0% found this document useful (0 votes)
117 views4 pages

Information Sciences Research Methodology PG (6797) ICT Eng Research Methods (9826) Assignment 2 Guide

This document provides guidance for an assignment on researching security and privacy issues in IoT. It outlines the proposed research topic, literature review on IoT security, identified research questions around IoT privacy and security concerns and their impact. The proposed methods include using quantitative data to investigate privacy risks, security strategies for IoT devices and systems, current security solutions, and privacy models. The research aims to develop an improved privacy-focused IoT model and evaluate a virtualized IoT system implementation. Contributions and limitations of the research are also discussed.

Uploaded by

Usama Nawaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views4 pages

Information Sciences Research Methodology PG (6797) ICT Eng Research Methods (9826) Assignment 2 Guide

This document provides guidance for an assignment on researching security and privacy issues in IoT. It outlines the proposed research topic, literature review on IoT security, identified research questions around IoT privacy and security concerns and their impact. The proposed methods include using quantitative data to investigate privacy risks, security strategies for IoT devices and systems, current security solutions, and privacy models. The research aims to develop an improved privacy-focused IoT model and evaluate a virtualized IoT system implementation. Contributions and limitations of the research are also discussed.

Uploaded by

Usama Nawaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Information Sciences Research Methodology PG (6797)

ICT Eng Research Methods (9826)


Assignment 2 Guide

Title of theproposed Research


Security and Privacy in IoT

Literature Review, recent advances

Internet of Things (IoT) security refers to the extra precautions needed to keep data secure in an
IoT context where virtually any software or hardware entity or item may be assigned a unique
identity and interact on its own via the Internet or complete implementation. To link a large
number of devices, the Internet of Things (IoT) is utilized. It's a technology in which detector-
embedded items communicate wirelessly with one another to collect and send data without a
person's involvement. The Internet of Things has many concerns about privacy (IoT). IoT is dealing
with a few of the issues: inefficient device upgrades, the absence of adequate security
mechanisms, user ignorance, and well-known actuation observation. We are investigating the
context of IoT policies and security indicators and recognizing (a) different security and privacy
challenges, (b) strategies used to protect the elements of IoT-based climates and devices, (c)
current safety alternatives, and (d) the best confidentiality designs required and adapted to
various strands of IoT oriented applications in this research.
Research Problem & Proposed Question(s)/Hypothesis

Explain the motivation for your proposed research. Justify why your research is needed. What
impact will it have?
It's easy to see why IoT users (corporate entities, businesses, small and medium-sized enterprises,
and individuals) are growing. Some of the reasons include: (1) better service to the customers; (2)
increased efficiency; (3) easier accessibility; (4) lower labor costs; and (5) increased connectivity.
Data is collected via devices, processed, attached to the system, and then used to enhance the
efficiency of intelligent systems as part of the Internet of Things (IoT).  IoT security is increasing as
consumers want more privacy from their connected devices.
Identifythe research question or hypothesis or objectives you aim to address.
1. What IoT privacy and security concerns are there?
2. How would you characterise the IoT security issues you're facing?
3. In terms of privacy and monitoring, what effect will the Internet of Things have?
Explain why is this study significant? Why should you invest in this research?Who are your
stakeholders?
For Internet of Things (IoT) devices to function correctly, they will require secure equipment,
programming, and connection. Any linked device, from refrigerators to industrial robots, may be
compromised if Information security isn't in place. Hackers may hijack the entity's functioning and
grab internet files once they acquire control.

Theory, relevant models/frameworks

Offers tools for legal arrangements into the boot process of an integrated platform. In this
approach, requests go to a server, and responses come back.
Sophisticated security is used to keep SoCs and applications units safe during the initialization
phase. Use the FIPS Privacy Toolkit to protect your data. Secures advanced wearable using a
competent cryptography library provided by this vendor. Inadequate security measures for
personal data (communication and storage) Questions about IoT application data protection are
most often raised because of insecure connections and information storage. Vulnerable devices
may be exploited to access private data, a significant issue for IoT privacy and security. Enlarging
the network's reach to every conceivable physical place would improve our efficiency, saving us
cash and effort. Internet connection, on the other hand, entails exchanging information with
cybercriminals. Malicious hackers turn their attention to devices that can connect to the internet.
Due to the growth of the Internet of Things (IoT) industry, there are now more performance,
device security, and privacy threats. According to reports, the frequency of data thefts has risen
dramatically since 2015, with the United States accounting for 60% of the rise.

Methods

We have used Quantitative data to investigate the background of IoT systems and related
indicators and recognize:
1. Different privacy risks.
2. Strategies used to secure IoT-based surroundings and devices.
3. Current safety alternatives.
4. The best confidentiality concepts are requisite and adaptable to new Sensor
implementations layers based on these systems.
Our goal was to develop an improved Internet of Things (IoT) model that would be general but
extended to include user privacy features and identify the layers. Implementation and evaluation
of the virtualized IoT system are both carried out.
We implemented the upper surface on AWS using the internet IoT ecosystem (the cloud). Among
these levels were the safety protocols and necessary management procedures that ensured the
confidentiality of the users' data. We developed certificates to facilitate data transmission across
the envisioned cloud/edge empowered IoT model's tiers. The suggested system architecture may
be utilized with the most acceptable security methods to counteract cyber threats at every layer,
including cloud, periphery, and IoT, by removing potential security weaknesses.

