0% found this document useful (0 votes)
106 views

Information Sciences Research Methodology PG (6797) ICT Eng Research Methods (9826) Assignment 2 Guide

This document provides guidelines for Assignment 2 which involves proposing research on experimental evaluation of cybersecurity for smart homes. The proposed research aims to assess consumer IoT device vulnerabilities to cyber attacks through experiments. Key questions addressed are trends in smart home cybersecurity research, common security threats and challenges in evaluation. Mature frameworks from ISACA and NIST will provide the logical foundation for methods involving case studies and analysis of smart home network protocols. Potential contributions are aligned design of intrusion kill chain models and framework for continuous data collection and security analysis. Relevant stakeholders are software engineers and those responsible for large-scale cybersecurity. Target publications are IEEE for improving technical theory and practice. Ethical and quality assurance issues are also discussed.

Uploaded by

Usama Nawaz
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views

Information Sciences Research Methodology PG (6797) ICT Eng Research Methods (9826) Assignment 2 Guide

This document provides guidelines for Assignment 2 which involves proposing research on experimental evaluation of cybersecurity for smart homes. The proposed research aims to assess consumer IoT device vulnerabilities to cyber attacks through experiments. Key questions addressed are trends in smart home cybersecurity research, common security threats and challenges in evaluation. Mature frameworks from ISACA and NIST will provide the logical foundation for methods involving case studies and analysis of smart home network protocols. Potential contributions are aligned design of intrusion kill chain models and framework for continuous data collection and security analysis. Relevant stakeholders are software engineers and those responsible for large-scale cybersecurity. Target publications are IEEE for improving technical theory and practice. Ethical and quality assurance issues are also discussed.

Uploaded by

Usama Nawaz
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Information Sciences Research Methodology PG (6797)

ICT Eng Research Methods (9826)


Assignment 2 Guide

Title of theproposed Research

Experimental evaluation in cybersecurity to smart home

Literature Review, recent advances


Customers have a growing trend to purchase Digitally household appliances, often known as the
Internet of Things (IoT). These Internet of Things (IoT) gadgets can gather a large amount of data
and provide customers with the ability to control their smart homes. Due to its tremendous
capacity for solving many social issues, the Internet of things (IoT) is quickly becoming a
significant future component. The Internet of Things is built on operating and monitoring real-
world objects (things) globally.
As a result of security flaws, Internet of Things (IoT) technologies are vulnerable to cyberattacks
that may compromise both the systems' functioning and the security of its users. Even though
MQTT is one of the most widely used IoT protocols, it offers just the most basic security features.
A distant invader who gains unauthorized access to these devices may use the data for his benefit
or damage other organizations. This article aims to assess the risks of customer IoT devices in the
face of cyber-attacks via experiments. In addition, this research will provide significant findings on
smart home risks, weaknesses, and safety.
Research Problem & Proposed Question(s)/Hypothesis
Explain the motivation for your proposed research. Justify why your research is needed. What
impact will it have?
This study aims to assesses consumers' IoT device weaknesses in the face of cyber-attacks
empirically. For example, Amazon Echo, Triby speaker, and Pixar picture frames seem to be safe
options for amusement and lifestyle IoT. Despite this, products like the HP printer and
Chromecast are plagued by security flaws (poorly rated in confidentiality and integrity).
Identify the research question or hypothesis or objectives you aim to address.
What are the trends in smart-home cybersecurity research?
What are the security threats on smart devices?
What are the common challenges to evaluate cyber-security to smart home?
Explain why is this study significant? Why should you invest in this research?Who are your
stakeholders?
Protecting an operating system against cyber attacks ensures the integrity and confidentiality of
its computer assets, as well as the data contained within. Its goal is to keep those data secure
from all types of cyberattacks during the attack's entire life cycle. Cyber security's goal is to guard
against such cyber assaults on systems, organizations, and software applications. There are many
digital threats out there, and most of them are focused on getting to confidential material,
changing or wiping it out, or trying to extort money from the people they target.
Theory, relevant models/frameworks

Mature assessment frameworks from ISACA and NIST were integrated as the logical foundation.
This phase involves determining the product needs (based on market possibilities and
competition analysis) then designing, developing, and testing it to see whether it meets those
criteria. SHD construction should include safety concerns, initiating measures such as how
different components may be linked. These encryption techniques point to ways the SHEs may be
designed to enhance security while minimizing data access. First is a "Secure Development
Methodology"; second, there are "Security Capabilities for Hardware and Software." The project
plan of the SHD lifespan includes both of these components.

