Skip to content

⭐ Rated 4.9/5 by 8,400+ students  |  🎓 Expert writers in 80+ subjects  |  ✅ 100% original, no AI  |  🔒 Confidential & secure

Home Blog

A Presentation on Security Concerns in IoT

5 min read

A Presentation on Security Concerns in IoT
Thank you for taking up this assignment.
I have attached the instructions and also the rubric that the assignment has to satisfy positively.
The topic has to be something related to the “Internet of Things”. I have worked with writer #148234 before on a similar topic and hence chose to work with the same writer now.
This assignment’s topic has to be a persuasive topic related to the “Internet of Things”. Examples of what is considered a persuasive topic is found in the “Persuasive assignment” attached below. All the requirements in the instructins attached and the rubric have to be met.

I require 1500 words persuasive paper according to the instructions attached in the file AND a 500 word “summary” of the 1500 word paper that I can recite in a presentation in 3-4 minutes (Again, following rubric and instructions attached). Hence it is a total of 2000 words broken up into 2 parts (1500+500).

How it works — order in under 2 minutes

1

Describe your paper

Topic, word count, deadline, citation style

2

Get matched instantly

We find the best writer for your subject

3

Receive your paper

Download, review, and request revisions free

Start My Order — 2 mins

Money-back guarantee · No commitment

Please let me know incase of any questions.
Introduction
Today the IoT devices are increasingly becoming more convenient since they can now co-operate with each other more easily. This technology is considered to be the future, especially with the increasing use of the Internet. In other words, IoT technology will make a significant contribution to the future by changing our living standards and business models. However, with the increasing usage of IoT technology and connected devices, this technology’s network has become prone to different security attacks. As such, there is a serious need for the development of strong and efficient privacy and security protocols to safeguard the IoT networks, which will enhance confidentiality and integrity on the network.
IoT Security Concerns
According to Delgado (2015), the primary aim of IoT technology is to develop a superior or perfect world for humankind in the future, and this technology has significantly transformed our living styles or standards. However, although this technology comes with huge benefits, it’s prone to numerous security threats that face our daily lives. For example, the majority of the IoT devices have not been designed to cope with modern privacy and security attacks. This factor increases the security concerns of the IoT networks.
A common threat facing IoT technology today is the Man in the Middle attack .During this attack, intruders use eavesdroppers to silently sense the network transmission medium to steal vital information unnoticed. Additionally, Krishna and Gnanasekaran (2017) indicate that intruders can also modify the data in the IoT network, especially when the right encryption has not been done with the intention of steal the information under the transmission. To overcome this kind of attack, Li (2017) suggests that proper data integration and confidentiality should be applied to enhance integrity. Moreover, Li (2017) also indicates that encryption should also be applied as a solution to guard against these attacks to ensure intruders don’t steal information or modify it during transmission.
Another threat facing IoT technology is imitation, where intruders seek to use impersonation to gain unauthorized access into the network. Under this kind of attack, Krishna and Gnanasekaran (2017) indicates cloning and spoofing are the common techniques used where a malicious node is used to impersonate the IoT devices within the targeted network. Li (2017) suggests that this kind of attack can be avoided by utilizing identity-based authentication protocols. Moreover, physically unclonable functions are also used as a countermeasure to prevent cloning attacks.
Finally, Blocking and Denial-of-Service (DoS) attacks are also common threats facing IoT networks. During this kind of attacks, intruders send huge data streams which are intended to jam a specific network. Attackers can also send bulk messages to these IoT devices to disturb the normal network and device functionalities. Antivirus programs should also be installed on devices within the network and ensure that these programs are updated regularly.
Conclusion
From the foregoing, there is a serious need for the development of strong and efficient privacy and security protocols to safeguard the IoT networks, which will enhance confidentiality and integrity on the network. The IoT technology is made up of several platforms and devices with varying credentials, and every system has its security requirements based on its characteristics Lack of strong security mechanisms in most IoT devices have made IoT networks to become soft targets. Considering the significance of security in IoT devices and applications, installing security mechanisms on these devices and networks is very important.

⭐ What students say about their papers

Real feedback from students who used our service this month:

“Got my dissertation literature review done in 4 days. My supervisor said it was the strongest section in my whole thesis.”

— Maya R., MSc Psychology, UK

“Needed an APA research paper overnight. It was perfectly formatted and I scored 89%. Will use again.”

— Carlos M., Business Admin, US

“The nursing case study was exactly what I needed — proper clinical terminology and Harvard referencing.”

— Fatima A., BSc Nursing, UAE

Need help with your assignment?

Expert writers available now. Original work, no AI, free revisions.

🔒 No payment to start · Free revisions · Money-back guarantee

4.9 ★

Student rating

8,400+

Papers delivered

97%

On-time delivery

Why students choose Scholaris

  • 100% human writing, no AI
  • Plagiarism report with every order
  • Deadlines from 3 hours
  • Money-back guarantee
  • Free unlimited revisions

Related Study Guides