Assignment Part 2
Assignment Part 2
INSTRUCTIONS TO CANDIDATES:
Complete the assignment and submit it online through Moodle. Your
assignment submission is integrated with Turnitin option for
plagiarism check.
1.0 Security
1.1 An Overall Perspective on Establishing End-to-End Security in Enterprise IoT (E-
IoT)
Rahman et al. (2018) as cited by Rao et al. (2020), has introduced a lightweight multi-
message and multi-receiver heterogeneous-based signncryption (Rao et al., 2020, p. 81). The
proposed solution is able to examine the work for several threats using the AVISPA simulator
programme. Rahman et al. (2018) also stated that attackers are more likely to impersonate
authorized customers due to the diverse environment. Liu et al. (2019) have introduced a
simple anonymous authentication and key agreement system in order to address the issue.
The proposed system has a positive impact from defending attacks like replay and Dos (Liu
et al., 2019, p. 1).
Besides, threat modelling (TM) for IoT security also introduced in this research paper.
Shostack (2014) has highlighted the benefits of using a threat model in SDL. Some of the
benefits highlighted include discovering problems in the early stage, identifying the
necessities of security and providing a better insights to the user (Shostack & Wiley, 2014,
p. 1). Furthermore, pen-testing using Kali Linux on a real-time E-IoT also conducted in this
research paper. In order to test several DoS attacks, a Raspberry Pi-based Kali Linux is
utilized by Liang et al. (2016). An attack architecture is created while they are conducting the
pen-testing in order to compare various DoS attacks. Last but not emphatically least, the
researchers outlined several critical security considerations that all enterprise IoT should be
aware of. Below are the security considerations:
Page 3 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
1.2 Mobile Fog Based Secure Cloud-IoT Framework for Enterprise Multimedia
Security
According to Sood (2019), the ultimate goal of all enterprise has always been
maximizing their income. Cloud Computing is able to resolves the problems of enterprise
computing system (Duncan et al., 2017, p. 1). As quoted by Chang (2018), Cloud Computing
is capable to assists the enterprises in storing, processing, and analysing their enterprise data
saving in Cloud Servers (Chang, 2017, p. 29).
Giang (2018) claims that rapid improvements in the Clous-IoT ecosystems such as
Mobile Fog Computing are giving Enterprise Multimedia Data a more optimum settings in
system reliability. Roman et al. (2018) point out that the shared data is stored on a third-party
Cloud infrastructure and the data security of mobile users and their related businesses mut be
maintained going forward (Roman et al., 2018, p. 681). The data centres for Cloud storage
are unreliable in terms of data security.
This study proposes a framework that is able to address the data security challenges in
Mobile Fog-based Cloud-IoT in an efficient method. The proposed framework will only
allow authorized users to access both the Cloud & Fog and preventing unauthorized users
from sneaking in. Sood (2019) claims that the user will only be able to access the encrypted
EMD in the Cloud after the data has been retrieved from the Fog. In order to access data from
the fog, user will need to authenticate himself by using the Master Encryption Key (MEK).
Generally, only the data owner will be provided MEK of their own. This means that
unauthorized user will not be able to access the data in the Fog unless the data owner
provides their MEK to them. Secure Socket Layer (SSL) is used in verifying the Cloud to the
owner during the process of transmitting and retrieving data from the Cloud (Sood, 2019,
p. 3).
Page 4 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
1.3 Enterprise Security and Privacy: Why Adding IoT and Big Data Makes It So
Much More Difficult
Duncan et al. (2017) claims that the contribution of this study will allow enterprise to
understand the security and privacy risks they might face in this rapid growth of cloud, IoT
and Big Data era. Besides, the researcher also links this study to the DAES 2017 workshop in
order to emphasise the enormous potential damage that data breaches pose to business in light
of the upcoming EU CDPR. The incident has affected all enterprises that trade in EU, even if
only in a minor way and fines for violation are potentially catastrophic as they are based on
the enterprise’s global turnover from the previous financial year, not just the sales in EU
(Duncan et al., 2017).
