SIT382 System Security Assignment 1 - Research Essay Trimester 2 2020 Total marks: 20 Over decades, the development of Internet and communication technologies has introduced a virtual world to...

1 answer below »
Please note that my preferred essay topic is
1.
Security in IoT.and i required an essay according to rubrics- Thanks


SIT382 System Security Assignment 1 - Research Essay Trimester 2 2020 Total marks: 20 Over decades, the development of Internet and communication technologies has introduced a virtual world to everyone’s daily life. In this virtual world, people are able to conduct a large number of activities similar in the real world. Subsequently, a question has been raised, which is how to build a bridge between the real and the virtual world. To answer this question, an innovative technology has been studied for many years and now is being widely used, named Internet of Things (IoT). By taking the advantages of affordable sensors and wireless communications, IoT networks are capable of digitising human activities in the real world, which can be utilised directly in the virtual world. However, from the security point of view, IoT is not flawless. A large number of security issues have been observed in IoT systems. Consequently, not only the IoT system will be attacked, but privacy of end users will also lose. Therefore, in recent years, security and privacy issues in IoT networks have been a hot topic in research field. Below is a list of possible essay topics. In this assignment, you are required to complete an essay relating to the security or privacy problem, consisting of 1500-2000 words (minimum 1500 words, single spaced, 12pt font, on the A4-sized paper) on ONE of these topics. You will also need to prepare a 5-minute video talk with presentation slides to describe your findings. Possible essay topics 1. Security in IoT. In this essay, you investigate the security problems of IoT. You need to describe why security issues exist in IoT and what types of security issues are commonly observed. You then select a security issue and analyse it in detail. After that, you describe and compare existing methods to defend against and solve the security issues according to some criteria, such as effectiveness and cost of deployment. Additionally, you will propose a new or improved method or technique to defend against or solve the security issue and describe the effectiveness of your method/technique. 2. Privacy in IoT. In this essay, you investigate the privacy issues of IoT. You need to describe why privacy problems exist in IoT and what kinds of privacy information is more likely to be violated. You then select an attack that may lead to the loss of privacy and analyse it in details. Further comparisons with existing methods to defend against this attack are expected to be done according to certain defined criteria, such as effectiveness and cost of deployment. Additionally, you will propose a new or an improved method or technique to defend against the attack and describe the effectiveness of your method/technique. Diagrams and examples may help to explain your thoughts. Bonus marks may be awarded if you propose the new architecture, method, algorithm, technique, etc. However, these proposals will be closely examined by the assessor. You need to make sure (e.g., prove formally or informally) that your proposal is correct and meets your design goals (for example, improve the performance, be more secure, or be more scalable). Marking Criteria for Assignment 1
Answered Same DayAug 19, 2021SIT382

Answer To: SIT382 System Security Assignment 1 - Research Essay Trimester 2 2020 Total marks: 20 Over decades,...

Riya answered on Aug 20 2021
154 Votes
Abstract
The Internet of Things(IOT) is a system by which machines ,animals, humans and all the available objects can interact to each other without human intervention .It works through sensors which send data to the cloud and a connection is established between the various objects. Since this technology is not very developed it comes with lot of security issues and many a time very importan
t information is shared through this technology which requires authentication. In this paper various security threats and ways for its removal are discussed .Additionally ,a ECC based solution is discussed which can make the communication through IOT more secure.
In spite of being generally utilized, the understanding of the term Internet of Things is as yet vague, since it is made out of numerous advances like Wireless Sensor Networks (WSN), Radio-Frequency Identification (RFID), also, Machine-to-Machine interchanges (M2M). IoT association in our day by day lives is seeing exceptional development and advancement which can be seen in IoT applications, for example, smart cities, automated vehicles, smart structures, and home automation. It is a direct result of this development named IoT that vast scale development is being witnessed in all spheres [1].
IoT is alluring and this is the thing that drives purchasers to embrace it in large numbers, even before they are prepared and even before the gadgets themselves are completely furnished with security norms. Since this innovation is new now, there are as yet numerous shortcomings that should be survived - both by makers and clients. They all essentially emerge from:
· Absence of client information
· Conflicting creation principles
· Poor support and updates
Since, the IoT objects are being sent all around us , for example , catching exact assessments from pulses to estimating room temperature at homes, and furthermore being utilized for a few different purposes in various zones, subsequently, the information residing in the IoT environment is thought to be more reliable and secure. While a few IoT gadgets amass a tremendous measure of mystery of the way data is seen by the IoT clients, for example, their conduct, account passwords, topographical area, day by day propensities and so on. Consequently the information having such data is considered as private property and any hindrance would uncover the client's private data which an intruder may procure what's more, disclose the privacy of the IoT client. One of the most basic issues while making sure about the data has been recognized as Privacy Preservation. For ensuring the security of client, verification methods with the cryptographic instruments were utilized . A validation principally confirms that only the ensured work force have the access to the client's very own data, while, the cryptographic devices guarantee the security of touchy data during the communication, conservation, and modification of such data . In [2],the author has stated that there are various security dangers that rise on IoT due to the particular purposes. A portion of the regular security dangers in IoT are as per the following :
· Vulnerable Web Interface
· Inadequate authentication
· Vulnerable network services
· Deficiency of transport encryption
· Susceptible cloud interface
· Poor security configurability
· Vulnerable software
· Inadequate physical security
In [3], the author has staed that one of the major threats is inadequate authentication . A client can obtain propelled levels of access than allowed because of the defective articles being abided to approve the IoT UI or blemished approval instruments, which prompts the commencement of these dangers . The shortcomings that may result to the danger are characterized beneath:
I. Nonattendance of code word Complication
ii. Badly Protected IDs
iii. Requirement of Two Factor Verification
iv. Restless Password Regaining
v. Helpful Boom...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here