Internet of Things (IoT) Security and Privacy Analysis: ITC595 Report
VerifiedAdded on 2025/04/30
|3
|372
|351
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes security and privacy in IoT.

ITC595 - INFORMATION SECURITY
ASSESSMENT ITEM 3
Topic: Security and privacy issues in Internet of Things (IoT) /Smart Architectures
ASSESSMENT ITEM 3
Topic: Security and privacy issues in Internet of Things (IoT) /Smart Architectures
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Abstract
IoT is the system that was interrelated with the digital machines, mechanical machines,
computing devices, objects with the unique id’s or the identifiers and also have the ability for
transferring data or information with the use of network area without the requirement of the
interaction between computers and human beings. IoT was categorized by the diverse
technologies that correspond to the provision of the innovative service in the application of
numerous domains. IoT covers from the old-style equipment to the general objects of
households, that is, RFID and WSNs (Tewari & Gupta, 2018).
Mainly, it is focusing on the security and the privacy issues on the Internet of Things. Structure
of IoT was dependent on the Internet, where problems of internet security will be shown in the
IoT. IoT includes three types of layers such as application layer, transportation layer, and
perception layer. In the paper, the problems of internet security were analyzed in every layer
separately. It also used to find new solutions and problems of internet security. There was
various IoT application that ranges between industries and the households. These IoT
applications were facility management, inventory management, quality control and many more.
Every layer of the IoT architecture having privacy and the privacy issues that were addressed to
secure the IoT applications. Many issues of security and the privacy were taken at the starting or
the first stage of the system design. There were many types of issues that were faced by the
layers such as node capture, DoS Attack, Scalability, data management, mutual authentication,
and many more (Mocrii, et al., 2018).
IoT devices have used operating systems for the integration of numerous software products and
also the increment in the network functionality. The operating system used in the IoT was mbed,
ROIT, Contiki, and Nano-RK.
IoT is the system that was interrelated with the digital machines, mechanical machines,
computing devices, objects with the unique id’s or the identifiers and also have the ability for
transferring data or information with the use of network area without the requirement of the
interaction between computers and human beings. IoT was categorized by the diverse
technologies that correspond to the provision of the innovative service in the application of
numerous domains. IoT covers from the old-style equipment to the general objects of
households, that is, RFID and WSNs (Tewari & Gupta, 2018).
Mainly, it is focusing on the security and the privacy issues on the Internet of Things. Structure
of IoT was dependent on the Internet, where problems of internet security will be shown in the
IoT. IoT includes three types of layers such as application layer, transportation layer, and
perception layer. In the paper, the problems of internet security were analyzed in every layer
separately. It also used to find new solutions and problems of internet security. There was
various IoT application that ranges between industries and the households. These IoT
applications were facility management, inventory management, quality control and many more.
Every layer of the IoT architecture having privacy and the privacy issues that were addressed to
secure the IoT applications. Many issues of security and the privacy were taken at the starting or
the first stage of the system design. There were many types of issues that were faced by the
layers such as node capture, DoS Attack, Scalability, data management, mutual authentication,
and many more (Mocrii, et al., 2018).
IoT devices have used operating systems for the integration of numerous software products and
also the increment in the network functionality. The operating system used in the IoT was mbed,
ROIT, Contiki, and Nano-RK.

Reference
Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in Internet-of-
Things (IoTs) framework. Future Generation Computer Systems.
Mocrii, D., Chen, Y., & Musilek, P. (2018). IoT-based smart homes: A review of system
architecture, software, communications, privacy and security. Internet of Things, 1, 81-98.
Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in Internet-of-
Things (IoTs) framework. Future Generation Computer Systems.
Mocrii, D., Chen, Y., & Musilek, P. (2018). IoT-based smart homes: A review of system
architecture, software, communications, privacy and security. Internet of Things, 1, 81-98.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 3
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.