Two Page Research Paper On "Security Issues With IoT Based Smart Home Devices"
Topic- Security Issues with IoT Based Smart Home Devices
4.1.- Why did you ( "your group") selected the topic for your research project (50-words).
4.2.- What are the major contributions of this project "To your organization" (70-words).—Assume Service Industry (Organization)
4.3.- Can you use this process of research in a corporate setting (50-words)?
4.4.- How can you use the bibliography to further understand the benefits of your research. (50-words).
4.5.- State the summary of your finding (75-words).
4.6.- Indicate the need for future research (50-words)
4.7.- State your conclusion (75-Words).
References
Security Issues with IoT Based Smart Home Devices
(Practical Connection Report)
by
Bismit Pratapsingh
An assignment submitted in partial fulfillment of the requirements for
ITS-699 course as part of the degree of Masters
In
Information Technology
School of Computing and Information Sciences
University of the Cumberlands
ITS-699-01 – Information Technology Project
Professor: Dr. Zadok Hakim Due: August 9, 2020
Summer 2020
Abstract
Internet of Things (IoT) is a system that enables connectivity of the devices over the Internet. Smart home devices have been increasing lately due to the increased energy efficiency and the flexibility to control and operate multiple home appliances, all from one place. However, the use of technology has also raised various security and privacy threats. IoT security has become an issue of primary concern to safeguard user's personal information from being misused. This paper investigates multiple security issues with IoT based smart home devices, the threats of different protocols, the different types of architecture in IoT technology, the preferred architecture for smart-home devices, and how user awareness can minimize risks that IoT smart home devices face. Based on qualitative research, through secondary data that are different peer-review journals from previous years, thorough data analysis has been performed on the various security issues. Our investigations resulted in the conclusion that there is a need for more user awareness and identifying key security issues before implementing their solutions as often; these issues are not known. Choosing the right architecture is extremely important to reduce the security issues associated with smart-home devices.
Keywords : IoT, Smart Home Devices, Authentication, Confidentiality, Social Engineering, IoT Security, Privacy
Table of Contents Abstract ii 1. Choice of topic 1 2. Significant of the project on IT Service Organization 1 3. Use of the research in a corporate setting 1 4. Understanding the benefits of bibliography to the research 2 5. Summarized findings 2 6. The need for future research 2 7. Conclusion 2 8. References 3 9. Certification Page 4 10. Short Bio 5
ii
1. Choice of topic Raja - Create bullet point for PPT
Security is a significant concern in evaluating the problems posed by the network connectivity of devices. This challenge arises in light of the reality that personal information shared through the Internet in everyday tasks (Frustaci et al., 2018). Therefore, the topic works to investigate multiple security issues with IoT based smart home devices.
2. Significance of the project on IT Service Organization Bismit- Create bullet point for PPT
I need three bullet points
Each bullet points need one References ( one you can use which you have provided below, Conti et al., 2018)
1- From below you can take 1 point by using the same reference
2
3
Through identifying and addressing the multiple security challenges associated with the Internet of Things, practical solutions that alleviate these problems may be proposed and implemented (Conti et al., 2018). Group members for this project are working/associated with IT service organizations. This project can provide insight into creative ways to protect security resources in any organization, which is also relevant as it provides possible solutions to increasing potential security risk.
3. Use of the research in a corporate setting (in-text citation and add the reference to the list)- Create bullet point for PPT
This research could also benefit companies who have been victims of cyber-attacks and prevent future attacks by understanding the security issues that come with the architecture of a smart system.
4. Understanding the benefits of bibliography to the research- Hanni (50 words) (in-text citation and add the reference to the list)- Create bullet point for PPT
5. Summarized findings- Vinay N (75 Words) (in-text citation and add the reference to the list)- Create bullet point for PPT
6. The need for future research (in-text citation and add the reference to the list)- Create bullet point for PPT
Since technology is changing at a rapid pace, vulnerabilities and security loopholes will exist in Information Systems. IoT smart home devices are not exempt from these vulnerabilities. For Instance, mitigation techniques like encryption mechanisms may become obsolete in the future and pose the risk of data theft to unauthorized users.
7. Conclusion (in-text citation and add the reference to the list)- Create bullet point for PPT
IoT has brought new technologies and new devices (Smart Home). The usage of these smart home devices has seen very rapid growth over the past decade. Every new technology brings new features as well as new threats. This applies very much to IoT based smart home devices. Newer technologies resolved and fixed some of the existing security issues, but they brought in newer threats. More research is needed to address and fix new security threats.
