Internet of Things: Security and Privacy issue & Solution

Research project

Assignment

In this assessment task you are required to select a topic for your research project from the list of research areas/topics provided below:

  • Quantum cryptography
  • Evolution of malware
  • Internet of Things (IoT) /Smart Architectures: Security and privacy issues and solutions
  • Biometric authentication
  • Cloud computing security: Challenges and solutions
  • Security issues in Software Defined Networks (SDN)
  • Intrusion detection and prevention systems
  • Dark web

In this assessment, you are required to submit the title and an abstract for your selected research project. Your abstract should briefly summarize the aim, findings or purpose of the report. This will provide an overview of your selected topic, along with key security challenges in that area, the focus of your investigation and why it is important.

At the end of the submission, you should include a “Reference” section that will have a minimum of two articles (at least one journal article) used to build your discussion for this abstract. However, do not cite references within the body of the abstract.

Solution

Sample Content Picture

Introduction

Internet of Things (IoT) is a technology that provides inter-connection of a lot many different components that share and transmit information over the networks and are identified using a unique identifier that is assigned to the component. The inter-connection of diverse components is done to achieve a common objective. Some of the components that may be involved in an IoT application usually comprise of computer systems and laptops, Smartphones, wireless sensor networks, Big Data tools, databases, web servers, electrical and home appliances, and sensors. These components come together to achieve a specific set of objectives.

The report covers the various security and privacy issues that are associated with IoT and the solutions that may be implemented to get rid of these issues.

IoT Applications & Technologies

IoT applications are developed by using and involving a lot many different technologies. One such technology is Big Data. IoT applications involve several components and there are data sets that are associated with each of these components. The Big Data tools and technologies are usually integrated with the IoT applications to store, handle, and manage the data sets. Another technology that is used along with IoT is cloud computing. Wireless sensor networks and cloud computing platforms are used in IoT for sharing of resources and providing the users with the virtual access to the services and application. Artificial Intelligence and Machine Learning are also used with IoT applications to enhance the smartness of the application and minimize the human intervention.

Some of the IoT applications that are being used in the current times include IoT-based health applications for smart patient management, remote health monitoring, and tele-health monitoring. IoT is also used in the retail and e-commerce industry for smart retail applications and customer management applications. Some other IoT applications that are high on demand include the smart cities application, office automation systems, home automation systems, and many others.

Security & Privacy Issues in IoT

IoT applications involve a lot of components. These are used and accessed on the wireless networks and cloud computing frameworks. As a result, there are security and privacy issues that get associated with the IoT applications. Some of the common and frequently occurring issues have been described below.

Cryptanalysis Attacks

Encryption of the data sets is one of the popular security techniques and controls that are used to avoid and prevent the occurrence of security threat and attack. However, the usual encryption techniques fail to work in the case of IoT applications and devices. The attackers may use this property of IoT applications and give shape to the cryptanalysis attacks. It is the attack in which the cipher text and algorithm is analysed by the attackers to understand the patterns and algorithms that are used to weaken the security of the application and data sets. There are different forms of cryptanalysis attacks that may be given shape over the IoT applications and devices. For example, ciphertext-only attacks are the ones in which the attacker has no knowledge or access to the plain text and is only able to analyse the cipher text and algorithms (Maple, 2017). There are known plaintext attacks that are also observed in which the attacker has a little or complete knowledge and access to the plain text. Differential, integral, and dictionary attacks are also the cryptanalysis attacks that may be given shape. Side-channel attacks may also be used in which the cipher-text and plain-text is not analysed; rather, the information regarding the physical systems is used to analyse the details of the encryption process being used. These details are then used to break in to the security of the device or the application.

Ransomware

It is one of the types of malware that is commonly observed in the case of IoT devices and applications. Ransomware attack is a malware attack in which the attackers block the user’s access to a service, application, or system and demands ransom in return. Once the user pays the ransom then the access may or may not be provided to the user. The ransom demanded by the attackers is in the form of a cryptocurrency, such as Bitcoins. Some of the large-scale ransomware that have occurred in the recent times are WannaCry and Petya ransomware attacks.

Ransomware is launched by using security vulnerability in the system or a weak access point. In the case of IoT devices, there are several access points that are present due to the presence of multiple components. There may be a less secure access point that may be used to launch the ransomware. The users, networks, and the emails are the primary agents that are used to launch the attack (Latif & Zafar, 2017).

Insecure Web Interface

There are web interfaces that are developed for the IoT devices that allow the users to connect with the application. These interfaces may be in the form of a web site, web application, or a mobile application. However, the presence of an insecure web interface may lead to the occurrence of security and privacy issues. The users may utilize weak credentials to log in to these interfaces which may provide the attackers with the ability to launch the Brute Force attacks and gain unauthorized access. Cross Site Scripting and SQL injection attacks may also take place due to the presence of insecure web interface (Gopi& Rao, 2018).

Lack of adequate authorization and authentication on the web interface is also one of the primary challenges that welcome an abundant set of security risks and attacks. Insecure password recovery may allow the attacker to capture the password of the users. Lack of role-based access control or multi-fold authentication is another security risk that may take place.

Conclusion

IoT is a technology that is exposed to a lot many security and privacy issues. The technology has provided the users with a lot many benefits in terms of faster processing, inter-connected frameworks, and integrated platforms. However, the occurrence of the security and privacy issues in IoT may result in the deterioration of the user trust and experience. The security and privacy challenges have been described in the sections above. There are security controls and techniques that shall be used to avoid these risks and issues. Also, the user must be made aware of the practices that may be adopted to put a check on the attacks and threats

Online Assignment Writer Services

Assignment help

Online Assignment Help

Looking for online assignment help but tired of the poor quality help offered by other wonders? It’s time you switched to Online Assignment Help! We place extra emphasis on quality over and above everything else so you get an assignment that is easily worthy of the top grade.

Dissertation help

Dissertation Writing Help

It is a well-known fact that the most important assignment of any student’s life is the dissertation. This career-deciding assignment is also the most challenging as well as the lengthiest one, making for a rather deadly combination. Our content is free of plagiarism.

Essay Help

Essay Writing Help

Whoever has written an essay knows that it is far from an easy task. Plenty of research goes into the creation of the perfect essay, making it a rather time-consuming task even though the word count is very short. Besides, we always meet even the most pressurizing deadlines.

Thesis help Online

Academic Writing Services

Essays, dissertations and assignments are not the only areas of our expertise. We cover all academic writing services for your convenience. From research paper writing help to case study help, MBA admission essay help, thesis help, homework help and many more.