Graduate Essay Writers
Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.
Fill the order form details in 3 easy steps - paper's instructions guide.
Posted: July 1st, 2022
A Presentation on Security Concerns in IoT
Thank you for taking up this assignment.
I have attached the instructions and also the rubric that the assignment has to satisfy positively.
The topic (sample nursing essay examples by the best nursing assignment writing service) has to be something related to the “Internet of Things”. I have worked with writer #148234 before on a similar topic (sample nursing essay examples by the best nursing assignment writing service) and hence chose to work with the same writer now.
This assignment’s topic (sample nursing essay examples by the best nursing assignment writing service) has to be a persuasive topic (sample nursing essay examples by the best nursing assignment writing service) related to the “Internet of Things”. Examples of what is considered a persuasive topic (sample nursing essay examples by the best nursing assignment writing service) is found in the “Persuasive assignment” attached below. All the requirements in the instructins attached and the rubric have to be met.
I require 1500 words persuasive paper according to the instructions attached in the file AND a 500 word “summary” of the 1500 word paper that I can recite in a presentation in 3-4 minutes (Again, following rubric and instructions attached). Hence it is a total of 2000 words broken up into 2 parts (1500+500).
Please let me know incase of any questions.
Introduction
Today the IoT devices are increasingly becoming more convenient since they can now co-operate with each other more easily. This technology is considered to be the future, especially with the increasing use of the Internet. In other words, IoT technology will make a significant contribution to the future by changing our living standards and business models. However, with the increasing usage of IoT technology and connected devices, this technology’s network has become prone to different security attacks. As such, there is a serious need for the development of strong and efficient privacy and security protocols to safeguard the IoT networks, which will enhance confidentiality and integrity on the network.
IoT Security Concerns
According to Delgado (2015), the primary aim of IoT technology is to develop a superior or perfect world for humankind in the future, and this technology has significantly transformed our living styles or standards. However, although this technology comes with huge benefits, it’s prone to numerous security threats that face our daily lives. For example, the majority of the IoT devices have not been designed to cope with modern privacy and security attacks. This factor increases the security concerns of the IoT networks.
A common threat facing IoT technology today is the Man in the Middle attack .During this attack, intruders use eavesdroppers to silently sense the network transmission medium to steal vital information unnoticed. Additionally, Krishna and Gnanasekaran (2017) indicate that intruders can also modify the data in the IoT network, especially when the right encryption has not been done with the intention of steal the information under the transmission. To overcome this kind of attack, Li (2017) suggests that proper data integration and confidentiality should be applied to enhance integrity. Moreover, Li (2017) also indicates that encryption should also be applied as a solution to guard against these attacks to ensure intruders don’t steal information or modify it during transmission.
Another threat facing IoT technology is imitation, where intruders seek to use impersonation to gain unauthorized access into the network. Under this kind of attack, Krishna and Gnanasekaran (2017) indicates cloning and spoofing are the common techniques used where a malicious node is used to impersonate the IoT devices within the targeted network. Li (2017) suggests that this kind of attack can be avoided by utilizing identity-based authentication protocols. Moreover, physically unclonable functions are also used as a countermeasure to prevent cloning attacks.
Finally, Blocking and Denial-of-Service (DoS) attacks are also common threats facing IoT networks. During this kind of attacks, intruders send huge data streams which are intended to jam a specific network. Attackers can also send bulk messages to these IoT devices to disturb the normal network and device functionalities. Antivirus programs should also be installed on devices within the network and ensure that these programs are updated regularly.
Conclusion
From the foregoing, there is a serious need for the development of strong and efficient privacy and security protocols to safeguard the IoT networks, which will enhance confidentiality and integrity on the network. The IoT technology is made up of several platforms and devices with varying credentials, and every system has its security requirements based on its characteristics Lack of strong security mechanisms in most IoT devices have made IoT networks to become soft targets. Considering the significance of security in IoT devices and applications, installing security mechanisms on these devices and networks is very important.
Every Student Wants Quality and That’s What We Deliver
Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.
Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.
No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.
When you decide to place an order with Nursing.StudyBay, here is what happens:
Place an order in 3 easy steps. Takes less than 5 mins.