Admire S Mabhena Research Proposal
Admire S Mabhena Research Proposal
SURNAME: MABHENA
CENTRE: GWERU
CONTACT: 0779622323/0714106708
The concept of interconnected devices dates back to the early 1990s with the pioneering work of
researchers like Mark Weiser, who envisioned a world of "global computing" where everyday
objects could communicate and share data. The term "Internet of Things" was first coined in 1999
by Kevin Ashton, (Ashton, 2011) a pioneer in supply chain management, to describe a system
where Radio-Frequency Identification (RFID) tags would be used to track physical objects through
the supply chain. Since then, the IoT has witnessed explosive growth fueled by developments in
wireless communication technologies like Bluetooth, Wi-Fi, and Low-Power Wide-Area
Networks (LPWANs). These developments have enabled the connection of a huge collection of
devices, from simple sensors to complex industrial machines, to the internet, creating a truly
interconnected world.
While the functionality and connectivity of IoT devices have witnessed rapid evolution, security
measures have often lagged behind. (Restucia, et al., 2018) Stated that, “while the benefits of IoT
are undeniable, the reality is that security is not keeping up with the pace of innovation.” The
focus on rapid deployment and market penetration has, in many cases, overshadowed the
importance of robust security implementation. Additionally, the inherent limitations of some IoT
devices, such as limited processing power and memory constraints, create challenges for adopting
complex cryptographic solutions. This discrepancy between functionality and security has resulted
in a landscape riddled with vulnerabilities, leaving these devices susceptible to exploitation by
malicious actors. (Restucia, et al., 2018) In support of this, went on to say, “If necessary
precautions are not taken, malicious individuals will leverage the pervasiveness of the IoT to
disrupt communications, gain significant monetary advantages, or even physically harm people.”
Existing solutions, such as mandatory security standards and firmware update mechanisms, offer
a starting point but are often inadequate to address the full spectrum of vulnerabilities. There is a
need for further research on developing robust security protocols tailored to the specific limitations
of IoT devices. This can include exploring lightweight encryption algorithms, secure boot
processes, and standardized update mechanisms that ensure timely patching of vulnerabilities.
This research proposal aims to address this critical gap by critically analysing the currently existing
best practices and mitigation strategies for securing the IoT devices and make enormous
recommendations for upgrading both the security and infrastructure of IoT devices.
2) What are the potential security threats posed by insecure IoT devices?
3) What are the existing best practices and mitigation strategies for securing IoT devices?
4) How can security considerations be integrated into the design and development of IoT
devices?
To maintain a sharp and controllable inquiry, the ensuing delimitations will be imposed:
Scope of Devices: The focus of the study will be on consumer-centric smart devices commonly
embraced by individuals. These shall encompass: Smartphones, Tablets, Wearables, (smart
watches, fitness trackers)
This examination will omit specialized smart devices, like those tailored for industrial settings or
critical infrastructure, owing to their distinct security nuances.
Vulnerability Analysis: The emphasis of this study will be on impactful vulnerabilities that
present a considerable threat to users in the Gweru metropolitan area.
These could entail vulnerabilities facilitating unauthorized access to personal data, financial
details, or enabling malevolent device hijacking.
Given constraints in resources, a thorough scrutiny of every known vulnerability may not be within
reach.
As a substitute, the focus will be on prevalent and critical vulnerabilities impacting the designated
device categories.
Threat Analysis: The exploration will revolve around potential threats aimed at the chosen
consumer smart devices. These could encompass: data breaches and illicit access to personal data,
malware incursions and data breaches, deceptive phishing schemes and social engineering, frauds
leveraging vulnerabilities, physical tampering with devices for nefarious intents.
The study will refrain from delving into exceedingly intricate attack methods or those necessitating
substantial technical prowess.
Mitigation Strategies: The evaluation will gauge the efficacy of established mitigation tactics
commonly utilized by users and device manufacturers to tackle security vulnerabilities in
consumer smart devices. These could involve: robust password management and user
authentication protocols, routine software upgrades and security fixes, adoption of encryption and
privacy-centric features on devices, user education initiatives advocating optimal practices for
secure device utilization.
The study will sidestep entirely new mitigation strategies due to its concentration on prevailing
practices and their efficacy.
Geographical Focus: The primary spotlight will be on the security landscape of consumer smart
devices within the Gweru metropolitan area. This approach permits a focused scrutiny of
vulnerabilities and threats pertinent to users in this particular locale.
