University Project Proposal: IoT Home Appliance Security and Privacy

Verified

Added on  2022/08/18

|16
|3745
|12
Project
AI Summary
This project proposal delves into the critical issues of security and privacy within the realm of IoT-enabled home appliances. It begins with an introduction highlighting the rapid proliferation of smart home devices and their impact on daily life, while simultaneously acknowledging the rising concerns regarding data privacy and user security. The proposal outlines the project's aim to identify and mitigate these security and privacy vulnerabilities. The research will address key questions about the importance of smart home appliances, potential security issues, ethical considerations, and possible remedies. The objectives include assessing the impact of smart home appliances, analyzing security threats, evaluating the effects of security attacks, and identifying ethical issues. The methodology involves analyzing secondary data, primarily from surveys of smart home users and academic resources. The proposal also addresses academic and ethical limitations, including data collection challenges and the importance of participant consent and data integrity. The literature review explores the evolution of smart home appliances, their impact on users, and the specific security and privacy challenges they present. Overall, the project seeks to provide a comprehensive understanding of the security and privacy landscape of IoT home appliances, offering insights and solutions to enhance user protection.
Document Page
Running Head: PROJECT PROPOSAL FOR THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
PROJECT PROPOSAL
FOR
THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
Table of Contents
Introduction:........................................................................................................................2
Background-....................................................................................................................3
Aim:.....................................................................................................................................3
Research Question-..........................................................................................................4
Objective-........................................................................................................................4
Resources-........................................................................................................................4
Deliverables-....................................................................................................................5
Academic Limitation:..........................................................................................................5
Ethical Issue-...................................................................................................................6
Literature Review:...............................................................................................................7
Smart Home Appliance-..................................................................................................7
Impact of Smart Home appliance-...................................................................................8
Security and Privacy issues in smart home appliance-....................................................9
Cloud based solution for overcoming with IoT Smart Home issues-............................10
Project Plan:.......................................................................................................................11
References..........................................................................................................................12
Document Page
2THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
Introduction:
After completion of a detail study on the rapid growth of technology it is identified that
there are several organization who has developed smart home appliances by utilizing the features
of IoT. While analyzing this concern it is determined that these devices are very much useful for
enhancing our daily activities. Considering this aspect it is recognized that the these devices are
basically made up of collective sensors and advance algorithms in order to improve our daily
operations by offering a huge range of features that are very much useful for our daily life.
Considering the rapid growth of technology it is also determined that IoT is being utilized
in most of the fields like healthcare system, home appliances, vehicle and many more. However,
along with these considerations it is also very prominent that due to introduction of these devices
data privacy and user security issues has significantly increased, which cannot be neglected at all
(Sivaraman et al. 2015). There are several researches which has been conducted with the purpose
to determine the necessity of to protect the user data. While analyzing this concern it is observed
that the working principle of the IoT devices are basically and a driven concept and due to this it
is very essential to gather user data in order to deliver best services to the user with purpose to
enhance their daily activities.
Considering the above discussion in this paper it will propose to boost the security and
privacy features of the smart home appliance. This paper will help to get a detailed idea about the
proposal which will include the aim of this project, limitations of this project as well as it will
outline the project plan with the purpose to get a brief idea about the development process.
Document Page
3THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
Background-
Smart homes are one of the promising inventions of technology that has significantly
improved our daily activities. A smart connected home is always an integrated system which
includes several sensors with remote access capabilities. These devices are very much effective
that has significantly improved the effectiveness of home. Those services include smart TV,
smart kitchen, wireless sensors in toilets and many other (Wang, Zhang and Taleb 2018). Apart
from the identifications of the above mentioned benefits, several limitations has been also
determined that has majorly impacted the effectiveness of these devices. While analyzing the
capabilities of these technologies the significance of smart devices has been identified which
includes sensors, actuator, and gateway. Although a connected home a combination of the above
mentioned devices, there are several security and privacy limitations present which has impacted
the effectiveness of smart home appliances (Premnath and Haas 2015). While considering the
data security concept it is identified that data confidentiality, integrity and accessibility are the
tree trios that maintains the privacy of user data. As well as security of the users are also very
essential to maintain as these due to technical fault a huge blunder could happen.
Thus, a huge necessity has been determined to provide security to the smart home users
and maintain privacy of their personal data.
Aim:
The primary goal of this project to determine the privacy and security issues of IoT
devices existing in smart home, followed by the identified issues it will help to mitigate those
issues with the purpose to enhance the effectiveness of the smart devices.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
Research Question-
ï‚· What are the importance of smart home appliances?
ï‚· What are the probable issues in smart home appliances that is impacting the security and
privacy of the smart devices?
