IoT Security and Privacy Challenges in IoT Domains - Milestone 1

Verified

Added on  2023/06/14

|2
|714
|196
Report
AI Summary
This report delves into the security and privacy challenges associated with the Internet of Things (IoT) across various domains. It highlights that IoT, a network of physical devices embedded with electronics, software, sensors, and connectivity, facilitates data exchange and connection. The report addresses issues such as insufficient authentication, lack of transport authentication, insecure mobile or web interfaces, default credentials, and privacy concerns stemming from the collection and aggregation of personal information. It also emphasizes the security risks posed by the lack of standardized security measures for IoT devices. The assignment brief includes analysing the task, defining the report's purpose and chosen topic, formatting expectations, problem statement development, and abstract writing. Desklib provides access to this report and other solved assignments for students.
Document Page
IoT Security and Privacy challenges in all domains
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ABSTRACT – this report is generally associated with the discussion regarding the various security and privacy
challenges of the IoT or Internet of Things in various domains. IoT generally refers to the network of physical devices,
vehicles, homes and many more, which are generally embedded along with the electronics, software’s, sensors, actuators
and connectivity helping in exchanging of data as well as creating connection. Each thing included can be identified
uniquely by the embedded computing system but they are also capable of interoperating by use of the internet
infrastructure that is existing. Simply it can be stated that IoT is a computing concept, which can be used for describing
the ideo of every physical devices being connected to each other by use of the internet and are capable of making
themselves identifiable for other devices. This is an emerging technology and has various risk associated with its privacy
and security.
1. PURPOSE OF THE REPORT
The report mainly discusses about the various challenges
that exist regarding the security and the privacy of the IoT
technology in all domains. IoT is an emerging technology and
has been adopted in various fields for making the work easy.
With emergence of this technology the risk associated with it
are also increasing data by day.
2. CHOSEN TOPIC
The topic that has been chosen for this report is “IoT
Security and Privacy Regime/challenges in all domains of
IoT”.
3. EXPACTED FORMAT
The format that is to be used for the reform is IEEE format.
The structure of the report is provided below:
Abstract
Introduction
Literature Review
Issues, Challenges, Solutions
Future Research
Advantages and disadvantages
Conclusion
References and Presentation
4. PROBLEM STATEMET
The IoT technology has promised for providing
unprecedented and ubiquitous access to device that are
associated with the success of everything in different fields.
Some of the security and privacy challenges have been
discussed below.
4.1. INSUFFICIENT AMOUNT OF AUTHENTICATION
There is an existence of several devices which are
associated with the use of weak or simple password. Along
with this the authentication process is also very much simple
which allows the attackers to gain access of the devices very
easily.
4.2 LACK OF TRANSPORT AUTHENTICATION
Ther are many cases where it can be seen that when a data
which is being transferred lacks encryption which puts the
data in front of risk like hacking and many more. It has also
been seen that the data are not encrypted even when the
device is connected to internet.
4.3. INSECURE MOBILE OR WEN INTERFACES
It has been seen that most of the IoT-based solutions are
associated with the usage of of mobile or wen based interfaces
for the purpose of device management or for the consumption
of the aggregated data. It has been found that this type of
interfaces are prone to the top 10 vulnerabilities of OWASP or
Open Web Application Security Project and this mainly
includes the poor management of sessions, default credentials
which are weak and vulnerabilities related to cross-site
scripting.
4.4. DEFAULT CREDENTIALS
Most of the devices makes use of the default credentials
that is username and password. Due to this reason, the
attackers can get a very easy access to the devices and
perform all their unethical works. The default credentials can
be identified vary easily.
4.5. PRIVACY CONCERNS
IoT devices that are generally used in different domains
like the healthcare domain and many more is generally
associated with collection of at least one personal information
or PI of the user. but due to the fact that there are many
devices which are associated with transferring of data without
any type of encryption puts the privacy of the users at risk.
Privacy risk also arises when the objects present within the
IoT collects and aggregates the fragments of data, which are
related to their service.
4.6. LACK OF STANDARDS
Lack of security standards possess a great amount of
security risk for the IoT devices.
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]