8. References
Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546. https://doi.org/10.1016/j.future.2017.07.060
Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2018). Evaluating Critical Security Issues of the IoT World: Present and Future Challenges. IEEE Internet of Things Journal, 5(4), 2483–2495. https://doi.org/10.1109/JIOT.2017.2767291
9. Certification Page
Submitted to (Professor's Name): Dr. Zadok Hakim
Course: ITS 699
Student's Name: Bismit Pratapsingh, Dilraj Singh, Phani Teja Gorrepati, Raja Karki, Sabin Pandey, Umme Haani, Vinay Kumar Kotha, Vinay Nallapeta Gangarajaiah
Date of Submission: August 2, 2020
Purpose and Title of Submission: Security Issues with IoT Based Smart Home Devices
Certification of Authorship: I hereby certify that I am the author of this document and that any assistance I received in its preparation is fully acknowledged and disclosed in the document. I have also cited all sources from which I obtained data, ideas, or words that are copied directly or paraphrased in the document. Sources are properly credited according to accepted standards for professional publications. I also certify that this paper was prepared by me for this purpose.
Students' Signature: Sabin Raj Pandey
10. Short Bio
A person posing for the camera Description automatically generated Bismit Pratapsingh, live in the city of Louisville Metro area in Kentucky. He was born and raised in India, and his birth date is May 10. He has done his Master's in Business Administration (MBA) with a specialization in Information Technology (IT) from Sikkim Manipal University in India. Also, he has held out his Postgraduate in Labor Laws and Personnel mgmt. From Sambalpur University, Odisha, India. With the help of this course, He would like to expand his carrier, knowledge in Information Technology areas, which would directly or indirectly grow the industries. Currently, he is working as an Oracle ERP Architect in a commended organization where he is involving ratifying the Oracle ERP Application for his customers.
A person posing for the camera Description automatically generated Dilraj Singh was born in Punjab, India. He graduated with Bachelors's in computer science. He is working as a Test Engineer in Silicon Valley. His core skills are testing applications and software with java. He is also skilled in extracting and visualizing data using python and SQL. He is taking ITS-699 Master's ain a deep understanding of Information Technology.
A person smiling for the camera Description automatically generated Phani Teja Gorrepati was born in Vijayawada, India. He graduated with a Bachelor of Science degree from Andhra University, India. He is living in the United States for the past five years. He is currently working as an Application Security Consultant. He is skilled in vulnerability analysis and remediation in web applications and infrastructure components. He is taking ITS-699-01 to gain practical knowledge technologies and trends in Information Technology.
A person smiling for the camera Description automatically generated Raja Karki was born in Kathmandu, Nepal. He completed his undergraduate in Mathematics from Caldwellmaster'sity. He has worked in the IT field primarily as a Business Analyst. He has worked in a variety of domains, including mortgage, finance, and payment industry. With a Master's in Information Technology program, Mr. Karki aims to explore the strategies and analytics in the IT field, enhance his skills, and accomplish his career goals. He is taking ITS 699 to explore the functional aspects of the IT industry better and enhance his project management and presentation skills. Mr. Karki works as a Business Systems Consultant in a leading mortgage company.
A person wearing a blue shirt and smiling at the camera Description automatically generated
Meet Sabin R. Pandey – Born in Kathmandu, Nepal, on October 29 of 1991. He received Bachelors's in business administration from Pokhara University, Pokhara, Nepal. He took online courses for python, java, and Linux operating system. He then joined a master's degree in Information technology at The University of Cumberlands. He worked with the Banking Information system at the beginning of the career. He is now working with the Health Information management team at Alameda Health System in Oakland, California, since 2018. Also, for his self-project, he has built a continuous integration and continuous deployment (CI-CD) web page development system with various tools like GitLab, Jenkin, Java, Maven, Tomcat, and wants to make it bigger and better.
A person wearing a striped shirt and smiling at the camera Description automatically generated Vinay Kumar Kotha was born in Warangal, India, on January 17. He has an MBA in Leadership from the University of Findlay, Ohio graduated in 2008. He has another MBA in Finance from Kakatiya University, India graduated in 2004. Vinay Kotha has over 15 years of experience working in the Business Intelligence workiBachelor'sor companies in Auto, Health Care, Retail industries. Vinay Kotha also has trained over 700+ professionals in MSBI (Microsoft Business Intelligence) in various IT companies. Currently, he is working for a major automotive supplier. Vinay would like to use the knowledge gained in this course to use in his career and pursue a Doctoral degree.
A person looking at the camera Description automatically generated Vinay Nallapeta Gangarajaiah was born in Bangalore, India, and holds a Bachelor of Engineering degree from VTU University, India. He is an experienced Senior Data Engineer with a demonstrated history of working in the Information Technology and services industry. He is skilled in Big Data analytics, currently assisting data scientists in building recommendations and predictive models to improve the care provided to health care members.
A person standing in front of a fence Description automatically generated Umme Haani did her Bachelor's in Computer Engineering from Prince Mohammed Bin Fahd University in Saudi Arabia in 2017. She worked in Cognizant as a programmer analyst, and the work focused on the Pharmacy Benefit Management system for their client CVS. It involved work related to QA testing with selenium. She is currently pursuing a master's in information technology at the University of Cumberlands to leverage her skills and gain knowledge to establish a more well-defined career in IT for the future. She is looking forward to using all the skills learned throughout this program to make the world a better place in some form or the other.