MITS5004 IT Security Research Report: IoT Vulnerabilities Analysis

Verified

Added on  2022/12/12

|7
|1808
|461
Report
AI Summary
This report critically analyzes the paper "Vulnerabilities with the Internet of Things" by Kazi Zunnurhain, examining the security challenges within IoT networks. The report delves into the content of the paper, which highlights vulnerabilities such as those in automotive systems, data breaches due to third-party networks, and various physical and network-based attacks like firmware replacement and MITM attacks. The research methodologies employed, including a literature review and qualitative design, are discussed, along with data gathering and analysis techniques. The report summarizes the key findings, including the potential for a surveillance society and the importance of privacy. It emphasizes the need for secure networks and backup plans to protect against malware and hackers, concluding that while IoT offers significant business advantages, robust security measures are crucial to mitigate associated risks. The report provides an overview of the research paper, its findings, and recommendations for ensuring the secure implementation of IoT technologies.
Document Page
IT SECURITY
0
NAME STUDENT ID
Vulnerabilities with Internet of
Things
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT SECURITY
Table of Contents
Introduction.................................................................................................................................................2
Content of the paper....................................................................................................................................2
Research methodologies used in paper........................................................................................................3
Research strategy.....................................................................................................................................3
Research design.......................................................................................................................................3
Data obtaining techniques........................................................................................................................3
Data analysis technique...........................................................................................................................4
Findings and results of the paper.................................................................................................................4
Issues highlighted by the researchers...........................................................................................................4
Conclusion of the paper...............................................................................................................................4
Conclusion...................................................................................................................................................5
References...................................................................................................................................................6
1
NAME STUDENT ID
Document Page
IT SECURITY
Introduction
IoT is an advanced computing technology that provides a way for connecting computing devices
with human things and lead performance of the computer networks. IoT has the potential to
handle interaction between the networks and connect numbers of devices with each other [1].
Security is a major issue linked with IoT technology that impact on the sensitive data of the
consumers. The purpose of this paper is to examine the susceptibilities and risks associated with
the internet of things. The selected paper for this study is “Vulnerabilities with the Internet of
Things" that was written by Kazi Zunnurhain [1]. This report will include several units, for
example, the content of the paper, research approaches and so on.
Content of the paper
In the selected paper, the researchers reviewed security issues and vulnerabilities linked to the
internet of things. It is observed that GPS mounted systems and automatic networks used in the
automotive industry which produce safety threats and vulnerabilities in the context of IoT
networks [2]. The authors examined that utilization of IoT enables devices in business
communities can lead data breach-related issues because it involves third party networks and
unauthentic access which help the hackers for performing malware activities. In this research
article, the authors also conducted a literature search which included the findings or outcomes of
the recent articles published on IoT networks.
There are various sectors where the consumers use IoT enables networks, for example,
automobile sectors, personal fitness apps, smart cities and others but the security of information
is a shared problem related with the IoT networks that effect the privacy of the computing
systems. In this journal article, the authors evaluated and analyzed the risk factors linked to the
IoT enable networks and identified the types of security attacks faced by the consumers [2]. It is
identified that lack of privacy and involvement of unauthentic networks in the computing
systems and IoT devices produce malware networks and data breach issues. The authors clearly
described and analyzed the vulnerabilities in numerous sectors and also identified the importance
of IoT in the companies.
2
NAME STUDENT ID
Document Page
IT SECURITY
It is examined that there are numerous physical and networks aspects that lead security issues in
IoT networks, for example, knockoff smart devices, compromised hardware repair, firmware
replacement attack, MITM attack and routing attacks [3]. Therefore, it is stated that the
utilization of IoT networks and devices can impact on the sensitive data of the companies and
also reduce the performance of the computing devices.
Research methodologies used in the paper
It is examined that the research method is the most important part of the research which is able to
control the flow of information in the investigation. It is observed that the authors adopted
numerous methods and techniques while conducting the investigation. These methods are
described below:
Research strategy