The conclusions drawn may not be universally applicable to other regions with differing
technology adoption rates, user demographics, or regulatory frameworks.
Dependence on publicly accessible data: The study will heavily rely on publicly accessible data
from various sources such as research reports, security advisories, and user accounts. However,
this data might not offer a completely accurate representation of the security landscape within the
Gweru region.
User Behavior and Awareness: Limited influence on user behavior: Although the research
concentrates on existing mitigation measures, their efficacy ultimately relies on user practices and
security awareness. Predicting or controlling user behavior is challenging, potentially affecting the
generalizability of the findings.
Challenges in collecting user data: Assessing user awareness and security habits within the
Gweru area may necessitate surveys or interviews. Nevertheless, these methods could introduce
biases and limitations due to sampling techniques and response rates.
Focus on Gweru Metropolitan Area: Restricted generalisability: The findings and conclusions
drawn may not be directly transferable to other regions with distinct user demographics, levels of
technology adoption, or regulatory frameworks.
By recognizing these limitations, the study underscores the necessity for continual vigilance and
adaptability in response to the perpetually evolving security landscape concerning consumer smart
devices.
1. User Privacy:
Anonymity and Data Protection: Any data collected from users through surveys or
interviews will be anonymized. No personally identifiable information (PII) will be
collected without informed consent. All data will be stored securely and disposed of
following best practices upon project completion.
Data Minimization: Only data essential for the research will be collected. User behavior
and device usage data will be limited to aspects directly relevant to security vulnerabilities
and mitigation strategies.
5. Research Integrity:
Transparency and Honesty: Transparency will be maintained throughout the research
process. Methods, findings, and limitations will be reported accurately. Any potential
conflicts of interest will be disclosed to ensure research integrity.
By upholding these ethical principles, this research aims to contribute valuable insights to the
security landscape of consumer smart devices while maintaining user trust and promoting
responsible practices within the field of cybersecurity.
Multiple studies highlight the inherent limitations of IoT devices that contribute to security
vulnerabilities. For instance, (Haitjema, et al., 2018) emphasize the resource constraints of IoT
devices, limited processing power and memory, hindering the implementation of complex security
solutions. This creates an environment ripe for exploitation. (Wei et al., 2015) categorize common
vulnerabilities, including weak authentication protocols (e.g., reliance on pre-shared keys), lack of
encryption for data transmission and storage, and outdated firmware due to limited update
mechanisms. These vulnerabilities create easy entry points for attackers to gain unauthorized
access to devices, steal data, or disrupt operations.
Existing Best Practices and Mitigation Strategies for Securing IoT Devices:
Several approaches are being explored to address IoT security vulnerabilities. For instance, (Lin,
et al., 2017) propose the adoption of mandatory security standards for IoT devices to establish
baseline security requirements. This can be crucial in ensuring a minimum level of security across
the vast array of IoT devices being developed and deployed. (Menezes et al, 2020) explore the
importance of firmware updates, ensuring timely patching of vulnerabilities to prevent
exploitation. Additionally, (Krombholz, et al., 2019) discuss the value of user awareness
campaigns to educate users on best practices for securing their devices, such as using strong
passwords and keeping software updated. While these strategies are a starting point, (Li, et al.,
2021) emphasize the need for further research on developing robust security protocols tailored to
the limitations of IoT devices.
1. Literature Review:
An extensive review of existing research will be conducted to explore the known security
challenges faced by consumer smart devices. This includes:
o Analyzing academic journals, conference proceedings, and security reports
focusing on vulnerabilities in IoT devices.
o Identifying common categories of vulnerabilities, such as weak authentication
protocols, lack of encryption, and outdated firmware.
o Evaluating the potential consequences of these vulnerabilities for users and the
broader ecosystem.
Citations will be included throughout the review to ensure proper referencing of sources.
2. Case Studies:
In-depth analysis of real-world cases where IoT devices were compromised will be
conducted. This includes:
o Selecting relevant case studies of high-profile attacks targeting consumer smart
devices (e.g., Mirai botnet attack).
o Analysing the specific vulnerabilities exploited in these attacks and the resulting
consequences.
o Drawing insights into attacker motivations, methods, and potential mitigation
strategies.
3. Interviews:
Semi-structured interviews will be conducted with experts from various backgrounds to
gain diverse perspectives:
o Security industry professionals: Interviewing cybersecurity experts will shed light
on current industry practices, detection methods, and emerging threats.
o IoT users in the Gweru area: Interviews with individuals using consumer smart
devices in various sectors (banking, healthcare, personal) will provide valuable
insights into user experiences, security awareness, and perceived risks.
