MN502 Overview of Network Security: IoT Security Challenges

Verified

Added on  2023/06/12

|8
|810
|321
Report
AI Summary
This report provides an overview of the Internet of Things (IoT), highlighting its potential as an advancement of the internet that facilitates machine-to-machine communication. It explores the characteristics of IoT, including comprehensive perception, reliable communication, and intelligent data processing, and discusses its applications in smart cities, smart energy, and smart health. The report also delves into the security issues associated with IoT, focusing on the security of sensing devices, physical layer vulnerabilities, and network layer concerns such as illegal access and data confidentiality. Countermeasures like certification protocols, access control, and data encryption are proposed to mitigate these security risks. The conclusion emphasizes IoT's transformative potential and the need for comprehensive solutions to address its security challenges. References to various academic papers and journals are included to support the analysis.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Internet of Things
[NAMES]
[INSTITUTION]
[DATE]
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Internet of Things (IoT)is an advancement of the internet.
It will facilitate machine to machine (M2M) communication.
Its functions will depend on the existing technological infrastructure.
IOT will represent a global interconnection system of devices.
A system that will use the standard TCP/IP protocol to automate machine
interaction.
Document Page
Literature Review
The basic idea; to have an autonomous exchange of information.
This exchange is facilitated by uniquely identifiable devices.
Through leading technologies such as Wireless Sensor Networks (WSN) and RFID
(Radio Frequency Identification).
Characteristics
Comprehensive perception determined by identification and recognition.
Document Page
Cont..
Reliable communication and transmission using a variety of networks.
Intelligent data processing using cloud computing, AI and systems analytics.
Areas of Application
Smart Cities/homes - IoT will automate all the objects found in homesteads and cities.
Smart Energy - control will be integrated into the energy industry to have a smart energy
management system.
Smart Health - IoT monitoring services can manage tasks by collecting and analyzing data.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Security Issues
Two contributing factors: IoT architecture and the internet infrastructure,
Security issues in IoT
I. Security of sensing devices - IoT does not provide adequate security for its objects.
II. Security issues in the physical layer - two security issues are observed; node tampering and
jamming.
III. Security concern of the network layer - the concerns of illegal access, data confidentiality, and
integrity.
Document Page
Countermeasures
I. Certification and secure access protocols - this technique can be used to
verify the access devices e.g. RFID tag or WSN device.
II. Access control – based on different authorization levels such as location and
identity.
III. Data Encryption – to protect information from tampering, which can occur in
various forms such as editing, deleting and interception
Document Page
Conclusion
IoT represents the next evolution of the internet.
IoT transfers IT efficiencies to the real world.
Several security issues are yet to be solved.
Comprehensive solutions are the best countermeasures to these problems.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
M. Farooq, M. Waseem, S. Mazhar, A. Khairi and T. Kamal, "A Review on Internet of Things (IoT)," International Journal of Computer Applications, vol. 113,
no. 1. https://www.researchgate.net/publication/273693976_A_Review_on_Internet_of_Things_IoT, pp. 1-6, 2015.
K. Desai and S. Mahalakshmi, "Internet of Things (IoT): A Review of Literature," International Research Journal of Management and Commerce, vol. 5, no.
2. http://www.aarf.asia/download.php?filename=../current/2018/Mar/xaUaIOvGVU0La5L.pdf&new=., 2018.
E. Alsaadi and A. Tubaishat, "Internet of Things: Features, Challenges, and Vulnerabilities," International Journal of Advanced Computer Science and
Information Technology, vol. 4, no. 1. https://pdfs.semanticscholar.org/ab0a/90ddd8208234e7335b1cc175b49461c2bae5.pdf, pp. 2-11, 2015.
S. Rajguru, S. Kinhekar and S. Pati, "Analysis of Internet of Things in a Smart Environment," International Journal of Enhanced Research in Management &
Computer Applications, vol. 4, no. 4. https://pdfs.semanticscholar.org/35fe/c9f1837928c482ed3ad344fa639736bd2506.pdf , pp. 40-43, 2015.
Z. Mohammed and E. Ahmed, "Internet of Things Applications, Challenges and Related Future Technologies," World Scientific News, vol. 67, no. 2.
https://www.researchgate.net/profile/Elmustafa_Sayed_Ali_Ahmed/publication/
313651150_Internet_of_Things_Applications_Challenges_and_Related_Future_Technologies/links/58a6e9b64585150402f27785/Internet-of-Things-
Applications-Challenges-and-Related-Future, pp. 126-148, 2017.
C. Suchitra and C. Vandana, "Internet of Things and Security Issues," International Journal of Computer Science and Mobile Computing, vol. 5, no. 1.
https://www.ijcsmc.com/docs/papers/January2016/V5I1201636.pdf, p. 133 – 139, 2016.
M. Bhabad and S. Bagade, "Internet of Things: Architecture, Security Issues and Countermeasures," International Journal of Computer Applications, vol.
125, no. 14. https://pdfs.semanticscholar.org/94bb/0b62588808fd2614c572162fa170cce06856.pdf, pp. 1-4, 2015.
X. Liu, M. Zhao, S. Li, F. Zhang and W. Trappe, "A Security Framework for the Internet of Things in the Future Internet Architecture," Future Internet, MDPI
Journals, no. http://www.mdpi.com/1999-5903/9/3/27/pdf [Accessed 23 May 2018], pp. 1-25, 2017.
L. Goeke, "Security Challenges of the Internet of Things," Bachelor’s Thesis Business Information Technology, no.
https://www.theseus.fi/bitstream/handle/10024/128420/Goeke_Lisa.pdf?sequence=1&isAllowed=y
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]