0% found this document useful (0 votes)
29 views3 pages

Internet of Things Security

This document is a project submitted to the Informatics Institute for Post Graduate Studies at the Iraqi Commission for Computers and Informatics in partial fulfillment of requirements for a Higher Diploma in Computer Science. The project examines security threats, services, and protection methods for the Internet of Things. It proposes a design for an IoT security system and discusses future work opportunities in this area.

Uploaded by

mohammed moaid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views3 pages

Internet of Things Security

This document is a project submitted to the Informatics Institute for Post Graduate Studies at the Iraqi Commission for Computers and Informatics in partial fulfillment of requirements for a Higher Diploma in Computer Science. The project examines security threats, services, and protection methods for the Internet of Things. It proposes a design for an IoT security system and discusses future work opportunities in this area.

Uploaded by

mohammed moaid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Republic of Iraq

Ministry of Higher Education and Scientific Research


Iraqi Commission for Computers and Informatics
Informatics Institute for Post Graduate Studies

Internet of Things Security


(Threats, Security Services and
Protection Methods)

A Project
Submitted to Informatics Institute for Post Graduate Studies at the Iraqi
Commission for Computers and Informatics in Partial Fulfillment of
Requirements for The Degree of Higher Diploma in Computer Science.

By
Ali Khalil Baker

Supervised By
Prof. Dr. Mazin Sameer Ali Al Hakeem

A.D/ October 2022 Iraq - Baghdad A.H/ Rabi’ AlAwal 1444


Table of Contents
Title Page
Abstract I
List of Abbreviations
List of Figures
List of Tables
Chapter One: General Introduction
1.1 Introduction of Internet of Things 1
1.2 Things and Internet of Things
1.3 Internet of Things Security
1.4 Application of Internet of Things
1.5 Internet of Things Security Problems Reasons
1.6 Statements of Problem
1.7 Project Aim and Contribution
1.8 Related Works

Chapter Two: IoT Security Threats and Attacks


2.1 Introduction
2.2 IoT Security Threats
A. Spoofing
B. Tampering
C. Repudiation
D. Information Disclosure
E. Denial of Services
F. Escalation of Privilege
2.3 IoT Security Attacks
A. Interruption
B. Interception
C. Modification
D. Fabrication

Chapter Three: IoT Security Services and Protection Methods


3.1 Introduction
3.2 IoT Security Services
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
E. Non-Repudiation
F. Authorization
G. Auditing
H. Communication Security
3.3 Protection Methods
A. Encryption
B. Hashing Function
C. Digital Signature
D. Firewalls
E. Intrusion Detection
F. Secure Communication Protocols
3.4 IoT Protection Methods
A. M2M - Protection Methods
B. Network Layer - Protection Methods
C. Application Layer - Protection Methods

Chapter Four: The Proposed IoT Security System


4.1 Introduction
4.2 The Proposed Design
4.3 The Implementation

Chapter Five: Conclusions and Future Works


5.1 Conclusions
5.2 Future Works

References

You might also like