According to Duncan et al. (2017), there are several security aspects enterprises
should take in consideration in order to prevent the stated incident from happening again in
the future. First and foremost, enterprise must be aware that the current cloud computing
technology is still unable to fully overcome the security and privacy issue faced. Moreover,
the enterprises should be aware that IoT is filled with vulnerabilities as well as
communication flaws that has yet be addressed. Furthermore, Big Data might be deemed
intrinsically unsafe due to the weakness of traditional business database system. Most
importantly, these database systems are stored on the cloud servers. Hence, it is difficult to
ensure the data stored in terms of security and privacy.
Last but not least, Duncan and Whittington (2017) also listed the top 10 security
considerations in the figure below:
Page 5 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
1.4 Conclusion
In my point of view, security concerns are serious issue that should be solved in
Internet of Things (IoT) especially involved in the enterprise level. This is due to the reason
that most important information of an enterprise is stored in the cloud servers due to the
massive amount of information that needs to be stored. If the respective enterprise did not
take consideration in improving the security system of their cloud server, they will most
likely be attacked causing their enterprise information being leak to the third-party. This issue
might not only cause the newly developed ideas of the company be stolen by other
competitors in the same industry, most importantly, it will also lead the enterprise to failure.
Hence, it can be said without fear of contradiction that all enterprise should always be aware
of the security issues and take immediate action to overcome the issue once it is discovered.
Page 6 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
2.0 Privacy
2.1 Improving the Privacy of IoT with Decentralised Identifiers (DIDs)
According to Kortesniemi et al. (2019), the IOT devices should at least have sufficient
performance and energy to perform the operation required in the cryptographic. Besides, the
IoT devices also require sufficient amount of non-volatile storage capacity. This is due to the
reason that the IoT devices are required to produce random cryptographic keys during the
cryptographic operation and store the code and cryptographic key in the non-volatile storage
capacity. The researcher claims that DID is able to use distinct identification for each service
and switching them at appropriate intervals by using concept of anonymous and
pseudonymous identifiers. This means that it will be more difficult for the attackers to
correlate the activities of the user across multiple services.
Based on the analysis conducted by the researcher, it shows that DIDs can be said to
be a viable identifier option for most of the use cases as they can be developed on most
constraints IoT devices. Besides, a proxy-based technique can also be utilized if the
respective device is more constrained. Most importantly, it is considerably simpler to
construct as IoT devices will only need to conduct symmetric encryption operations.
Furthermore, IoT devices will not be able to learn the DID of the user. Hence, it can be said
that privacy concerns are preserved even the IoT device is hacked. The researchers
recommend that user should use privacy-enhancing solution like DIDs in all systems even
they are not absolutely necessary. This might prevent the information of the user being leaked
and most importantly, it can prevent system redesign if privacy aspect being concerned in the
later phase as it might be costly.
Page 7 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
Application Based Threats: These threats are mainly caused by unsecured mobile or
desktop applications as not all applications are protected by passwords. Poor and inadequate
security setups in these applications will cause the security and privacy risk arises. To quote
an example, when the user access to these applications, their personal information might be
collected and disseminated via an unsecured public network causing their personal
information being leaked.
Cloud Based Threats: A serious cyber-attack might occur if the cloud is configured poorly
over SSL/TLS. This is due to the reason that clouds are often targeted for SQL injection
attacks. If the cloud did not employ sufficient sanitization and input validation, it might cause
the cloud being attacked and all the information within the cloud will be leaked.
Hardware Devices Based Threats: IoT hardware devices will also be targeted due to
unsecured open external ports. For instance, if an IoT devices processes a malicious software
updates, the attackers will be able to access the device and access the information within the
device.
Page 8 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
According to Pathan et al. (2019), one of the primary concerns that ITSs confront is
the rise of hostile privacy threats. The degree and impact of such danger in terms of ITSs
might be lethal, preventing the ITSs industry from expanding into everyday life. Husnoo et
al. (2021) analysed the different DP application in terms of smart refrigerator, electrical
automobiles, and personally identifiable data.
