0% found this document useful (0 votes)
69 views17 pages

Admire S Mabhena Research Proposal

A discussion on security challenges of the internet of things devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views17 pages

Admire S Mabhena Research Proposal

A discussion on security challenges of the internet of things devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

DEPARTMENT OF BUSINESS STUDIES

NAME: ADMIRE SIMBARASHE

SURNAME: MABHENA

CENTRE: GWERU

INTAKE: JUNE 2024

PROGRAMME: DIPLOMA IN INFORMATION TECHNOLGY

MODULE NAME: RESEARCH METHODS

MODULE CODE: IT 2302

CONTACT: 0779622323/0714106708

RESEARCH PROPOSAL TOPIC

AN INVESTIGATION OF THE SECURITY CHALLENGES OF THE INTERNET OF


THINGS.
1.0 Introduction.
Essentially the World Wide Web (WWW) is going through a major change in our world, with
everything we use now being interconnected and possibly changing our lifestyle, work, and
interaction. It seems there are no limits to possible applications, from smart homes that know what
we want to wearables on or in our bodies that monitor our health. But beneath this promising
surface there is one hidden aspect—the dynamic security landscape of the IoT.
Imagine a situation where your supposedly well-protected pacemaker is hacked, or your self-
driving car is hijacked remotely. Such situations are not the products of a dystopian, hi-tech
imagination – they can happen in today’s world where devices galore are connected using often
sub-par security measures. The IoT vulnerabilities act like open doors that lure a whole range of
internet attacks ranging from data compromise and malware infections to even creation of botnets
and disrupting critical infrastructures.
The proposed research investigates deep into this unclear world of IoT security. We will try to
uncover the blind spots of this realm and identify the vulnerabilities that cause these systems to be
prone to attacks. We will perform a white-box analysis on this topic and expose the underlying
risks, as well as study some real-world threats in order to highlight the consequences posed by
these vulnerabilities.
However, this research will attempt also to provide a solution. We deliver a comprehensive
overview of state-of-the-art mitigation strategies and investigate several secure emerging
technologies that can be applied to strengthen the security aspects of IoT.
Come along with me on this promising journey to address the security challenges introduced by
Internet of Things and build together a more secure and connected future.
1.1 Background of the study.
The concept of the Internet of Things (IoT) has gained recognition symbolizing a growing system
of linked devices seamlessly embedded in our daily routines. Whether its thermostats adapting to
our temperature needs or wearable technology tracking our well-being the possibilities, with IoT
seem endless. This interconnected environment promises a future marked by ease, automation and
effectiveness. Yet beneath this promising outlook lies a frequently disregarded issue; the security
landscape, within the IoT network.
1.1.1 The Genesis of the IoT:

The concept of interconnected devices dates back to the early 1990s with the pioneering work of
researchers like Mark Weiser, who envisioned a world of "global computing" where everyday
objects could communicate and share data. The term "Internet of Things" was first coined in 1999
by Kevin Ashton, (Ashton, 2011) a pioneer in supply chain management, to describe a system
where Radio-Frequency Identification (RFID) tags would be used to track physical objects through
the supply chain. Since then, the IoT has witnessed explosive growth fueled by developments in
wireless communication technologies like Bluetooth, Wi-Fi, and Low-Power Wide-Area
Networks (LPWANs). These developments have enabled the connection of a huge collection of
devices, from simple sensors to complex industrial machines, to the internet, creating a truly
interconnected world.

1.1.2 The Security Lag:

While the functionality and connectivity of IoT devices have witnessed rapid evolution, security
measures have often lagged behind. (Restucia, et al., 2018) Stated that, “while the benefits of IoT
are undeniable, the reality is that security is not keeping up with the pace of innovation.” The
focus on rapid deployment and market penetration has, in many cases, overshadowed the
importance of robust security implementation. Additionally, the inherent limitations of some IoT
devices, such as limited processing power and memory constraints, create challenges for adopting
complex cryptographic solutions. This discrepancy between functionality and security has resulted
in a landscape riddled with vulnerabilities, leaving these devices susceptible to exploitation by
malicious actors. (Restucia, et al., 2018) In support of this, went on to say, “If necessary
precautions are not taken, malicious individuals will leverage the pervasiveness of the IoT to
disrupt communications, gain significant monetary advantages, or even physically harm people.”

1.1.3 The Evolving Threat Landscape:


The setting of cyber-attacks is continuously progressing, with attackers becoming increasingly
sophisticated in their methods and extending their target spectrum. Present cybercriminals are no
longer content with merely stealing data; they seek control over critical infrastructure, disruption
of essential services, and even the manipulation of physical systems. The vast amount of data
collected by IoT devices, including personal information, financial data, and real-time
environmental data, makes them particularly attractive targets. Hackers can exploit susceptibilities
in these devices to gain unauthorized access to this data, potentially leading to identity theft,
financial fraud, and even physical harm if critical infrastructure is compromised. Looking at the
sector of smart environment, (Smith, 2017) described a scenario of a hotel that replaced their old
light switches with some android tablets, so that guests could turn on and off their lights for their
rooms by using the tablet. A hotel guest that managed to sniff the Ethernet though was suddenly
able to use this feature for all hotel rooms, turning on and off the lights in other guests’ rooms.

