Discuss about the Security and privacy issues in Internet of Things.
The world of technology is advancing at a tremendous speed. Every other day there is a specific technology being launched somewhere. Among the technologies that are taking the world by storm is the Internet of Things (IoT) (Gartner, 2013). In this paper, we explore more on the topic. Some research questions that will be answered in this include
Every day, a person, whichever part of the world they are in, uses a smart device. It might be a mobile phone, smart TV, a vehicle, camera etc. A smart device can be said to be anything that contains electronics, sensors, software and can be connected to a network (Gartner, 2013). The term IoT in this case refers to the interconnection of these ‘things’. Once they are online they are able to collect and exchange data without any human intervention. In the recent years, terms such as smart homes have emerged and all this is because of IoT.
While this technology has seen extremely use in home, other fields have not been left behind. Some areas it has been incorporated include:
Gartner (2013) oversees a world where more than 26 billion devices will be connected to the internet by the year 2020. Still, some researchers have taken this number a notch higher to 50 billion devices at the same time (Cisco 2016). This is a scary thought keeping in mind every other day the world is waking up to people being hacked, their identity stolen and such issues. Still, there will be huge amounts of data being produced every second and the world is yet to bring about applications to process this large amount of data effectively and efficiently (Xia, Yang, Wang & Vinel, 2012). Below, we look at some of the issues facing IoT as far as both privacy of users and devices is concerned.
Most of the smart devices used today collect at least one piece of personal information, say ID numbers, date of birth, names etc., from the user. Now, imagine all the devices you have that are connected to the Internet and just think of how much of you have put online. Scary, no? As if this is not enough, often this information is transmitted without encryption over networks. This should become a concern to every person.
Hackers on the other hand couldn’t have seen better days. From the rise of the Anonymous group and whistle blowers who are leaking confidential information (as seen just before the US general election where Hilary Clinton’s past emails were aired to the public), its evident hactivism is taking shape and the privacy of the people has never been under attack more than today (Ntuli & Abu-Mahfouz, 2016). On misuse of information, a classic example is where Politicians use the information you provided to your ISP to determine your location and frequently send you messages requesting you to vote for them. It leaves one wondering, if a mere politician can access this information, how many more dangerous people can access and use this information to harm you in some way.
The current level of technology allows room for securing servers, personal computers, and other devices with the best security protocols and practices (Staff, 2015). However, the security of IoT devices is a tad hard to maintain seeing that it uses bi-directional communication whose security is still blossoming and seldom sufficient. Some security issues facing IoT include:
Inasmuch as it seems almost impossible to secure IoT devices, there are measure that have (are) been put in place to ensure the security of these devices is maintained. Among them there is:
Conclusion
The world has completely opened up to IoT. Each and every day more devices are being developed and even more are being connected to the internet. It’s the reality at hand. There are so many benefits that have resulted from this interconnection. However, as seen in this research, this has brought about challenges and problems to the people with it. From hacking to data theft, challenges issues are getting worse by the day. The world thus needs to focus more on improving the security in IoT devices.
Reference
Gartner, J. R. (2013). Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020.
Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11). ISACA, C. (2015). 5, 2012.
Jones, L. K. (2015). The insecurity of things: How to manage the internet of things (Doctoral dissertation, Utica College).
Staff, F. T. C. (2015). Internet of Things: Privacy and Security in a Connected World. Technical report, Federal Trade Commission.
Ntuli, N., & Abu-Mahfouz, A. (2016). A Simple Security Architecture for Smart Water Management System. Procedia Computer Science, 83, 1164-1169.
Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of things. International Journal of Communication Systems, 25(9), 1101. Glossary IoT- Internet of things
DSCP- Distributed computing stream platforms AES- Advanced Encryption Standard RFIDs- Radio Frequency Identification DDoS- Distributed Denial Of Service
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download