Page 9 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
2.4 Conclusion
In conclusion, I think that the growth of IoT has slowly becoming a part of our lives.
This is in the light of fact that most accessories that we are using such as smart phones,
healthcare gadgets, automobiles and etc are slowly integrating IoT. As the IoT technology
continues to evolve, privacy concerns will continue to arise. This issue might lead to a serious
privacy issue as it is difficult for us to maintain and protect these massive privacy
information. To quote an example, most of the smart devices nowadays is able to monitor the
status of the user and linked it to the Internet. This means that the information of the user can
easily accessible over the Internet hence providing attackers the opportunity to access the
information effortlessly. As a result, it is essential for all user to ensure appropriate insurance
for the privacy of the user.
Page 10 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
3.0 Ethics
3.1 The ethics of shared Covid-19 risks: an epistemological framework for ethical
health technology assessment of risk in vaccine supply chain infrastructure
According to Radanliev et el. (2021), the primary focuses of this research is
evaluating the ethical risks generated by the IoT system in the supply chain. Turilli & Floridi
(2009) asserts that cyber risk ethics can be defined as networked IoT system that are related
to the ethical issues in terms of how the programme work and how it is capable of impacting
IoT-enabled supply chains (Turilli & Floridi, 2009, p. 106).
Last but not emphatically least, this study proposes that supply chains should be
defined with an ethical concern regarding the cyber threats. Besides, the researcher also
stated that individuals should have at least brief understand of each supply chain member
especially during this era where integration of new IoT are relatively fast. The knowledge gap
is addressed by the epistemological framework which incorporates ethical awareness,
transparency and responsibility incorporated in supply chain design the choice to integrate
IoT technology must be viewed as a collaborative effort, involving an ethical evaluation of
cyber threats and participation from all supply chain members as the supply chain involves
several parties.
Page 11 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
The result provided in this research paper are demonstrated using an epistemological
framework. This framework is able to ethically evaluate the shard hazards in a connected IoT
system based on a balance of theoretical and technology contribution. The proposed
framework allows for ethical awareness, transparency, and responsibility in evaluating newly
developed cyber threats of IoT in the healthcare industry. The epistemological framework is
based on bibliometric examination of current literature and case study research.
The epistemological framework proposed in this research paper uses and evolve the
current information derived from phrases obtained by bibliometric analysis. These
information includes research done before COVID-19 emergence occur. Besides, the
proposed framework also introduced a new methodology to integrate ethics into the
evaluation of shared risk in IoT-enabled medical systems. The framework proposed is
constructed based on an architecture that results from combining notions from framework
that predate COVID-19 and IoT. However, the proposed framework also includes the ethical
evaluation of shared cyber hazards that emerge from IoT and COVID-19. This proposes a
method for assessing shared cyber risk by examining IoT activities, which distinguished the
research from addressing the ethics of adopting IoT technology in medical systems and the
accompanying cyber dangers (Radanliev & De Roure, 2021, p. 18).
Page 12 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
First and foremost, the researcher uses propositional sentences to convey ethics
related to smart healthcare devices. The researchers then identify potential situations of
device usage that might result in ethical violations and develop suitable ethical response.
To quote an example, smart healthcare device that is able to monitor the status of an
individual will send notifications to their selected family members and doctors when the
status monitored by the smart healthcare device is unusual. This incident is known to be
ethical as only selective information are shared to selected family members and doctors.
Page 13 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
3.4 Conclusion
In conclusion, ethics also known as moral philosophy can be defined as the study of
what is consider good or bad as well as what is morally right and wrong. Besides, any system
or philosophy of moral ideas or principles can also be referred to by this term. Although the
main objective of Internet of Things tends to overcome the economic inequality among the
rich and poor, it will still produce some negative impact to the society. This is due to the
reason that IoT will discriminate individuals or families that do not have access to the
Internet. For instance, individuals and families that does not have the ability to get access to
the Internet will not be able to experience the advantages proposed by the IoT. Hence, in my
point of view, this ethical issue will still need to be resolve in building an economic equally
environment.
