Cyber Security Question

User Generated

nfva55

Computer Science

Yale

Description

three papers for (COMP8120 students)

This project is a research-oriented project (not development-oriented). The purpose is to have a deep

understanding of a specific cybersecurity topic by reading scientific research papers and summarizing

the papers.

Unformatted Attachment Preview

COMP7/8120 Course Project This project is a research-oriented project (not development-oriented). The purpose is to have a deep understanding of a specific cybersecurity topic by reading scientific research papers and summarizing the papers. Summary of Research Problem (within 5 pages, 11pt)  Name Problem Statement: You need to pick one cybersecurity topic (not limited to cryptographic topics). You can either give an overview on a broad topic or focus on a small research problem. Here are some examples:  Security and Privacy Issues in Cloud Computing  Security and Privacy Issues in Smart Cities  Security and Privacy Issues in Blockchain  Security and Privacy Issues in Internet of Things  Security and Privacy Issues in Machine Learning/AI  J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption." S&P 2007  D. Boneh, C. Gentry, H. Shacham, and B. Lynn. "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. " Eurocrypt 2003  D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano. "Public key encryption with keyword search". Eurocrypt 2004  D. Bhattacharyya, R. Ranjan, F. Alisherov A., and M. Choi. "Biometric Authentication: A Review"  S. Nakamoto. "Bitcoin: A Peer-to-Peer Electronic Cash System. " 2008 Goals: Describe the security model and research goals (security goals, design goals, …) Challenges: List the challenges to achieve the research goals Related Work (State-of-art): At least two papers for (COMP7120 students) and three papers for (COMP8120 students). Do not simply copy the sentences/paragraph from the paper. Please summarize by yourself. 1. First approach - Brief Summary of Ideas, Drawbacks [ref1, ref2, ...] 2. Second approach - Brief Summary of Ideas, Drawbacks [ref3, ref4, ...] 3. …. Your Ideas or Findings To search and download papers, you can go either IEEE or ACM databases with the following links: https://ieeexplore-ieee-org.ezproxy.memphis.edu/ https://dl-acm-org.ezproxy.memphis.edu/ Log in with your university account (no need to connect to VPN).
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached is the solution for your assignment as well as the outline for the work

Security and Privacy in the Internet of Things (IoT)

Student Name

University Affiliation

Professor Name

Date

1. Problem Statement

The Internet of Things is a term used in reference to the growing network of physical objects
fitted with sensors, software, and connectivity capabilities so that they can exchange and share
information. The level of threat of these devices ranges from household objects like thermostats and smart
TVs to critical infrastructure systems such as power grids and medical equipment. Currently, the Internet
of Things, IoT, with more than 30 billion connected devices in the world today, has changed almost
everything in our lives, as well as several industries, including the transportation industry, agriculture,
manufacturing, and healthcare.
Unfortunately, the fast-growing number of IoT devices generated a large number of security and
privacy issues. Most IoT devices are resource-constrained, have no or faulty security, and are deployed
with obsolete software. Therefore, they become a tempting target for cyber attackers. As high-profile
incidents, such as the Mirai botnet attack on thousands of IoT devices that use them to launch massive
Distributed Denial-of-Service (DDoS) attacks, have recently shown, the IoT could become a source of a
large-scale and extended attack. Moreover, the collected data generated by IoT devices has the potential
to contain sensitive personal information and, consequently, requires adequate measures to ensure that it
is not mishandled or exposed. 2. Goals
The main targets of scientific research in IoT security and privacy are:
•

Security systems protect against unauthorized data access within the IoT network.

•

Our security measures guarantee that transmitted and stored data remains unchanged throughout
its journey and rest.

•

Our goal is to maintain IoT device functioning and protect it against denial-of-service attacks,
including distributed denial-of-service.

•

The system confirms first the user and device access credentials to let them use resources.

•

Our system controls when authorized people can enter or leave specific areas of data control.

•

The system blocks PII exposures while respecting data protection rules.

The system needs to deliver these security functions even under the limited processing power and
minimal battery life generally found in IoT devices.

3. Challenges

Attributes of IoT systems create specific security and management obstacles that need to be addressed.
•

Most IoT devices have basic microcontrollers that process very little power, which affects their
security because strong encryption requires more computing resources to function properly.

•

Security management grows hard when the number of Internet of Things devices increases.
Technologies should support networks that change often while handling many devices from
different systems.

â...

Related Tags