ï‚· What are the ethical issues present with smart devices?
ï‚· What are the possible remedies that can be recommended such that the identified issues of
smart devices can be mitigated?
Objective-
ï‚· To determine the impact of smart home appliances into our daily life
ï‚· To analyze the security vulnerability and threats in the IoT based Smart Home
ï‚· To evaluate impact of security attacks on the system security of IoT Smart Home
ï‚· To determine the ethical issues present in connected homes
ï‚· To identify security requirements as well as solutions in Smart Home environment
Resources-
To conduct the research secondary data will be analyzed in order to get a detailed
information about the impact of these IoT devices as well as to get an idea about the issues of
these devices. Primarily the data will be collected from survey which will be designed especially
for the smart home users in order to get a genuine feedback from them. And this research will be
conducted based on the concept of a descriptive research design (Kumar 2019). The research will
be based on previous works of different authors which will be taken from sites such as Google
scholar.
Document Page
5THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
Deliverables-
Within the time period of 10 months the research will be done and after completion of
this research the it will give detail idea about how the IoT devices has impacted the home
appliances and how the limitations has impacted the privacy and security of users (Fletcher
2017). Along with this it will help to mitigate the limitations as well by using effective mitigation
approaches. Some important deliverables of the research are as follows:
1. Statement of work
2. Project scope
3. Collected data or works
4. Survey questionnaire
5. Citation of the resources
6. Results and discussions with proper explanation
Academic Limitation:
Followed by the above mentioned aspects it is identified that in order to conduct the
research several problems will arise which will majorly impact the accuracy of this research.
While analyzing this aspect it is identified that as the research will be conducted by analyzing the
journals and articles developed in the nominated topic, several limitations may occur due to lack
of contribution of the participants and the resources of the research (Mackey and Gass 2015).
Along with this it is also detected that during the research the shortage of time and fund may
significantly impact the accuracy of the research process.
Document Page
6THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
Considering these aspects it is identified that one of the most significant limitation of this
research in the collection of data and the incorporation of participants as the nominated research
topic is very vast as well as sensitive. While analyzing this concern it is observed that primarily
the research will gather the data from authenticate resources as well as from the journals which
have been developed in the same topic (Ryen 2016). However, a major problem will arise the
author of those researches are not willing to share their research data. If this happen it will be
very difficult to analyze the nominated topic and get result which will help to address the
identified project objective.
Along with this limitations it is also very prominent that along with the data collection
from the secondary resources, the data will be collected from survey and interview as well. Thus,
it is also determined that due to lack of co-operation of the research participant may significantly
increase the research limitation. Followed by this consideration it is observed that maximum co-
operation of the participants will be highly appraised as without this it will be very difficult to get
a good result from the research as the nominated topic very much related to the user experiences.
Ethical Issue-
Along with the considerations of the above limitations it is identified that several ethical
issues could impact the research progress as well. Before getting into the detail of the research
ethics it is very essential to get a detail idea about the research ethics. While analyzing the
concept of research ethics it is identified that one of the primary research ethics is to collaborate
team work and express respect as well as dignity towards all the participants of the research.
Along with this it is also very essential to get the consent of the research participants with mutual
agreement. Apart from these considerations it is also very essential to conduct the resources of
the research in an appropriate way as these resources will help to get a detailed information about
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
the nominated research topic (Dove et al. 2016). Following this concern it is recognized that
respecting the social and moral values of the participants are also very essential in order to
conduct a research with ethics.
After completion of the above discussion it is recognized that in this research one of the
major ethical consideration will be gathering the valid data from the participants of the research
as there is high possibility to get vague responses from the participant and it is also very
prominent that forcing someone any personal purpose is also not an ethical movement as well.
Thus, from the investigation it is observed a that in this research there will be several ethical
issues which includes the honesty and integrity of the research participants as they might not get
comfortable while sharing their concern, objectivity of this research is also one of the ethical
issues as this will majorly signify biasness in the research result (Dove et al. 2016). And apart
from the above mentioned aspects it is observed that during the project it may violate the privacy
of the intellectual property as it is very essential gather data from previous researches and
journals.
Literature Review:
In this section an analysis will be conducted with the purpose to get a detailed idea about
the research topic. Followed by this objective in the below section the application of smart home
appliances, impact of the smart home appliances as well as the security and privacy issues of the
smart home appliances will be discussed by which several information will be gathered that will
impact the findings of the study-
Document Page
8THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
Smart Home Appliance-
Smart home is an integration of several IoT components. According to Bugeja, Jacobsson
and Davidsson (2016), a smart home is such environment that consist of several smart devices in
order to enhance their services. However, the concept of smart home has taken its place before
the innovations of IoT, but after introducing IoT into the smart applications it has become more
significant and popular as well. Loi et al. (2017) mentioned that while analyzing the concept of a
smart home or smart home appliances it is identified that this system is basically followed by the
interaction of different components. Those components includes hardware, web application,
network, cloud, mobile application as well as API. And in order to accomplish an operation it is
very essential to establish an effective communication between the above mentioned
components.
