IoT Security: Vulnerabilities, Attacks, and Countermeasures Report

Verified

Added on  2021/04/16

|12
|489
|132
Report
AI Summary
This report provides a comprehensive overview of security in the Internet of Things (IoT). It explores the vulnerabilities inherent in IoT devices, including those related to device interactions, poor password security, lack of encryption, and the use of low-cost devices. The report details various security attacks and their impact, such as information breaches, hacking, and manipulation. It also proposes a range of countermeasures, including the monitoring of IoT devices and networks, the use of automated tools for intrusion detection, and the implementation of strict laws and intellectual property rights. Furthermore, the report evaluates the value of project documentation, highlighting the importance of including research questions, methodologies, and references. The report also suggests improvements, such as the inclusion of figures, charts, and a more elaborated conclusion section. The report is based on research and includes references to academic sources.
Document Page
Security in the
Internet of
Things
Final Blog Entry & Evaluation of the Value of
Project Documentation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
• IoT is being used in industrial sectors
• Newer IoT applications being developed
• Smart Home Automation System
• Office Automation System
• Smart Parking System
• Benefits of the Applications – Speed, Accuracy, &
Quality
Document Page
IoT Applications –
Disadvantages
• Security & Privacy Issues
• Device-related Security Attacks
• Smartphones
• Networking Equipment
• Computer Systems
• Electrical Appliances
• Home Appliances
Document Page
Security Vulnerabilities
• Devices are the primary threat agents
• Vulnerabilities used by malicious entities
• Information breaches, hacking, or manipulation
attacks
• Attacks due to device interactions
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security Vulnerabilities
• Use of poor passwords
• Absence of encryption
• Low priced devices opted by the users
• Delay in security updates
Document Page
Set of Control &
Countermeasures
• Monitoring of IoT Devices
• Monitoring of the networks
• Use of Automated Tools
• Intrusion detection tools
• Network scanners
• Network monitors
Document Page
Set of Control &
Countermeasures
• Proper Governance
• Development & implementation of strict laws
• Implementation of Intellectual Property (IP) laws
and rights
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Further Improvements
• Advanced Access Control
• Advanced Data Encryption Algorithms
• Use of Data Analytics Tools
Document Page
Evaluation of the Value of Project
Documentation
• Answers to the research questions
• Inclusion of the security attacks and risks
• Listing of the popular attack agents and mediums
• Recommendation of the control and
countermeasures
• Description of the methodology used
• Listing of the references and sources
• Final acceptance on the deliverables
Document Page
Evaluation of the Value of Project
Documentation
• Overview and details covered in Introduction
• Problem Overview – Security risks & attacks
• Related Work – Further attacks and measures
• Methodology - Control and countermeasures
• Conclusion and references
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Suggestions for
Improvement
• Listing of research questions and aims should
have been included.
• Reflective journal or details
• There is no use of any figures, charts, or any other
graphics.
• The conclusion section could have been
elaborated
Document Page
References
• Ling, Z., Luo, J., Xu, Y., Gao, C., Wu, K., & Fu, X. (2017). Security
Vulnerabilities of Internet of Things: A Case Study of the Smart
Plug System. IEEE Internet Of Things Journal, 4(6), 1899-1909.
doi: 10.1109/jiot.2017.2707465
• Sang, Y., & Gao, X. (2013). Security Issues and Protective
Measures of the Internet of Things Architecture. Advanced
Materials Research, 765-767, 1007-1010. doi:
10.4028/www.scientific.net/amr.765-767.1007
• Sasikala, B. (2017). Internet of Things: A Survey on Security
Issues Analysis and Countermeasures. International Journal Of
Engineering And Computer Science. doi: 10.18535/ijecs/v6i5.41
• Yousuf, T., Mahmoud, R., Aloul, F., & Zualkernan, I. (2015).
Internet of Things (IoT) Security: Current Status, Challenges and
Countermeasures. International Journal For Information Security
Research, 5(4), 608-616. doi:
10.20533/ijisr.2042.4639.2015.0070
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]