Analyzing IoT Security and Privacy Regime: Challenges in All Domains

Verified

Added on  2023/06/13

|2
|1568
|228
Report
AI Summary
This report provides an overview of the security and privacy challenges within the Internet of Things (IoT) across various domains. It begins with an introduction to IoT and its expanding network of physical objects connected via the internet. The report highlights the benefits and innovations brought by IoT, particularly in domains such as smart cities and healthcare. However, it also addresses critical security issues, including the lack of data encryption, data authentication problems, and hardware vulnerabilities. The report discusses potential solutions, such as using SSL protocols for online data protection and wireless protocols for secure data transfer. It emphasizes the importance of hardware testing and the need for robust security measures to prevent data loss and protect users across all IoT domains. This analysis aims to provide a comprehensive understanding of the security landscape within IoT and potential mitigation strategies.
Document Page
IoT Security and Privacy Regime/Challenges
in All Domains of IoT
1. INTRODUCTION (15 MARKS)
IoT or Internet of Things is the network of all
types of physical objects. This network is
continuously growing and even features any
specific IP address to connect with the Internet
(Wortmann & Flüchter, 2015). The communication
within the physical objects and the all the devices
that are enabled with the Internet connection is
solely done by this Internet of Things. The
extension of the connection of Internet is
completed by the IoT and this type of extension is
beyond the several traditional equipments such as
laptops, tablets, smart phones, personal computers,
desktops and many more (Yang, 2014). There is a
diverse range of all types of devices that help the
user in utilizing the embedded technology for
successfully communicating as well as interacting
with the external environment. Each and every
operation with the Internet of Things is completed
only through the Internet connection. There are
various examples of Internet of Things (Lee et al.,
2013). The most significant examples of IoT
mainly include connected cars, security systems,
electronic appliances, vending machines, alarm
clocks, household lights and many more.
1.1. IoT Security and Privacy Regime
1.1.1 Background
Internet of Things is the next step towards
advancement of technology in the modern
technological world (Mulani & Pingle, 2016). It is
responsible for several innovations for the users.
The future of this particular technology is
extremely bright and has huge scope for bringing
out more theories and success. It is estimated that
by the end of the year of 2020, this technology of
Internet of Things would be ruling the entire
technological world. This is the upcoming
advancement of cloud computing (Gubbi et al.,
2013). There are various domains in the enhanced
sector of Internet of Things or IoT. The most
important and popular domains of this particular
technology majorly involve smart city, health care,
industry fields, fog computing and many more.
This technology is making all these fields or
domains absolutely effective and efficient and thus
reducing the problem of weak technology (Da Xu,
He & Li, 2014). Within the domain of smart city,
IoT is responsible for providing the smart cars,
smart streetlights and many other features for the
benefit of the citizens. This helps to reduce the
traffic congestion within the city. The second
important domain is the health care (Zhao & Ge,
2013). Medical field and IoT has the best type of
amalgamation within the technological world. The
medical resources and technology is enhanced with
this application. The most significant application
within the field of health care mainly include the
fitness tracking, health monitoring system, heart
beats tracking and several others (Jing et al., 2014).
Apart from the patients, even the doctors are
benefitted from this type of application.
1.1.2 Security Issues or Challenges in IoT
Applications
Although, the Internet of Things or IoT is
responsible for producing various advantages to the
various sectors, thus providing huge advantages to
the users, there are some of the major problems
within this technology (Gubbi et al., 2013). The
applications that IoT provide are often dealt with
several security and privacy issues or challenges.
These issues or challenges are extremely vulnerable
and threatening for the information or data or even
life of the user. Each and every domain of the
Internet of Things comprises of all these security
issues (Wortmann & Flüchter, 2015). These types
of challenges should be mitigated immediately so
that the user is not in any type of problem. The
most significant and vital challenge that the user
faces is the lack of encryption of data.
Cryptography is the best method to secure any data.
It helps to preserve the data by means of encryption
or decryption. The applications of Internet of
Things eventually collect and preserve the data and
the processing or retrieval of data is done with that
data (Mulani & Pingle, 2016). This type of data is
extremely sensitive and confidential and hence it is
strongly protected with the help of encryption. The
second vital challenge in IoT security is the data
authentication. In every domain of IoT, the
authenticity and integrity of the data involved
should be protected. However, IoT does not
promise any of the two. There is always a high
chance the data would be leaked and the user of the
data would be in grave danger (Yang, 2014).
Moreover, the unauthorized users can use the data
for wrong intentions. The third important security
issue in Internet of Things applications is the
problem with hardware. The hardware could crash
and the data would be lost forever. Furthermore,
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IoT does not provide any type of hardware security
or guarantee to its users (Da Xu, He & Li, 2014).
Side Channel attacks are again one of the most
significant attacks in every domain of IoT. These
privacy and security issues could be absolutely
dangerous for the users and is present in each and
every domain of IoT.
Although, IoT has various security or privacy
issues within their applications in every domain,
there are solutions for each and every problem
(Jing et al., 2014). For the first significant problem
of data encryption, it should be solved on an
immediate basis. For addressing this particular
issue, SSL or Secure Sockets Layer Protocol could
be utilized, whenever the data is online. This type
of certification helps in encrypting as well as
protecting the online data of the user. The second
method is to utilize with the help of wireless
protocol (Wortmann & Flüchter, 2015). When the
data is transferred wirelessly, encryption should be
present. Wireless protocol helps to encrypt the data
while it is being transferred. For the second
problem of data authentication and integrity in case
of smart city, a specific temperature sensor is to be
developed for the smart homes. When, the data is
being transferred, there is no particular method for
authenticating the data source (Zhao & Ge, 2013).
This could easily lead to the making up of fake or
forged data and thus sending to the authorized
users. This often leads to the security risk of the
user. For the third problem of hardware issues, the
hardware should be tested before utilizing them.
The best methods of testing the hardware mainly
include device range, latency or capacity,
manufacturability test and many more (Jing et al.,
2014). The security issues of IoT can lead to major
and significant data loss and threaten to the entire
society for all the domains of IoT.
Structure of the Report
Abstract
1. Introduction
1.1. IoT Security and Privacy Regime
1.1.1. Background
1.1.2. Security Issues or Challenges in IoT
Applications
REFERENCES
Da Xu, L., He, W., & Li, S. (2014). Internet of
things in industries: A survey. IEEE
Transactions on industrial
informatics, 10(4), 2233-2243.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami,
M. (2013). Internet of Things (IoT): A
vision, architectural elements, and future
directions. Future generation computer
systems, 29(7), 1645-1660.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu,
D. (2014). Security of the Internet of
Things: perspectives and
challenges. Wireless Networks, 20(8),
2481-2501.
Lee, G. M., Crespi, N., Choi, J. K., & Boussard, M.
(2013). Internet of things. In Evolution of
Telecommunication Services(pp. 257-
282). Springer, Berlin, Heidelberg.
Mulani, T. T., & Pingle, S. V. (2016). Internet of
things. International Research Journal of
Multidisciplinary Studies, 2(3).
Wortmann, F., & Flüchter, K. (2015). Internet of
things. Business & Information Systems
Engineering, 57(3), 221-224.
Yang, S. H. (2014). Internet of things. In Wireless
Sensor Networks (pp. 247-261). Springer,
London.
Zhao, K., & Ge, L. (2013, December). A survey on
the internet of things security.
In Computational Intelligence and
Security (CIS), 2013 9th International
Conference on (pp. 663-667). IEEE.
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]