Comprehensive Report on Security Risks and Threats in IoT Networks

Verified

Added on  2022/09/14

|5
|3360
|15
Report
AI Summary
This report explores the security risks and threats associated with the Internet of Things (IoT). It identifies key concerns such as malware, DDoS attacks, and the lack of adequate security measures in IoT systems. The research employs a qualitative design and inductive approach, gathering data through content analysis of existing literature. The report emphasizes the importance of implementing firewalls and encryption techniques to mitigate cyber threats. The study reviews various security vulnerabilities, including misconfigurations and unauthorized access, highlighting the need for comprehensive security protocols. The literature review synthesizes existing research, revealing the impact of security breaches on data privacy and financial stability. The report underscores the necessity for improved security awareness and the adoption of robust security standards within the IoT ecosystem to protect sensitive information and ensure operational reliability. It suggests that organizations must prioritize the development and deployment of effective security measures to safeguard against evolving cyber threats.
Document Page
IT 1
Abstract
IoT is a foremost knowledge that provided a way to
interconnect computing systems and machines easily
and exchange data within less time. The uses of IoT
devices are enhancing day by day where security is a
thoughtful anxiety that affects the private details of
the consumers. This research identifies various
security threats associated with the IoT systems and
reviews the risk factors. There are different methods
adopted including qualitative design, inductive
approach, data gathering, and content analysis. The
added literature helped to obtain secondary data
about IoT and its security concerns. It is proposed
that societies should include firewalls and encryption
techniques for addressing DDoS and malware
attacks.
Keywords: IoT, security risks, malware, DDoS,
firewall and encryption
INTRODUCTION
IoT is a type of communication network which is
adapted to intersect digital machines, computing
systems and physical systems with unique identifiers.
It is capable to share data over a server without using
an individual to individual communication. Using
such kind of system, business communities can
communicate with the computing devices and
manage the connection between physical devices and
computing devices. In this group, the adoption of IoT
is growing quickly and assistances to achieve
communication connected anxieties and lead
commercial presentation efficiently [1]. Safety is a
stimulating portion of IoT by which corporations are
fronting cyber-crimes and safety anxieties. It is found
that above 58% of the corporations are facing safety
bouts because of the lack of consciousness and
attendance of illegal actions. The contribution of the
research is to regulate the safety problems related to
the IoT. In this investigation, systematic literature
will be adopted for studying the results of previous
articles and probing real opinions about IoT safety
questions.
RESEARCH AIMS AND OBJECTIVES
AIM
To determine security risks linked with IoT networks
OBJECTIVES
ï‚· To find the concept behind IoT
ï‚· To determine security threats related to IoT
ï‚· To conduct literature to review risk
influences foremost security risks in IoT
RESEARCH QUESTIONS
ï‚· What is the concept behind IoT?
ï‚· What are the security threats and risks
related to IoT?
LITERATURE REVIEW
It is tinted that safety intimidations in IoT are a
shared theme for the study and recently numerous
articles were printed that will be studied in this
chapter. The involvement of the literature is to accept
operative opinions about privacy concerns related to
IoT.
Galeano-Brajones, et al., (2020) stated that IoT is
suitable machinery that assistances corporations to
implement dependable schemes for growing business
processes [1]. IoT usages wireless nets and stations
that are less tenable and operative where the attackers
do riding actions and crop data breach anxieties. It is
established that the IoT nets used by the businesses
can lead to safety intimidations and attacks due to the
absence of refuge and attendance of illegal
indications in the computers. Ozawa, et al., (2020)
highlighted that safety is a major curb of IoT nets due
to which the subtle information of the corporations
can be broken by transporting the fraud signs to the
computer systems [2].
Different types of cyber-crimes happen in the IoT for
instance malware, DDoS, ransomware, phishing and
so on. The occurrence of these attacks or crimes may
support the hackers to gather login authorizations of
the systems and entrée all dependable data
effortlessly. It is demonstrated that the main 3 risk
issues growing safety terrorizations in the IoT such as
the absence of consciousness, misconfiguration of
systems and unauthorized entrée. Misconfiguration of
the communiqué system is a key factor in which the
attackers transfer malicious cryptograms and gain the
convenience of data and corporations can agonize
from the data break difficulties.
