Access over 35 million academic & study documents

Internet of Things and Security Research Paper

Content type
User Generated
Subject
Computer Science
Type
Research Paper
Rating
Showing Page:
1/24
1
Internet of Things and Security
Abstract
Internet of things devices application in daily life activities has been on the rise since the
development of the technology. Its application has affected all spheres of human life from
home systems, smart cities, and healthcare in industries. However, the use of these devices is
accompanied by threats to the users as well as the environment around them. The security
requirements of these devices include authenticity, availability, integrity, and confidentiality.
The data carried by these devices and being transferred from one node to another is critical
and needs to be well secured to avoid accidents or even deaths by the users. In different
instances, these devices have been hacked and caused harm to the users in cases such as the
nuclear facility attack that caused imminent damage. The lightweight cryptographic
algorithm's security protocol of these devices could be used to improve the safety of the
devices. The current security protocols have, in various instances, been compromised by the
malware and the ransomware that are used by hackers to attack these devices. The knowledge
of the security of the Internet of things will ensure that more security measures are taken to
improve the current security and achieve the requirements for data protection.
Keywords: cryptographic algorithms, security protocol, Internet of things and cloud

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/24
2
Contents
Abstract ................................................................................................................................................... 1
Introduction ............................................................................................................................................. 3
Security requirements for the Internet of things ..................................................................................... 4
Cloud ................................................................................................................................................... 5
User ..................................................................................................................................................... 5
Attacker ............................................................................................................................................... 6
Service ................................................................................................................................................ 6
Platform .............................................................................................................................................. 7
Security challenges ................................................................................................................................. 7
Internet of things technologies and security threats .......................................................................... 10
Wireless sensors network (WSNs) ................................................................................................ 10
Radiofrequency identification technology (RFIT) ........................................................................ 12
Security protocols ................................................................................................................................. 13
Network-layer security ...................................................................................................................... 14
Transport-layer security .................................................................................................................... 16
Application-layer security ................................................................................................................. 18
Impacts of technology development on the security of IoT .................................................................. 19
Conclusion ............................................................................................................................................ 20
References ............................................................................................................................................. 22

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/24

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 24 pages?
Access Now
Unformatted Attachment Preview
1 Internet of Things and Security Abstract Internet of things devices application in daily life activities has been on the rise since the development of the technology. Its application has affected all spheres of human life from home systems, smart cities, and healthcare in industries. However, the use of these devices is accompanied by threats to the users as well as the environment around them. The security requirements of these devices include authenticity, availability, integrity, and confidentiality. The data carried by these devices and being transferred from one node to another is critical and needs to be well secured to avoid accidents or even deaths by the users. In different instances, these devices have been hacked and caused harm to the users in cases such as the nuclear facility attack that caused imminent damage. The lightweight cryptographic algorithm's security protocol of these devices could be used to improve the safety of the devices. The current security protocols have, in various instances, been compromised by the malware and the ransomware that are used by hackers to attack these devices. The knowledge of the security of the Internet of things will ensure that more security measures are taken to improve the current security and achieve the requirements for data protection. Keywords: cryptographic algorithms, security protocol, Internet of things and cloud 2 Contents Abstract ........................................................................... ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents