local device network so that build the proper security in the system in the proper
way (Hassan & Madani, 2017). The RFID (radio-frequency identification) is the kind of
technology which builds the proper security feature in the system such as local devices and
computer system which used in the healthcare industry. The IoT is the system has the main
ability to identify the issues which gives har to the data of the patients and steal the personal
information of the patients which is not appropriate in the healthcare industry.
As per the view of Kim, 2017, the RFID technology is the main feature which is helpful to
identify the issues which happen in the process of sending the data of the patients or get the
As per the view of Abdulrahman, et. al., 2016, the smart devices get affected by the various
elements like hacking information, leaking process and information misuses which gives the
negative impact on the system working frequency. The internet of things is the kind of system
which builds the communication process through the internet in between the system to
transfer the data and information. The internet of things is the main element which plays an
essential role in the data passing process across the internet which based on the proper
frequency of the data communication process that possible through the proper connection
network. The healthcare is the area where the IoT system implemented to get the information
which may harm the information of the patients in an effective way (Kim, 2017).
According to the view of Caron, et. al., 2016, the RFID (radio-frequency identification) is the
kind of IoT system which properly identifies the harmful elements that give a negative impact
on the information of the patients. The RFID is the technology which gives aid to track the
tags that associated the data of the patients and segregate the objects according to their
frequency and feature. The healthcare industry has the various information of the critical
patients that need to be secured by the effective technology which is possible through the
RFID that has the ability to build the communication protocol for the electronic devices to get
the information in the proper secure way.
In the words of Hassan & Madani, 2017, the radio frequency identification system is the main
protocol which plays an important role in the local device networks so that get the issues
which related to the information leaking and hacking of the patient's data. Most of the outside
sources have the bad intention to give a negative impact on the confidential information of
the patients which is the main issue of the organisation. The RFID system can implement in
the small local device network so that build the proper security in the system in the proper
way (Hassan & Madani, 2017). The RFID (radio-frequency identification) is the kind of
technology which builds the proper security feature in the system such as local devices and
computer system which used in the healthcare industry. The IoT is the system has the main
ability to identify the issues which gives har to the data of the patients and steal the personal
information of the patients which is not appropriate in the healthcare industry.
As per the view of Kim, 2017, the RFID technology is the main feature which is helpful to
identify the issues which happen in the process of sending the data of the patients or get the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

information of the particular disease. The malicious application is another harmful element
which gives impact on the private data of the patients so it is necessary to install the RFID
technology in the system so that secure the information in an effective way. Most of the IoT
devices are popular in the global platform to build the proper communication process in
between the connected devices which exchanges the data of the patients (Penttinen, 2016).
The IoT structure is the high dynamic way which builds the properly protected environment
in the system to transfer the data in an effective way. The RFID is the main element which
has the ability to resolves which related to the typical dispersed, inappropriate
communication and connectivity feature so that secure the data that related to the disease of
the patient. The variation of the information is based on the tasks related to the transmitted
device need to be identified through the technology.
According to the view of Penttinen, 2016, the information of the patients is the main thing for
the healthcare industry to properly and securely transfer the data and information of the
patients that need a transfer in an effective way. The information of the patient is the
confidential thing which gets harm through the various harmful elements like cyber risks and
ransomware attacks that directly give impact on the information of the particular patient
(Alabdulsalam, et. al.,2018). The devices like computer system, laptops, electronic devices
used in the healthcare industry to properly transfer the data (Kouicem, et. al., 2018). But there
is various kind of harmful elements like cyber risking, data leaking and hacking information
is the main issues which become the problem to the organisation to secure the information in
an effective way.