Page 14 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
4.0 Acceptance
4.1 Analysing Technology Acceptance for Internet of Things (IoT) Among
Accounting and Finance Students
In the year 1989, Davis has developed the Technology Acceptability Model (TAM) to
anticipate consumers’ levels of computer acceptance. He developed new scales for two
factors as essential predictors of acceptance in his research. He also stated that perceived
usefulness is defined as whether or not the individual uses a new technology by assessing the
degree of assistance it provides for their present employment. On the other hand, perceived
ease of use is defined as whether the technology is easy to use.
As noted by Yilmaz & Hazar (2019), the primary goal of this research paper is to
examine the level of acceptance for accounting and finance student in Internet of Things. In
this study, the researchers examinethe level of acceptability of IoT among art stream students
using the approach suggested by Morienyane & Marnewick (2019).
The Pearson’s Correlation Test conducted in this research finds out that PU and IU
have a positive relationship. This can be defined as if the art stream students consider IoT to
be beneficial (PU), they will most likely adopt it (IU). Based on the result, perceived
usefulness (PU) and intention to use (IU) are both positively affected by perceived ease of
use. Besides, user training that will provide more information on the subject also shown
positive correlation in perceived ease of use (PU). Furthermore, if the conditions are made
easier, it will have a favourable impact on the objective (IU). Last but not least, the
availability of user in participating the design of IoT-enabled products shows positive
correlation on perceived utility (PU). The table below summarises the hypotheses that were
tested in the study (Yilmaz & Hazar, 2019, p. 207).
Page 15 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
The first two antecedents are user character and cyber resilience. These two
antecedents might lead to a facilitated appropriation process for technology adoptions. This
means that most consumers will prefer an IoT device that is capable to make their lives
easier. However, the IoT devices should be easy to use and able to incorporate an artefact into
their working environments.
The fourth antecedent of social influence is discovered to have the specific attribute in
providing a beneficial impact on perceived ease of use. This twofold route is in line with the
findings of Venkatesh and Davis (1989), who discovered that if a person considers a
technical product or system as simple to use and requires little effort, that person will thinks
that the product or system to be more helpful (Davis, 1989, p. 319).
In terms of the twofold path to perceived usefulness, the fifth antecedent of trust
shares the same defining characteristics as social influence. Trust favourably influences
perceived usefulness in both paths which is indirectly and directly through perceived
usefulness which in turn highly predicts attitude formation, leading to behavioural intention.
Page 16 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
The result shows that Performance Expectancy is the most important factor of IoT
attitude, and that utilitarian value is important in shaping IoT attitudes in smart home
environments. Besides, the findings of the research also shows that Effort Expectancy has a
considerable impact on consumer IoT attitudes. This can be defined as smart home
consumers will most probably have positive attitude towards the technology of smart home if
they feel that they can readily engage with smart home technologies. Besides, Social
Influences also indicate a strong and positive correlation that affect the attitude of consumers
towards smart home technology. For instance, consumers will be more likely to preserve
smart home technologies if their family members and friends are using the technology.
Moreover, Hedonic Motivation also shown to have a strong beneficial influence on attitudes
about smart home technologies. To quote an example, consumers will have a positive attitude
towards smart home technologies if the respective technology is engaging enough to attract
the attention of the consumer. Furthermore, the result also proves that Price Value will most
probably affect the attitude of consumers. Hence it can be said without fear of contradiction
that most consumers will measure whether the smart home technology will provide benefits
equal to the price before purchasing it. (Aldossari & Sidorova, 2018, p. 7).
On the other hand, a negative correlation between perceived security risk and attitude
towards smart home has been found in this research. This means that user who feel there is a
security risk associated with smart home technology are less likely to be enthusiastic about it.
Surprisingly, the findings shows that Privacy Risk has a favourable impact on attitudes about
smart home technologies. Despite the fact that customers are aware of the privacy risks
involved, they are enthusiastic about its implementation (Aldossari & Sidorova, 2018, p. 8).