Security issues in IoT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT 2
Chuang, and Hung, (2020) reinforced this argument
and decorated that many attackers exploit malicious
packages which are accomplished to produce
superior unwanted systems or relations and handover
to the communiqué systems related with IoT systems
for acting hacking actions [3]. Above 57% of the
corporations universal were faced with malware and
DDoS crimes due to IoT schemes. Consequently, it is
tinted that the practices of IoT systems are helpful for
the corporations but also lead the safety dangers and
anxieties in the businesses.
Deshmukh-Bhosale, and Sonavane, (2020) stated that
DDoS is a foremost safety bout that has the capability
to decrease the safety of IoT systems and get login
niceties of the computer campaigns effortlessly [4].
The attackers use malware gears and transmission
traffic signs to the IoT systems that assistances to
decrease privacy and obtainability of data simply.
Commercial groups are not talented to notice traffic
signs from the message structures that leading
hacking and data damage problems.
It is dogged that ransomware is a type of hacking
process that happens in the systems adopted by the
businesses. It is a portion of malware in which the
attackers obtain malicious systems and admission the
login identifications of the computer systems.
Afterward this procedure, the offenders encode all
dependable info and request payment from the
corporations and fatalities which may produce moral
anxieties and monetary problems.
Consequently, it is stated that the attendance of safety
intimidations in IoT may principal to unlawful, moral
and fiscal anxieties in the groups that may
damagingly influence the secluded data and
efficiency. Kunugi, Suzuki, and Koyama, (2019)
showed a review and decorated that above 60% of the
members decided that attendance of illegal admission
can assistance the criminals to achieve cyber-threats
and pucker all subtle data in the fewer period [5]. The
use of less secured message nets can crop glitches for
the corporations and face the statistics loss connected
anxieties effortlessly. Many corporations are now
concentrating on safety and applying operative safety
standards and observe while expending IT systems
and IoT networks in the occupational.
Frustaci, et al., (2017) demonstrated that safety
susceptibilities such as malware signals,
misconfiguration of systems and illegal actions need
to be lectured for protecting IoT systems and delicate
data from the attackers and improve the safety of
information [6]. It is established that IoT systems can
be chopped by radio overcrowding procedures which
are mostly utilized by the attackers and admission of
the message stations adopted by the governments.
The key anxiety behind the safety threat is that the
corporations do not deliver whole training to the
staffs that straight impact on the message systems
and crop the cyber-crimes simply. Hossain, Fotouhi,
and Hasan, (2015) described that encryption is a
noteworthy method that may be putative by the
governments where the attackers are not
accomplished to notice the signs moved by the
operators [7].
Moreover, operators must conscious of criminals and
decrease unwelcome and illegal indications from the
schemes. The preceding works determined that
hacker usages botnet schemes for plummeting
confidentiality of IoT nets which are related to the
computer systems of the groups. For example,
Amazon, eBay, and Uber were suffered from
malware and DDoS crimes newly and lost sensitive
data. So, safety is a key unruly that desires to be
achieved by applying the safety values and rules in
the office.
It is examined that the corporations do not comprise
firewall-linked procedures while emerging IoT
schemes in which the designers must contrivance
firewall gears for detecting and handle malware signs
effortlessly. Many hackers transfer the spam signals
to the servers that produce phishing related concerns
and help to obtain login details and access database
systems. So, for addressing the phishing related
threats, the companies can implement anti-phishing
techniques and tools in the IoT enabled systems. This
systematic literature recognized frequent safety
attacks that happened in the IoT and the earlier
educations delivered less operative info that shaped
breaks that are lectured in this research.
RESEARCH METHODOLOGY
This section of the investigation contains various
study approaches and methods such as investigation
design, strategies, data obtaining process, and many
more. Mahmoud, et al., (2015) described that the
adoption of research methodology in the study is
operative by which the writers can catch consistent
data and resolve the investigation related concerns
[8]. The contribution of the methodology is to
enhance consciousness about the cyber-security bouts
related to the IoT systems. The adoption of effective
research techniques helped to gain the investigation
quality and its cogency by utilizing numerous
evidence about the investigation.
Document Page
IT 3
RESEARCH PHILOSOPHY
Matharu, Upadhyay, and Chaudhary, (2014)
highlighted that philosophy is substantial to produce
logical intellectual to judge, exploit, and puddle the
evidence related to exploration problems [9]. The
major purpose of adopting an investigation
philosophy is to implement and consider the
assumption and contradicted of persons as it is a
noteworthy instrument to catch factual info. This
supposition and confidence could be adopted as the
dishonorable of investigation plans. There are 2 sorts
of philosophies could be adopted by an investigator
like interpretivism and positivism philosophies. The
assortment of philosophies trusts on the truthful plan
of investigation. The positivism accentuates on truths
and facts composed via thought. Under the
positivism, the scholar has imperfect to data
combining about the issue since it does not reflect
humanoid attention in leading the investigation.