As per the opinion of the Alabdulsalam, et. al., 2018, the system which used in the healthcare
industry needs to be secured by the aid of the technologies of the IoT system so that secure
the data and properly transfer the data and information in an effective way. The RFID system
can implement in the small local device network so that build the proper security in the
system and get the effective outcome at the end to maintain the sensitivity of the critical
patient (Ahanger & Aljumah, 2019). The RFID is the kind of technology that is helpful to
track and identify the tags that associated the data of the patients and make the innovative
changes in the frequency of the data transferring process (Luceri, et.al., 2018). The
segregation in the objects is the main element which generally creates the complexity in the
harmful feature of the system and makes the innovative changes in the system variation thing.
which gives impact on the private data of the patients so it is necessary to install the RFID
technology in the system so that secure the information in an effective way. Most of the IoT
devices are popular in the global platform to build the proper communication process in
between the connected devices which exchanges the data of the patients (Penttinen, 2016).
The IoT structure is the high dynamic way which builds the properly protected environment
in the system to transfer the data in an effective way. The RFID is the main element which
has the ability to resolves which related to the typical dispersed, inappropriate
communication and connectivity feature so that secure the data that related to the disease of
the patient. The variation of the information is based on the tasks related to the transmitted
device need to be identified through the technology.
According to the view of Penttinen, 2016, the information of the patients is the main thing for
the healthcare industry to properly and securely transfer the data and information of the
patients that need a transfer in an effective way. The information of the patient is the
confidential thing which gets harm through the various harmful elements like cyber risks and
ransomware attacks that directly give impact on the information of the particular patient
(Alabdulsalam, et. al.,2018). The devices like computer system, laptops, electronic devices
used in the healthcare industry to properly transfer the data (Kouicem, et. al., 2018). But there
is various kind of harmful elements like cyber risking, data leaking and hacking information
is the main issues which become the problem to the organisation to secure the information in
an effective way.
As per the opinion of the Alabdulsalam, et. al., 2018, the system which used in the healthcare
industry needs to be secured by the aid of the technologies of the IoT system so that secure
the data and properly transfer the data and information in an effective way. The RFID system
can implement in the small local device network so that build the proper security in the
system and get the effective outcome at the end to maintain the sensitivity of the critical
patient (Ahanger & Aljumah, 2019). The RFID is the kind of technology that is helpful to
track and identify the tags that associated the data of the patients and make the innovative
changes in the frequency of the data transferring process (Luceri, et.al., 2018). The
segregation in the objects is the main element which generally creates the complexity in the
harmful feature of the system and makes the innovative changes in the system variation thing.

Conclusion
It concluded from the above research project that there is various kind of process that needs
to implement in the data transferring process but most of the process harm the private
information of the patient and reduce the privacy concern of the information. So, it is
necessary to implement the proper security feature in the system so that build accurate
technology related to the internet of things. The research gives the learning of the RFID
(radio-frequency identification) technology which based on the proper IoT system to
implement the proper security feature to get the outcome in an effective way.
The systems such as electronic devices, computer system and internet devices use in the
healthcare system to secure the data and transfer the data in the proper way. But most of the
issues which already described in the research that happens then it should be resolved by the
aid of the RFID (radio-frequency identification) that is the technology of the internet of
things. The radio-frequency identification technology has the feature which makes the
innovative changes in the issues that give impact on the system of the healthcare user. The
information of the patients secures through the aid of the RFID which discussed in the above
section.
It concluded from the above research project that there is various kind of process that needs
to implement in the data transferring process but most of the process harm the private
information of the patient and reduce the privacy concern of the information. So, it is
necessary to implement the proper security feature in the system so that build accurate
technology related to the internet of things. The research gives the learning of the RFID
(radio-frequency identification) technology which based on the proper IoT system to
implement the proper security feature to get the outcome in an effective way.
The systems such as electronic devices, computer system and internet devices use in the
healthcare system to secure the data and transfer the data in the proper way. But most of the
issues which already described in the research that happens then it should be resolved by the
aid of the RFID (radio-frequency identification) that is the technology of the internet of
things. The radio-frequency identification technology has the feature which makes the
innovative changes in the issues that give impact on the system of the healthcare user. The
information of the patients secures through the aid of the RFID which discussed in the above
section.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
Abdulrahman Y.A., Kamalrudin M., Sidek S., Hassan M.A. (2016) Journal of Theoretical
and Applied Information Technology, 94 (1) , pp. 52-60.
