A Report on Security and Privacy Challenges in the IoT Domain

Verified

Added on  2023/06/13

|3
|790
|398
Report
AI Summary
This report examines the escalating security and privacy challenges within the Internet of Things (IoT) domain, highlighting the rapid growth of connected devices and the subsequent rise in security vulnerabilities. It emphasizes the importance of data privacy, authenticity, integrity, and confidentiality in IoT systems, which comprise networks, application layers, and perception layers, each susceptible to distinct weaknesses. The report also addresses the incompatibility of low-power computing principles with current cryptographic standards, posing significant challenges for IoT system security. It underscores the urgent need for fundamental standards, hardware-friendly solutions, and robust data protection measures to ensure a secure IoT environment for consumers. The report outlines its structure, including a problem statement, literature review, and analysis of past and current methodologies, to comprehensively address these critical issues. Desklib offers a wealth of resources, including similar reports and solved assignments, to support students in their academic endeavors.
Document Page
Security and Privacy Challenges in the IoT Domain
Name of the Student
Name of the University
bmoses@studygroup.com
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security and Privacy Challenges in IoT Domain
The Internet of Things (IoT) is a new form
of technology, which has the potential to transform
the lives of the people and the growth in the
business sector. The IoT is able to cover all the
sectors that are mainly used by the people such as
health, transport, entertainment and many others
(Wortmann & Fluchter, 2015).
With the rapid growth of IoT, the number of
devices that are being connected to the technology
are also rising rapidly. The growing interest in this
technology has led the growth of several security
challenges. The technology has been forced to
develop different standards, policies and
governance, which would be able to shape the level
of security.
The IoT comprises of sensors and devices,
which are able to interact and communicate with
various other machines, environments and objects.
After having connecting to the Internet technology,
new problems related to security and privacy have
risen such as authenticity, integrity of data and
confidentiality of data. The privacy of the data of an
individual should be given as the topmost priority.
In the recent age of technological innovations, the
systems are becoming autonomous and intellectual.
Hence there are many upcoming challenges, which
tend to challenge the privacy of the systems
(Roman, Zhou & Lopez, 2013).
The Internet of Things is comprised of the
network, the application layer and the perception.
They provide a certain level of meaning to the
whole system. Each of the components of IoT at
different layers could be executed as separate
technologies. Hence, different weaknesses are
found at each layer based on their application and
functionality. These kind of vulnerabilities that
have exploited, have been compromising the safety
mechanisms of several IoT based devices (Sicari et
al., 2015).
Many security experts who have done an
extensive research in the field of security of IoT,
have raised their concern on the weaknesses in the
systems of IoT. The principle of low power of
computing along with the efficiency of energy are
incompatible to the current principles of
cryptography. This means that there would be a
challenging environment for the IoT systems and
their community. Based on the number of
challenges to the security concepts of IoT, the topic
needs to be discussed deeply, which would be able
to strengthen the foundations of a secure
environment.
The situation of the Internet of Things
environment should be immediately taken into
consideration. A proper analysis towards ensuring
security of the vital data of consumers is very much
essential. In the recent times, there is a high need
for various fundamental standards and
implementations of hardware-friendly solutions.
There is also a high priority for the protection of the
data of the user in the IoT environment (Da Xu, He
& Li, 2014).
Structure of the Report
1. Purpose of the Report
1.1 Problem Statement – What are the major
challenges, which are being faced by the IoT
environment?
1.2 Executive Summary
2. Introduction of the Problem and their Challenges
3. Literature Review
3.1 A Brief Review on the Security
Challenges in IoT based on Past and Current
Scenario.
3.2 List of the Requirements of the Project
3.3 Modification of the Problem Statement
Based on the Project Requirements
3.4 Past and Current Methodologies based
on the Problem
4. Conclusion
5. References
Document Page
References
Da Xu, L., He, W., & Li, S. (2014). Internet of
things in industries: A survey. IEEE
Transactions on industrial
informatics, 10(4), 2233-2243.
Roman, R., Zhou, J., & Lopez, J. (2013). On the
features and challenges of security and
privacy in distributed internet of
things. Computer Networks, 57(10), 2266-
2279.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-
Porisini, A. (2015). Security, privacy and
trust in Internet of Things: The road
ahead. Computer networks, 76, 146-164.
Wortmann, F., & Flüchter, K. (2015). Internet of
things. Business & Information Systems
Engineering, 57(3), 221-224.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]