Smart door bells, smart speaker, smart lighting, smart security cameras, smart thermostat,
smart heat detector, smart display, smart lock as well as smart kitchens are the most popular IoT
enabled home appliances.
Impact of Smart Home appliance-
Followed by the above identified proof about the above mentioned devices it is observed
that these devices are very effective in enhancing the house activities. Das (2015) stated that
while analyzing this concern it is identified that smart homes holds a major impact on the all
generation with its effective services. If we consider three generations like retirees, working
person and the youth we could see significant impact of smart home appliance on these three
generations. Maras (2015) discussed that considering the impact of smart home on the retirees it
is observed that due to remotely accessible capabilities of the smart devices they can perform any
activities like switching of the fan, closing the curtains as well as the locking the doors without
Document Page
9THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
even any moving from their present place. These features of IoT has significantly reduces the
physical efforts of the humans by making all the operations remotely accessible.
Along with the above identification in this case scenario there is a huge significance of
hackers as well. The hacker will intend to hack the personal data of the user. Thus, it can be
stated that in order to mitigate these threats it is very essential to adopt security technology that
will reduce the threat of hackers. Considering this aspect it is determined that in this case the
incorporation of firewall as well as other security enabled devices will help to enhance the
security of the home appliances.
Security and Privacy issues in smart home appliance-
Although Smart Home is almost a diverse environment, the nature of the security and
privacy threats is same to new areas. Mano et al. (2016) stated that confidentiality security
threats is a result of unwanted release of the sensitive data. As taken an example in smart home
observing system, it can lead to unintentional release of complex medical information. Even data
like internal temperature of home, with knowledge of air conditioning operational parameters,
are used to determine whether the home is engaged or not. Loss of the confidential information
like home keys as well as passwords can lead to unauthorized access threat of the system.
According to Al-Ali et al. (2017), authentication threat is lead to sensing as well as
controlling of information hampered with. As for example, unauthenticated system status alerts
can puzzle the house controller in thinking that there is some emergency situation. Apthorpe et
al. (2017) mentioned that unauthorized access to the system controller can make entire system as
insecure. Dove et al. (2016) argued that it is due to inappropriate password as well as key
management and unauthorized device can connect to network. When control is not gained
properly, then unauthorized connection with the network can cause to steal the network
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
bandwidth and it is resulted in denial of service attack. Loi et al. (2017) discussed that the Smart
Home device is battery operated as well as wirelessly networked with low operational duty
cycles.
Nandyala and Kim (2016) mentioned that focusing on the nature of communication of the
smart home devises it is noticed that the by using wireless medium the connections between user
and the devices are established which is even more vulnerable. Due to the absence of physical
boundaries these devices faces security threats like Denial of Service (DoS) attack. One of the
primary reason behind these types of attacks is to target the network server of the device and
disrupt the connection with the PC or laptop. Wang, Zhang and Taleb (2018) determined that
along with this in the operational scenario of smart devices the significance of Sinkhole attacks
has been noticed whose primary objective is to attack the server of the router with the purpose to
send false notification to the system. Apthorpe et al. (2017) argued that similarly, Trespass are
such types of attacks that hacks the security code of smart doors to perform illegal activities.
Hence, in the operations of smart home appliance it is identified that DoS attack, Sinkhole attack
as well as Trespass attacks are very harmful.
Cloud based solution for overcoming with IoT Smart Home issues-
Cooperation among the devices is a required feature of the IoT home devices. It is
required of high treating power where the IoT devices are not proficient of it. In order to solve
security issues of IoT devices, the investigators are proposed of the cloud based solutions for IoT.
According to Wang, Zhang and Taleb (2018) the cloud is gaining of resources to monitor as well
as process data from the IoT devices. By analyzing of data, the cloud is required to trigger
possible actions to the user defined strategies to gain a complex smart home controlling. IoT
cloud architecture is based on CoAP protocol. The architecture is consisted of three decoupled
Document Page
11THE SECURITY AND PRIVACY FOR IOT HOME APPLIANCE
stages such as network, protocol as well as business logic stages. Each of the stages are included
incoming event queue, in addition to event handler that can process the stage logic. Premnath
and Haas (2015) discussed that the home management system is managed the devices as well as
policies and also provides access point for the users.
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]