Ahanger, T. A., & Aljumah, A. (2019). Internet of Things: A Comprehensive Study of
Security Issues and Defense Mechanisms. IEEE Access, 7, 11020-11028.
Alabdulsalam, S., Schaefer, K., Kechadi, T., & Le-Khac, N. A. (2018, January). Internet of
Things Forensics–Challenges and a Case Study. In IFIP International Conference on Digital
Forensics (pp. 35-48). Springer, Cham.
Amyx, S. (2017). Privacy dangers of wearables and the internet of things. In Managing
Security Issues and the Hidden Dangers of Wearable Technologies (pp. 131-160). IGI
Global.
Bures, M., Cerny, T., & Ahmed, B. S. (2018, June). Internet of things: Current challenges in
the quality assurance and testing methods. In International Conference on Information
Science and Applications (pp. 625-634). Springer, Singapore.
Caron, X., Bosua, R., Maynard, S. B., & Ahmad, A. (2016). The Internet of Things (IoT) and
its impact on individual privacy: An Australian perspective. Computer Law & Security
Review, 32(1), 4-15.
Hassan, Q. F., & Madani, S. A. (2017). Internet of things: Challenges, advances, and
applications. Chapman and Hall/CRC.
Kim, J. T. (2017). Open Security Issues for Smart Home System based on Internet of
Things. International Information Institute (Tokyo). Information, 20(1B), 531.
Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-
down survey. Computer Networks, 141, 199-221.
Luceri, L., Cardoso, F., Papandrea, M., Giordano, S., Buwaya, J., Kundig, S., ... & Braun, T.
(2018). VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the
Internet of Things. Pervasive and Mobile Computing, 49, 126-138.
Abdulrahman Y.A., Kamalrudin M., Sidek S., Hassan M.A. (2016) Journal of Theoretical
and Applied Information Technology, 94 (1) , pp. 52-60.
Ahanger, T. A., & Aljumah, A. (2019). Internet of Things: A Comprehensive Study of
Security Issues and Defense Mechanisms. IEEE Access, 7, 11020-11028.
Alabdulsalam, S., Schaefer, K., Kechadi, T., & Le-Khac, N. A. (2018, January). Internet of
Things Forensics–Challenges and a Case Study. In IFIP International Conference on Digital
Forensics (pp. 35-48). Springer, Cham.
Amyx, S. (2017). Privacy dangers of wearables and the internet of things. In Managing
Security Issues and the Hidden Dangers of Wearable Technologies (pp. 131-160). IGI
Global.
Bures, M., Cerny, T., & Ahmed, B. S. (2018, June). Internet of things: Current challenges in
the quality assurance and testing methods. In International Conference on Information
Science and Applications (pp. 625-634). Springer, Singapore.
Caron, X., Bosua, R., Maynard, S. B., & Ahmad, A. (2016). The Internet of Things (IoT) and
its impact on individual privacy: An Australian perspective. Computer Law & Security
Review, 32(1), 4-15.
Hassan, Q. F., & Madani, S. A. (2017). Internet of things: Challenges, advances, and
applications. Chapman and Hall/CRC.
Kim, J. T. (2017). Open Security Issues for Smart Home System based on Internet of
Things. International Information Institute (Tokyo). Information, 20(1B), 531.
Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-
down survey. Computer Networks, 141, 199-221.
Luceri, L., Cardoso, F., Papandrea, M., Giordano, S., Buwaya, J., Kundig, S., ... & Braun, T.
(2018). VIVO: A secure, privacy-preserving, and real-time crowd-sensing framework for the
Internet of Things. Pervasive and Mobile Computing, 49, 126-138.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Penttinen, J. T. (2016). Wireless Communications Security: Solutions for the Internet of
Things. John Wiley & Sons.
Things. John Wiley & Sons.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.



