IoT Security: Vulnerabilities, Attacks, and Countermeasures Report

Verified

Added on  2021/04/16

|12
|489
|132
Report
AI Summary
This report provides a comprehensive overview of security in the Internet of Things (IoT). It explores the vulnerabilities inherent in IoT devices, including those related to device interactions, poor password security, lack of encryption, and the use of low-cost devices. The report details various security attacks and their impact, such as information breaches, hacking, and manipulation. It also proposes a range of countermeasures, including the monitoring of IoT devices and networks, the use of automated tools for intrusion detection, and the implementation of strict laws and intellectual property rights. Furthermore, the report evaluates the value of project documentation, highlighting the importance of including research questions, methodologies, and references. The report also suggests improvements, such as the inclusion of figures, charts, and a more elaborated conclusion section. The report is based on research and includes references to academic sources.
Document Page
Security in the
Internet of
Things
Final Blog Entry & Evaluation of the Value of
Project Documentation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
IoT is being used in industrial sectors
Newer IoT applications being developed
Smart Home Automation System
Office Automation System
Smart Parking System
Benefits of the Applications – Speed, Accuracy, &
Quality
Document Page
IoT Applications –
Disadvantages
Security & Privacy Issues
Device-related Security Attacks
Smartphones
Networking Equipment
Computer Systems
Electrical Appliances
Home Appliances
Document Page
Security Vulnerabilities
Devices are the primary threat agents
Vulnerabilities used by malicious entities
Information breaches, hacking, or manipulation
attacks
Attacks due to device interactions
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security Vulnerabilities
Use of poor passwords
Absence of encryption
Low priced devices opted by the users
Delay in security updates
Document Page
Set of Control &
Countermeasures
Monitoring of IoT Devices
Monitoring of the networks
Use of Automated Tools
Intrusion detection tools
Network scanners
Network monitors
Document Page
Set of Control &
Countermeasures
Proper Governance
Development & implementation of strict laws
Implementation of Intellectual Property (IP) laws
and rights
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Further Improvements
Advanced Access Control
Advanced Data Encryption Algorithms
Use of Data Analytics Tools
Document Page
Evaluation of the Value of Project
Documentation
Answers to the research questions
Inclusion of the security attacks and risks
Listing of the popular attack agents and mediums
Recommendation of the control and
countermeasures
Description of the methodology used
Listing of the references and sources
Final acceptance on the deliverables
Document Page
Evaluation of the Value of Project
Documentation
Overview and details covered in Introduction
Problem Overview – Security risks & attacks
Related Work – Further attacks and measures
Methodology - Control and countermeasures
Conclusion and references
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Suggestions for
Improvement
Listing of research questions and aims should
have been included.
Reflective journal or details
There is no use of any figures, charts, or any other
graphics.
The conclusion section could have been
elaborated
Document Page
References
Ling, Z., Luo, J., Xu, Y., Gao, C., Wu, K., & Fu, X. (2017). Security
Vulnerabilities of Internet of Things: A Case Study of the Smart
Plug System. IEEE Internet Of Things Journal, 4(6), 1899-1909.
doi: 10.1109/jiot.2017.2707465
Sang, Y., & Gao, X. (2013). Security Issues and Protective
Measures of the Internet of Things Architecture. Advanced
Materials Research, 765-767, 1007-1010. doi:
10.4028/www.scientific.net/amr.765-767.1007
Sasikala, B. (2017). Internet of Things: A Survey on Security
Issues Analysis and Countermeasures. International Journal Of
Engineering And Computer Science. doi: 10.18535/ijecs/v6i5.41
Yousuf, T., Mahmoud, R., Aloul, F., & Zualkernan, I. (2015).
Internet of Things (IoT) Security: Current Status, Challenges and
Countermeasures. International Journal For Information Security
Research, 5(4), 608-616. doi:
10.20533/ijisr.2042.4639.2015.0070
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]