Description
three papers for (COMP8120 students)
This project is a research-oriented project (not development-oriented). The purpose is to have a deep
understanding of a specific cybersecurity topic by reading scientific research papers and summarizing
the papers.
Unformatted Attachment Preview
Purchase answer to see full attachment

Explanation & Answer

Attached is the solution for your assignment as well as the outline for the work
Security and Privacy in the Internet of Things (IoT)
Student Name
University Affiliation
Professor Name
Date
1. Problem Statement
The Internet of Things is a term used in reference to the growing network of physical objects
fitted with sensors, software, and connectivity capabilities so that they can exchange and share
information. The level of threat of these devices ranges from household objects like thermostats and smart
TVs to critical infrastructure systems such as power grids and medical equipment. Currently, the Internet
of Things, IoT, with more than 30 billion connected devices in the world today, has changed almost
everything in our lives, as well as several industries, including the transportation industry, agriculture,
manufacturing, and healthcare.
Unfortunately, the fast-growing number of IoT devices generated a large number of security and
privacy issues. Most IoT devices are resource-constrained, have no or faulty security, and are deployed
with obsolete software. Therefore, they become a tempting target for cyber attackers. As high-profile
incidents, such as the Mirai botnet attack on thousands of IoT devices that use them to launch massive
Distributed Denial-of-Service (DDoS) attacks, have recently shown, the IoT could become a source of a
large-scale and extended attack. Moreover, the collected data generated by IoT devices has the potential
to contain sensitive personal information and, consequently, requires adequate measures to ensure that it
is not mishandled or exposed. 2. Goals
The main targets of scientific research in IoT security and privacy are:
•
Security systems protect against unauthorized data access within the IoT network.
•
Our security measures guarantee that transmitted and stored data remains unchanged throughout
its journey and rest.
•
Our goal is to maintain IoT device functioning and protect it against denial-of-service attacks,
including distributed denial-of-service.
•
The system confirms first the user and device access credentials to let them use resources.
•
Our system controls when authorized people can enter or leave specific areas of data control.
•
The system blocks PII exposures while respecting data protection rules.
The system needs to deliver these security functions even under the limited processing power and
minimal battery life generally found in IoT devices.
3. Challenges
Attributes of IoT systems create specific security and management obstacles that need to be addressed.
•
Most IoT devices have basic microcontrollers that process very little power, which affects their
security because strong encryption requires more computing resources to function properly.
•
Security management grows hard when the number of Internet of Things devices increases.
Technologies should support networks that change often while handling many devices from
different systems.
â...