For this research, interpretivism philosophy is
adopted to improve investigation excellence. The
chief reason for consuming this idea is that it is
connected to the logical location of romanticism. It
helped to highlight diverse methods concerning
investigation issues. This investigation is based on
the individual countryside so interpretivism
philosophy is adopted by the writer.
RESEARCH DESIGN
It is operative to plan the investigation assembly.
Through effective design, an investigation can
become the right way to understand the investigation
subject to find valuable and fitting data. It is found
that there are dissimilar types of designs that may be
adopted in the investigation, for example,
quantitative and qualitative. The quantitative design
provides arithmetical info by consuming the
statistical method. Qualitative design permits the
scholar to make belief and produce a hypothesis.
In this paper, the qualitative design is added because
of the subjective behavior of the topic where it helped
to gather theoretical information about IoT security
concerns. Using such a design, the writer developed
effective plans and completed the research within the
desire time period. Moreover, the developed
questions are addressed by the investigators through
qualitative design.
RESEARCH APPROACH
Sha, et al., (2018) demonstrated that the research
approach is a crucial portion of methodology since it
fixes the source for picking the precise technique of
exploration [10]. It is mainly considered into
dissimilar portions like inductive and deductive
approaches. Leloglu, (2016) found that the inductive
method is employed to evaluate the depth comment
of evidence and also fashioned academic
characteristics regarding the topic [11]. On the
opposite side, a deductive method is employed to
paradigm the hypothesis. The preparation of a
hypothesis can help the scholars to receive the
research technique related to the investigation issue.
The inductive method is used by an investigator due
to particular countryside of investigation. This
approach helped to interconnect interpretivism
philosophy with the research and managed the flow
of information in the paper. There is no necessity to
build the hypothesis hence inductive is adopted that
provided depth information about IoT security risks.
Along with this, this approach provided a way to
gather the enormous data related to the security
threats and vulnerabilities associated with the IoT
systems used by the companies. Using such an
approach, the writer managed research gaps and
enhanced the research quality in a reliable manner.
DATA COLLECTION
The data obtaining method is noteworthy to reach the
aim and points of investigation as this method
permits an investigator to pool the data
professionally. There are dissimilar data assortments
methods may be realized by a scholar like primary
and secondary data. In this mode, primary data is
shared from fresh foundations like a focus
assemblage, remark, interview, and review. At a
similar period, secondary data is mutual from
dissimilar bases like a journal article, files, online
places, annual bang and offline bases [13].
In this paper, the secondary methodology is adopted
due to the theoretical nature of the topic that helped
to obtain the reliable and appropriate information in
regards to the IoT security threats and concerns. For
gathering secondary data, numerous sources are used
by the writer such as peer-reviewed papers, online
websites, books and many more. Systematic literature
is added that helped to review the viewpoints of other
writers about IoT and security concerns and provided
a way to address research aims and concerns
effectively.
DATA ANALYSIS
Data analysis is a noteworthy portion of the
investigation methodology as it delivers reliable and
precise outcomes. Further numerous methods could
be applied to examine the data like Excel, content
examination, and SPSS and so on. There are
dissimilar methods of data examination such as
inferential and statistical. For this research, the
Document Page
IT 4
descriptive content analysis is adopted for
interpreting the obtained data. Using such
methodology, the gathered data from secondary
resources are analyzed in a reliable manner.
Moreover, the content analysis helped to obtain
appropriate findings in the research that helped to
address research concerns and enhance the research
quality in an appropriate manner.
RESULTS AND DISCUSSIONS
It is found that safety is a key problem associated
with the IoT technology that directly impacts on the
presentation of communication systems and leads
data breach issues. From the systematic literature, it
is demonstrated that misconfiguration and illegal
activities both are main influences leading cyber-
attacks and intimidations in the IoT systems that also
impact on the sensitive data of the communities [12].
The adopted methods helped to obtain larger
information about IoT security issues and managed
the research gaps associated with the recent studies.