Page 17 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
4.4 Conclusion
In conclusion, Technology Acceptance Model (TAM) is an important framework that
needs to be conducted before a new technology is introduced to the public. This is on account
that TAM is capable of capturing the roles of individuals, organizational members, and social
systems in the use of Internet-based systems. After TAM is conducted, the user will be able
to examine the gap between system design and system acceptance and plays an important role
in minimizing the cost-benefit ratio. Hence, it can be said without fear of contradiction that
the research in technology acceptance models is becoming increasing vital and critical.
Page 18 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
5.0 References
Aldossari, M. Q., & Sidorova, A. (2018). Consumer acceptance of Internet of things (IoT):
Smart home context. Journal of Computer Information Systems, 60(6), 507-
517. https://doi.org/10.1080/08874417.2018.1543000
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet
of things: A survey on enabling technologies, protocols, and applications. IEEE
Communications Surveys & Tutorials, 17(4), 2347-
2376. https://doi.org/10.1109/comst.2015.2444095
Chanal, P. M., & Kakkasageri, M. S. (2020). Security and Privacy in IoT: A
Survey. Springer Science+Business Media. https://doi.org/10.1007/s11277-020-
07649-9
Chang, V. (2017). Towards data analysis for weather cloud computing. Knowledge-Based
Systems, 127, 29-45. https://doi.org/10.1016/j.knosys.2017.03.003
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of
information technology. MIS Quarterly, 13(3), 319. https://doi.org/10.2307/249008
Duncan, B., Whittington, M., & Chang, V. (2016). Enterprise security: Why Do We Make It
So Difficult? 2017 International Conference on Engineering and Technology (ICET),
1-6. https://doi.org/10.1109/icengtechnol.2017.8308189
Duncan, B., Whittington, M., & Chang, V. (2017). Enterprise security and privacy: Why
adding IoT and big data makes it so much more difficult. 2017 International
Conference on Engineering and Technology
(ICET). https://doi.org/10.1109/icengtechnol.2017.8308189
Giang, N. K., Lea, R., Blackstock, M., & Leung, V. C. (2018). Fog at the edge: Experiences
building an edge computing platform. 2018 IEEE International Conference on Edge
Computing (EDGE). https://doi.org/10.1109/edge.2018.00009
Husnoo, M. A., Anwar, A., Chakrabortty, R. K., Doss, R., & Ryan, M. J. (2021). Differential
privacy for IoT-enabled critical infrastructure: A comprehensive survey. IEEE
Access, 9, 153276-153304. https://doi.org/10.1109/access.2021.3124309
Kaushik, K., & Dahiya, S. (2018). Security and privacy in IoT based E-business and
retail. 2018 International Conference on System Modeling & Advancement in
Research Trends (SMART), 78-81. https://doi.org/10.1109/sysmart.2018.8746961
Liu, J., Ren, A., Zhang, L., Sun, R., Du, X., & Guizani, M. (2019). A novel secure
authentication scheme for heterogeneous Internet of things. ICC 2019 - 2019 IEEE
Page 19 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
Page 20 of 21
Level 2 Asia Pacific University of Technology & Innovation
CT121-3-2-EIOT Enterprise Internet of Things APD2F2109CS(IS)
Sood, S. K. (2019). Mobile fog based secure cloud-IoT framework for enterprise multimedia
security. Multimedia Tools and Applications, 79(15-16), 10717-
10732. https://doi.org/10.1007/s11042-019-08573-2
Tsourela, M., & Nerantzaki, D. (2020). An Internet of things (IoT) acceptance model.
Assessing consumer’s behavior toward IoT products and applications. Future
Internet, 12(11), 191. https://doi.org/10.3390/fi12110191
Turilli, M., & Floridi, L. (2009). The ethics of information transparency. Ethics and
Information Technology, 11(2), 105-112. https://doi.org/10.1007/s10676-009-9187-9
Yilmaz, N. K., & Hazar, H. B. (2019). Analyzing technology acceptance for Internet of
things (IoT) among accounting and finance students. Pressacademia, 8(4), 198-
208. https://doi.org/10.17261/pressacademia.2019.1163
Page 21 of 21
Level 2 Asia Pacific University of Technology & Innovation