Methods

Businesses increasingly rely on the Internet of Things (IoT) to make activities, procedures, and
items better. However, although technology offers limitless possibilities, it also poses enormous
difficulties, especially in cyber threats and associated security measures. How can we keep billions
of linked devices safe and robust across the world? 'Cybersecurity by Layout' seems to be a viable
option as a sensible one. Many cyber-threats threaten the lives, welfare, and health of people
living in 'Smart Homes .' Therefore, they were chosen as an analytical unit in this study. Using
"design science" as a technique, we created a comprehensive strategy to protecting Smart Home
Environments (SHEs) against cyberattacks, emphasizing "good practices" that may be
implemented throughout the SHEs product lifetime. 'Cyber Security Proficiency Evaluation' tool
has been created for SHEs in conjunction to these recommended practices. With their validation
and gradual improvement, both objects are prepared for new use and modifications.

Research Contributions & Limitations

Identifyand explain the contributions of your research to theory or practice or both.


Lighting control apps keep an eye on ecological factors and actual use behaviors to help save
energy and resources. As part of our research, we collected and analyzed Smart Home
Environment Link-Layer Network Protocol Items methodically (PDUs). This research used
numerous case study scientific assessments of smart home cyber-security, and the case studies
were aligned with the current Intrusion Kill Chain prototype design.
Identifyand explainany limitations you can foresee in your proposed research.
While creating a suitable data collecting template and an SECaaS capacity to analyse gathered
findings, the suggested solution arising from the research methods.

Relevance & Impact of the Study

Explain who will your research be relevant to including the relevant research community. Think
in terms of the ‘stakeholders’ we discussed who may benefit from your research, andexplain
how so.
A cybersecurity project's typical stakeholders comprise software engineers, people management
personnel, financial management personnel, brand management personnel. Participants are in
charge of large-scale cybersecurity in places like intelligent urban spaces. It's only via
interconnection that smart cities and architecture can come to their full potential. According to
the whitepaper, everyone has a role to play in ensuring the integrity of the system.

Which publications/conference would you wish to target? Why?


The work of IEEE publications and writers helps to improve technical theory and practise. These
papers have a tonne of citations backing them up. Devoted to promoting technology for the
betterment of mankind, IEEE has grown to be the world's biggest specializing in different
organisation in the field. Through widely referenced publications, workshops, technological
standards, and cultural and academic initiatives, IEEE and its participants inspire a worldwide
community.

Additional Topics

1. Discuss any ethical issues likely to emerge from your research.


Transparency, consent forms, sovereignty, obtrusiveness, equitable access, human touch
minimization, and usability are the framework's most important ethical concerns. Online rights,
data user access, and destructive Internet behavior are only a few ethical problems that arise
while using IT on worldwide networks. Technical solutions, like decryption, SSL, digital IDs, and
firewalls on computers, have helped address some of these fundamental problems.

2. Discuss how you would address issues of research quality and how it would be assured?
Quality data includes both accuracy and trustworthiness, as well as relevance; data may be
trustworthy while yet being meaningless to a company. Reducing re-fielding costs and saving time
may all be achieved by improving data integrity.

3. Discuss other issues relating to your proposed design (as relevant).


Our study tackles the security concerns raised by the widely used Z-Wave remote monitoring
protocol's primary derivation method.

References List

1. Sivanathan, A., Loi, F., Gharakheili, H. and Sivaraman, V. (n.d.). Experimental Evaluation of


Cybersecurity Threats to the Smart-Home. [online] Available at:
https://www2.ee.unsw.edu.au/~hhabibi/pubs/conf/17antsiot.pdf [Accessed 27 Sep.
2021].
2. Michaelides, M., Sengul, C. and Patras, P. (2021). An Experimental Evaluation of MQTT
Authentication and Authorization in IoT. Proceedings of the 15th ACM Workshop on
Wireless Network Testbeds, Experimental evaluation & CHaracterization.
3. FireEye. (2018). What is Cyber Security? | FireEye. [online] Available at:
https://www.fireeye.com/current-threats/what-is-cyber-security.html.
4. Admin (2018). What is cyber security all about? [online] Comodo One. Available at:
https://one.comodo.com/blog/cyber-security/what-is-cyber-security.php.
5. Siddhanti, P., Asprion, P. and Schneider, B. (2019). Cybersecurity by Design for Smart
Home Environments. Proceedings of the 21st International Conference on Enterprise
Information Systems.
6. Siddhanti, P., Asprion, P. and Schneider, B. (2019). Cybersecurity by Design for Smart
Home Environments. Proceedings of the 21st International Conference on Enterprise
Information Systems.
7. www.ieee.org. (n.d.). IEEE - IEEE at a Glance. [online] Available at:
https://www.ieee.org/about/at-a-glance.html.
8. Gunarto, H. (n.d.). Ethical Issues in Cyberspace and IT Society. [online] Available at:
https://www.apu.ac.jp/~gunarto/it1.pdf.

You might also like