An interview guide will be developed to ensure consistent data collection across
participants.
Informed consent will be obtained from all interviewees, and anonymity will be preserved.
Interview data will be transcribed and thematically analyzed to identify key themes and
insights.
4. Data Analysis:
Data gathered from the literature review, case studies, and interviews will be analyzed
using a mixed-method approach. This combines quantitative (e.g., frequency of specific
vulnerabilities) and qualitative (e.g., user perceptions) analysis to generate a holistic
understanding.
Thematic analysis will be used to identify patterns and recurring themes within the
interview data.
Triangulation will be employed by cross-referencing findings from different data sources
to enhance the research validity.
5. Ethical Considerations:
Informed consent will be obtained from all participants in interviews.
Anonymity will be assured for interviewees to encourage honest and open responses.
Data will be stored securely and disposed of following best practices upon project
completion.
This multi-method approach will provide a comprehensive picture of the security landscape for
consumer smart devices within the Gweru metropolitan area. By combining insights from existing
research, real-world attack examples, expert opinions, and user experiences, the study aims to
develop actionable recommendations for enhancing the security posture of smart devices and
promoting user awareness.
1. Research Phases:
The research will be conducted in the following phases:
Phase 1: Literature Review:
o Conduct a comprehensive review of existing research on security vulnerabilities in
consumer smart devices.
o Identify common vulnerabilities, potential threats, and existing mitigation
strategies.
5. Ethical Considerations:
Informed consent will be obtained from all interview participants.
Anonymity will be maintained for participants.
Data will be stored securely and disposed of following best practices.
By employing this multi-method design with clear research phases, variables, data collection
instruments, and analysis techniques, the research aims to achieve a rigorous and comprehensive
understanding of the security landscape for consumer smart devices within the Gweru metropolitan
area.
1.13 Conclusion.
This research proposal seeks to provide valuable insights into navigating the complex security
challenges posed by the Internet of Things, ultimately contributing to a safer and more resilient
IoT ecosystem, this is hereby going to be done by highlighting the urgency of addressing security
concerns within the rapidly evolving world of IoT. By exploring vulnerabilities, best practices,
and potential solutions, this research aims to contribute to a more secure and reliable future for the
Internet of Things.
References
Ashton, K., 2011. That "Internet of Things" Thing. RFiD Journal, Volume 22, p. 7.
Dalla, M., Zanjir, Y. & Dehghani, M., 2016. A Survey on the mirai botnet attack: Its architecture, impact and defense
strategies.. IEEE International Symposium on Computers and Communications (ISCC), pp. 1-6.
Das , D. & Sharma, B., 2016. General Survey on Security Issues on Internet of Things. International Journal of
Computer Applications, 139(2), pp. 23-29.
Goeke, L., 2017. Security Challenges of the Internet of Things, s.l.: Haaga-Helia University of Applied Sciences.
Haitjema, R. J., Rad, P. M. & Choo, K. R., 2018. The Internet of things: A survey on enabling technologies, security
and privacy, and applications.. Future Internet, 10(6).
Krombholz, O., EBig, A. & Hoffman, M., 2019. An analysis of user awareness and secure behavior in the context of
the internet of things.. Pervasive and Mobile Computing, 58(101050).
Lin, C., Shen, J., Pan, C. & Chen, Y., 2017. Mandatory security requirements for internet of things devices: Avendor-
neutral approach.. IEEE Internet of Things Journal, 4(1), pp. 315-324.
Li, S., Xu, L. & Zhao, S., 2021. The security challenges and solutions for blockchain technology in the internet of
things.. IEEE Transactions on Industrial Electronics, 68(4), pp. 3110-3118.
Munira, A. S., Musa , D.-a. M. & Muhammad , B. A., 2024. Challenges with Internet of Things (IoT) Security. Global
Journal of Research in Engineering & Computer Sciences, 4(2), pp. 64-68.
Restucia, F., D'Oro, S. & Melodia, T., 2018. Securing the Internet of Things: New Perspectives and Research
Challenges. IEEE INTERNET OF THINGS JOURNAL, 1(1), pp. 1-16.
Smith, S., 2017. The Internet of Risky Things. Trusting the devices That Surround Us.. s.l.:O'Reilly Media Inc..