The utilization of firewalls and encryption techniques
can help the users to enhance the privacy of
communication channels in IoT networks and
manage the problem of hacking easily. This paper
discussed the importance of such security tools and
examined that the companies should implement
firewall-based systems in the computers for detecting
and examining the malware signals. In terms of
effectiveness, the obtained data from secondary
methods are more reliable that supported the included
arguments and provided a way to complete the
research with better outcomes. The content analysis
technique helped to analyze and evaluate the
secondary data and delivered appropriate findings
and results in the study.
CONCLUSIONS AND RECOMMENDATIONS
It may be précised that IoT is a reliable skill but it is
significant to manage security concerns that can lead
the cyber-crimes and data breach activities in the
businesses. This report highlighted the safety
intimidations and problems associated with the IoT
systems and identified their impacts on the business
performance and personal data. The added literature
helped to gather secondary data about IoT and
provided depth information about security threats. It
is established that DDoS and malware are chief
attacks that happened in the IoT systems that need to
be addressed on a priority basis as the data of users
can be hacked easily through such attacks. Therefore,
it is recommended that communities must implement
firewalls and encryption-based systems in the IoT
devices that may support the servers and identify the
unwanted and traffic signals transmitted by the
attackers. Moreover, managers should provide
training to workers and implement effective security
policies and plans along with the IoT systems.
References
[1]. Galeano-Brajones, J., Carmona-Murillo, J.,
Valenzuela-Valdés, J.F. and Luna-Valero,
F., (2020) Detection and Mitigation of DoS
and DDoS Attacks in IoT-Based Stateful
SDN: An Experimental
Approach. Sensors, 20(3), p.816.
[2]. Ozawa, S., Ban, T., Hashimoto, N.,
Nakazato, J. and Shimamura, J., 2020. A
study of iot malware activities using
association rule learning for darknet sensor
data. International Journal of Information
Security, 19(1), pp.83-92.
[3]. Chuang, P. J., and Hung, T., (2020)
Enhanced attack blocking in iot
environments: Engaging honeypots and
machine learning in SDN OpenFlow
switches. Department of Electrical and
Computer Engineering, 23(1), pp.163-173..
[4]. Deshmukh-Bhosale, S. and Sonavane, S.S.,
(2020) Design of Intrusion Detection
System for Wormhole Attack Detection in
Internet of Things. In Advanced Computing
and Intelligent Engineering, 12(6), pp. 513-
523.
[5]. Kunugi, Y., Suzuki, H. and Koyama, A.,
(2019) IoT Security Viewer System Using
Machine Learning. In International
Conference on Advanced Information
Networking and Applications, 12(6), pp.
1071-1081.
[6]. Frustaci, M., Pace, P., Aloi, G. and Fortino,
G., (2017) Evaluating critical security issues
of the IoT world: Present and future
challenges. IEEE Internet of things
journal, 5(4), pp.2483-2495.
[7]. Hossain, M.M., Fotouhi, M. and Hasan, R.,
(2015) Towards an analysis of security
issues, challenges, and open problems in the
internet of things. In 2015 IEEE World
Congress on Services, 12(6), pp. 21-28.
[8]. Mahmoud, R., Yousuf, T., Aloul, F. and
Zualkernan, I., (2015) Internet of things
(IoT) security: Current status, challenges
and prospective measures. In 2015 10th
International Conference for Internet
Technology and Secured Transactions
(ICITST), 12(6), pp. 336-341.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT 5
[9]. Matharu, G.S., Upadhyay, P. and
Chaudhary, L., (2014) The internet of
things: Challenges & security issues.
In 2014 International Conference on
Emerging Technologies (ICET), 12(6), pp.
54-59.
[10]. Sha, K., Wei, W., Yang, T.A.,
Wang, Z. and Shi, W., (2018) On security
challenges and open issues in Internet of
Things. Future Generation Computer
Systems, 83, pp.326-337.
[11]. Leloglu, E., (2016) A review of
security concerns in Internet of
Things. Journal of Computer and
Communications, 5(1), pp.121-136.
[12]. Yoon, S., Park, H. and Yoo, H.S.,
(2015) Security issues on smarthome in IoT
environment. In Computer science and its
applications, 12(6), pp. 691-696.
[13]. Lee, K., Kim, D., Ha, D., Rajput,
U. and Oh, H., (2015) On security and
privacy issues of fog computing supported
Internet of Things environment. In 2015 6th
International Conference on the Network of
the Future (NOF), 12(6), pp. 1-3.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]