In the context of an investigation, research strategy delivers a way to develop the reliable
assembly of the paper. Using research strategy, the authors were able to produce the appropriate
research questions and manage the entire research in an effective manner [4]. A literature review
is included by the researchers in order to analyze the viewpoints of the other researchers on IoT
security. Therefore, it is stated that using such kind of methodology the authors were able to
reduce errors and problems occurred in the research.
Research design
It is identified that the authors included qualitative design while conducting the investigation
because of the theoretical behaviour of the research topic. It is argued that the accepted project is
more effective for this investigation because it provided numbers of facts and evidence related to
the IoT security and provided a platform where the authors can achieve aims of the investigation
[5]. Therefore, it is reported that using qualitative design the authors were able to develop an
effective hypothesis of the investigation and maintain the gaps between the research concerns
and information.
Data obtaining techniques
From the chosen article, it is observed that the authors included a secondary method for
obtaining reliable data related to the IoT. The key goal of the secondary technique is to provide
various evidences to the researchers that can help in the enhancement of the research quality [6].
3
NAME STUDENT ID
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT SECURITY
It is evaluated that in order to gather secondary kind of data the authors included a literature
search and collected data from various sources including online books, peer-reviewed articles,
journal papers and so on.
Data analysis technique
In this research article, the investigators adopted a descriptive content analysis technique as it
provides the effective results of the investigation. With the help of such a methodology, the
authors have gathered the appropriate results of the study and also reduced the gaps occurred in
the research. Moreover, for evaluating the collected information the authors included SPSS tools
which also helped for obtaining the reliable conclusion of the investigation [7].
Findings and results of the paper
From this article, it is found that ubiquity of IoT networks may lead to a translucent society
through supervision of the consumers. This proposed study delivered a method for sympathetic
and assessing the security issues and vulnerabilities linked with the IoT networks [8]. It is
observed that lack of privacy and involvement of unauthorized servers in the IoT devices may
produce data breach-related problems in the companies. It is very significant for consumers to
focus on privacy while accessing third party networks and IoT enabled devices.
Issues highlighted by the researchers
In this article, the authors highlighted that security is the biggest issue connected to the IoT that
decrease the usefulness of the computing nets used by companies. Main in the middle and DOS
both are major attacks produced in the IoT technology where the hackers transfer traffic signals
and unauthentic access to the IoT enabled devices. Moreover, utilization of IoT devices with
third party networks can produce data breach and hacking problems in the workplace [1].
Conclusion of the paper
It can be concluded that IoT is the effective computing technology which can be used in the
business communities but security is one of the leading problems related to IoT networks. This
investigation reviewed and analyzed security issues and vulnerabilities linked to the internet of
things. The authors provided complete info connected to the investigation concern and reported
4
NAME STUDENT ID
Document Page
IT SECURITY
that DDOS is a common security attack faced by consumers while utilizing IoT enabled devices.
Therefore, it is evaluated that the chosen article is pertinent to the unit as the writers delivered
facts related to the IoT by which the students can enhance their experience.
Conclusion
After assessing the chosen paper, it can be summarized that IoT is an emerging technology
which produces security threats and risks in the computing networks. This paper examined the
intention of the paper and also reviewed the research methodologies used by the authors.
Therefore, it is suggested that while utilizing IoT technology companies should ensure that the
consumers use only secured networks and authentic servers in order to address security threats
and issues. Moreover, consumers can adopt backup plans in order to protect data against
malware and hackers.
5
NAME STUDENT ID
Document Page
IT SECURITY
References
[1]. K., Zunnurhain, “Vulnerabilities with the internet of things," In Proceedings of the
International Conference on Security and Management (SAM), vol. 12, no. 6, p. 83,
2016.
[2]. J., Granjal, E. Monteiro and, J.S., Silva, “Security for the internet of things: a survey of
existing protocols and open research issues,” IEEE Communications Surveys &
Tutorials, vol. 12, no. 3, pp.1294-1312, 2015.
[3]. Y., Yang, L., Wu, G., Yin, L. Li and, H. Zhao, “A survey on security and privacy issues
in Internet-of-Things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp.1250-1258,
2017.
[4].M.M., Hossain, M. Fotouhi and, R., Hasan, “Towards an analysis of security issues,
challenges, and open problems in the internet of things,” In 2015 IEEE World Congress
on Services, vol. 12, no. 6, pp. 21-28, 2015.
[5]. M. Abomhara and, G.M., Køien, “Security and privacy in the Internet of Things: Current
status and open issues,” In 2014 international conference on privacy and security in
mobile systems (PRISMS), vol. 6, no. 4, pp. 1-8, 2014.
[6]. J.S. Kumar and, D.R., Patel, “A survey on internet of things: Security and privacy
issues,” International Journal of Computer Applications, vol. 90, no. 11, pp. 12-18, 2014.
[7]. Q., Jing, A.V., Vasilakos, J., Wan, J. Lu and, D., Qiu, “Security of the Internet of
Things: perspectives and challenges,” Wireless Networks, vol. 20, no. 8, pp.2481-2501,
2014.
[8]. A.R., Sadeghi, C. Wachsmann and, M., Waidner, “Security and privacy challenges in the
industrial internet of things," In 2015 52nd ACM/EDAC/IEEE Design Automation
Conference (DAC), vol. 16, no. 6, pp. 1-6, 2015.
6
NAME STUDENT ID
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]