Research Contributions & Limitations

Identifyand explain the contributions of your research to theory or practice or both.


The Internet of Things (IoT) and the apps that run on it have become indispensable in our
contemporary lives. Nearly wherever we look, we find Internet of Things (IoT) devices providing
us with safe and on services such as in our residences, offices, shopping malls, schools, and
airways. With the assistance of IoT devices, parties can collaborate and better evaluate the
business needs and results. Industrial facilities may be made more productive and efficient by
using Sensor information mining processing.
Identifyand explainany limitations you can foresee in your proposed research.
New Interface elements models were suggested in this study, including conventional and
extended versions with confidentiality features and a method for identifying the layers inside
each model. The suggested IoT cloud/edge system was put into action and assessed. The
AmazonWeb Service (AWS)-generated IoT nodes serving as Virtual Technology makes up the
bottom layer. The Small plant Edge Ecosystem in AWS was used to build the intermediate layer
(Edge) using a Microcontroller equipment kit. The crystal's top layer is built on AWS' Virtualized
IoT ecosystem..

Relevance & Impact of the Study

Explain who will your research be relevant to including the relevant research community. Think
in terms of the ‘stakeholders’ we discussed who may benefit from your research, andexplain
how so.
Founded in Holland, Elsevier publishes academic, industrial, and therapeutic material under the
Elsevier brand. It's a component of Reed Elsevier's RELX Group, which existed until 2015.
Publish or perish is the only way to get your research out there and into the hands of those who
may benefit from it. This helps promote information and its implementation by bringing new
information to the attention of scholars and practitioners with comparable interests.
Which publications/conference would you wish to target? Why?
Elsevier is a well-known publisher of prestigious scientific publications. As a result, releasing a
study in a prestigious journal like Elsevier will ensure widespread dissemination. As a result,
scientific writers should consider publishing their work in one of Elsevier's publications. With the
assistance of Elsevier, organizations and professions may advance research, enhance healthcare
coverage, and increase productivity.

Additional Topics

1. Discuss any ethical issues likely to emerge from your research.


 As the next stage in the tech revolution, the Iot devices (IoT) is set to usher in social
transformation on a scale that will equal that of the web itself, according to industry analysts.
Following are a few examples of ethical concerns: educated permission; confidentiality;
information assurance; children's security; respect; continued studies; and confidentiality.
2. Discuss how you would address issues of research quality and how it would be assured?
We may resolve problems by addressing them at the following points: Describe your research,
goals, and methodology. Examine the situation or setting in which it exists. Investigate its natural
environment. Determine the connections between variables. Consider the ramifications of
alternate methods and plan ahead of time.
3. Discuss other issues relating to your proposed design (as relevant).
Issues such as IoT Supplier Non-Compliance, User Non-Knowledge & Awareness, IoT Potential
Vulnerabilities in Item Update Maintenance, Lack of Hardware Toughening, and Trying to hijack
Your IoT Devices are just a few of the many others.
References List

1. What is Internet of Things privacy (IoT privacy)? - Definition from WhatIs.com


(2014). What is Internet of Things privacy (IoT privacy)? - Definition from WhatIs.com.
[online] IoT Agenda. Available at:
https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-privacy-IoT-
privacy.
2. Shaikh, E., Mohiuddin, I. and Manzoor, A. (2019). Internet of Things (IoT): Security and
Privacy Threats. [online] IEEE Xplore. Available at:
https://ieeexplore.ieee.org/abstract/document/8769539.
3. Tawalbeh, L., Muheidat, F., Tawalbeh, M. and Quwaider, M. (2020). IoT Privacy and
Security: Challenges and Solutions. Applied Sciences, [online] 10(12), p.4102. Available at:
https://www.mdpi.com/2076-3417/10/12/4102/pdf.
4. IIoT World. (2018). The Importance of Security by Design for IoT Devices. [online] Available
at: https://www.iiot-world.com/ics-security/cybersecurity/the-importance-of-security-by-
design-for-iot-devices/#:~:text=Hardware%2C%20software%20and%20connectivity
%20will.
5. Built In. (n.d.). Why Is IoT Security Important? [online] Available at: https://builtin.com/iot-
internet-things/practical-iot-hacking.
6. Rambus. (n.d.). IoT Security Framework - Security IP. [online] Available at:
https://www.rambus.com/security/software-protocols/iot-security-framework/.
7. Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput.
Netw. 2019, 148, 283–294.
8. Enago Academy. (2019). Ten Reasons Why Elsevier Journals Reject Your Article. [online]
Available at: https://www.enago.com/academy/ten-reasons-why-elsevier-journals-reject-
your-article/.
9. Allhoff, F. and Henschke, A. (2018). The Internet of Things: Foundational ethical
issues. Internet of Things, 1-2, pp.55–66.
10. Intellectsoft Team (2019). Top 10 Biggest IoT Security Issues. [online] Intellectsoft Blog.
Available at: https://www.intellectsoft.net/blog/biggest-iot-security-issues/.

You might also like