Internet of Things (IoT) Security: A Comprehensive Overview

Verified

Added on  2021/05/27

|10
|873
|56
Presentation
AI Summary
This presentation provides a comprehensive overview of Internet of Things (IoT) security. It begins with an introduction to IoT, its evolution, and its widespread applications across various industries. The presentation then delves into the architecture and technologies underpinning IoT, including a detailed explanation of a five-layered model. A thorough security analysis of IoT is presented, highlighting the extension of internet security and privacy issues to IoT systems. The core security goals of IoT, namely authentication mechanisms and data confidentiality, are discussed in the context of the CIA model. The presentation also identifies key security challenges and issues, such as unauthorized access, eavesdropping, spoofing, RF jamming, and phishing. Finally, it concludes by emphasizing the need for better authentication, intrusion detection systems, and assessment techniques to address the evolving security problems in the IoT landscape. The presentation includes references to relevant research papers and articles.
Document Page
Internet of Things
(IoT) Security
[NAME]
[ACADEMIC INSTITUTION]
[CLASS]
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
Internet of Things aims to extend the existing boundaries of the
internet.
By connecting many stand-alone devices using networking
technologies.
This connection will then allow the automatic flow of data.
While convenient, this technology also defines several security
Document Page
Background
IoT’s initial implementation can be traced back to the 1980s.
Through early networking technologies, computers shared information.
However, its popularity grew in the 1990s due to the growth of the digital technology.
Today, IoT is applied in all major fields from healthcare to the transportation industry.
Its systems currently outnumber people in workplace environment.
A figure that will surpass most hub devices such as smart phone in the next two years.
Document Page
Architecture and Technologies
New models other than internet and TCP/IP are needed to meet IoT demands.
To further the development of IoT, a number of multilayered architectures are proposed.
Here we look at a five layered model:
1. Coding Layer: The foundation layer that identifies objects.
2. Perception Layer: The device layer where physical meaning is given to all objects.
3. Network Layer: This layer receives digital data and transmits it for processing.
4. Middleware Layer: This layer processes the data collected.
5. Application Layer: The final layer that realizes the implementation of IoT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security Analysis of IoT
IoT extends internet connectivity to the physical world.
Thus extend the security and privacy problem of the internet to itself.
Therefore, IoT must be analyzed based on the flow of information and security threats.
This analysis could follow the implementation model identified above.
A differentiated control system can also be used to avoid data breaches.
In all, security should be adaptable, similar to the technology itself.
Document Page
Security Goals
Two major security goals are defined by IoT: Authentication mechanisms and
confidentiality.
To meet these objectives the CIA model is used.
1. Data Confidentiality - providing users with freedom from external interferences.
2. Data Integrity - protection of data from external during the transmission process.
3. Data Availability - authorized members access IoT resources when needed.
Document Page
Security Challenges and Issues
IoT has developed revolutionary ideas to combat its security issues.
They include; a new implementation model designed with security systems, advanced
user protocols such as IPsec and strict access methods.
However, some limitation still exits:
1. Unauthorized access to tags - RFID system still lack proper authentication mechanisms which
limit their security functions.
2. Eavesdropping – wireless technologies are susceptible to intrusion.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cont..
Spoofing - the widespread connectivity of devices makes it easier to access different
systems.
RF jamming - Although not limited to RF tags, jamming can be used to limit the
users’ access to networked resources e.g. in Dos attacks.
Phishing - A common form of attack used today where users are lured to open emails
which then grant intruders access to confidential information.
Document Page
Conclusion
Internet of Things is set to revolutionize the digital world by extending connectivity.
Through its functions, devices will become fully automated.
Although filled with conveniences, this outcome will also face several security
problems.
As such, its main implementation hurdles are privacy and security.
To solve these problems better authentication, intrusion detection systems and
Document Page
References
Farooq, M., Waseem, M., Mazhar, S., Khairi, A & Kamal, T. (2015). A Critical Analysis on the Security
Concerns of Internet of Things (IoT). International Journal of Computer Applications, 111(7). Retrieved 18
May, 2018, from: https://pdfs.semanticscholar.org/35f0/899d941e9e34ff1225448c21662d5ccca74c.pdf
Farooq, M., Waseem, M., Mazhar, S., Khairi, A & Kamal, T. (2015). A Review on Internet of Things (IoT).
International Journal of Computer Applications, 113(1). Retrieved 18 May, 2018, from:
https://pdfs.semanticscholar.org/2006/d0fca0546bdeb7c3f0527ffd299cff7c7ea7.pdf.
Liu, X., Zhao, M., Li, S., Zhang, F. & Trappe, W. (2017). A Security Framework for the Internet of Things in
the Future Internet Architecture. Future Internet. Retrieved 18 May, 2018, from:
http://www.mdpi.com/1999-5903/9/3/27/pdf.
Maple, C. (2017). Security and privacy in the internet of things. Journal of Cyber Policy, pp. 155-184.
Retrieved 18 May, 2018, from: https://www.tandfonline.com/doi/full/10.1080/23738871.2017.1366536
Razzaq, M., Qureshi, M., Gill, S & Ullah, S. (2017). Security Issues in the Internet of Things (IoT): A
Comprehensive Study. International Journal of Advanced Computer Science and Applications, 8(6).
Retrieved 18 May, 2018, from:
https://thesai.org/Downloads/Volume8No6/Paper_50-Security_Issues_in_the_Internet_of_Things.pdf.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]