Assessment 3: Internet of Things Security and Privacy Vulnerabilities

Verified

Added on  2025/04/30

|3
|361
|244
AI Summary
Desklib provides past papers and solved assignments for students. This report examines IoT security and privacy.
Document Page
Assessment-3
Security and privacy issues on the Internet of
Things
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract
Internet of thing is the combination of everyday things encompassed with sensors, software
electronics, actuators and gateway which are directly connected through internet. An IoT device
has sensors and processing power which is used to (Weber, 2010). collects and communicates
data. With the advancement of technology, the IoT devices have come into our daily used items
including remote, TV, connected vehicles, smart city, medical and etc. IoT devices collect
information, to analyze it and take necessary action. The Services offered by IoT have made
human lives very easy going and fast.
IoT devices are prone to many security and privacy issues. IoT structure has three-layer physical,
network and application layer. Physical attacks occur when an attacker come closer from the
device. The Network attack happens when IoT networks are altered. System Attack occurs there
are software vulnerabilities in device. Encryption attack occurs when an attacker breaks the code
and damage encryption process. To secure IoT devices from such attack reactive
countermeasures are needed to take. Applying cryptography hash algorithm, installing an error
detection system, Authentication of new device must be done before transmission or receiving
any data. End-to-End encryption could be used to protect the network layer (Yang. Et.al, 2017).
One of the issues which are a major concern in IoT devices is of privacy issues. IoT devices have
the risk of connecting unsecured devices and hence failing in creating a robust system. IOT
devices collect personal information of users through the sensor. Aggregating processing and
analyzing that data will extract full information of the user. Various privacy technologies are
used to ensure and enhance privacy in IoT devices. Virtual (Yang. Et.al, 2017). Private
Networks, DNS security Extension, Routing, Transport Layer Security and Private Information
Retrieval will help ensure privacy.
Ensuring security and Privacy system will bring trust in the IoT devices.
Document Page
Reference
Weber, R. H. (2010). Internet of Things–New security and privacy challenges. Computer law &
security review, 26(1), 23-30.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in
Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250-1258.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]