1.1.4 Existing Research and Concerns:


Existing research has identified numerous security vulnerabilities within the IoT ecosystem.
Common categories of vulnerabilities include weak authentication protocols, such as reliance on
pre-shared keys or default passwords; the lack of encryption for data transmission and storage; and
outdated firmware that remains unpatched due to limited update mechanisms. These vulnerabilities
create easy entry points for attackers to gain unauthorized access to devices, manipulate data, and
potentially disrupt the functioning of connected systems.

1.1.5 The Need for a Focused Approach:


The rapid growth of the IoT, coupled with its inherent security shortcomings, creates a pressing
need for focused research and development efforts. If left unaddressed, these vulnerabilities can
have a significant impact on individuals, businesses, and critical infrastructure. Individuals face
risks like identity theft, financial fraud, and even physical harm due to compromised medical
devices. Businesses can suffer data breaches, operational disruptions, and reputational damage
from attacks targeting their connected systems. Furthermore, critical infrastructure, including
power grids and transportation systems, can be vulnerable to manipulation by attackers exploiting
IoT security lapses.

Existing solutions, such as mandatory security standards and firmware update mechanisms, offer
a starting point but are often inadequate to address the full spectrum of vulnerabilities. There is a
need for further research on developing robust security protocols tailored to the specific limitations
of IoT devices. This can include exploring lightweight encryption algorithms, secure boot
processes, and standardized update mechanisms that ensure timely patching of vulnerabilities.

1.2 Statement of the problem.


The rapid multiplying of interconnected devices within the Internet of Things (IoT) has outpaced
the development and implementation of robust security protocols. This inconsistency has resulted
in a landscape perforated with vulnerabilities, leaving IoT devices susceptible to exploitation by
malicious actors. Existing research identifies numerous security shortcomings, including weak
authentication protocols, lack of encryption, and outdated firmware. The evolving cyber threat
landscape, with its focus on data breaches, disruption of critical infrastructure, and manipulation
of physical systems, further intensifies the need for robust security solutions. Current measures,
such as mandatory security standards and firmware updates, offer a starting point but are often
inadequate to address the full spectrum of vulnerabilities. This lack of comprehensive security
within the IoT ecosystem poses a significant threat to individuals, businesses, and critical
infrastructure, potentially leading to identity theft, financial fraud, disruption of essential services,
and even physical harm.

This research proposal aims to address this critical gap by critically analysing the currently existing
best practices and mitigation strategies for securing the IoT devices and make enormous
recommendations for upgrading both the security and infrastructure of IoT devices.

1.3 Research objectives.


1) Identify and Analyse Current Primary Vulnerabilities of IoT Devices.
2) Evaluate Potential Security Threats Posed by Vulnerable IoT Devices.
3) Assess the Effectiveness of Existing Security Practices and Mitigation Strategies.
4) Propose and Evaluate New or Improved Mitigation Strategies.

1.4 Research questions.


1) What are the primary vulnerabilities of IoT devices?

2) What are the potential security threats posed by insecure IoT devices?

3) What are the existing best practices and mitigation strategies for securing IoT devices?

4) How can security considerations be integrated into the design and development of IoT
devices?

1.5 Significance of the study.


The security of the IoT has far reaching implications for individuals, businesses, and critical
infrastructure. By identifying vulnerabilities and exploring best practices, this research can
contribute to:
Protecting user privacy and sensitive data.
Minimising the risk of cyber-attacks.
Ensuring the safe and reliable operation of interconnected systems.
Promoting trust and confidence in the adoption of IoT technologies.

1.6 Delimitations of the study.


This investigation immerses itself in the realm of security vulnerabilities concerning consumer
smart devices in the bustling Gweru metropolitan area.

To maintain a sharp and controllable inquiry, the ensuing delimitations will be imposed:

Scope of Devices: The focus of the study will be on consumer-centric smart devices commonly
embraced by individuals. These shall encompass: Smartphones, Tablets, Wearables, (smart
watches, fitness trackers)

This examination will omit specialized smart devices, like those tailored for industrial settings or
critical infrastructure, owing to their distinct security nuances.

Vulnerability Analysis: The emphasis of this study will be on impactful vulnerabilities that
present a considerable threat to users in the Gweru metropolitan area.

These could entail vulnerabilities facilitating unauthorized access to personal data, financial
details, or enabling malevolent device hijacking.

Given constraints in resources, a thorough scrutiny of every known vulnerability may not be within
reach.

As a substitute, the focus will be on prevalent and critical vulnerabilities impacting the designated
device categories.

Threat Analysis: The exploration will revolve around potential threats aimed at the chosen
consumer smart devices. These could encompass: data breaches and illicit access to personal data,
malware incursions and data breaches, deceptive phishing schemes and social engineering, frauds
leveraging vulnerabilities, physical tampering with devices for nefarious intents.

The study will refrain from delving into exceedingly intricate attack methods or those necessitating
substantial technical prowess.
Mitigation Strategies: The evaluation will gauge the efficacy of established mitigation tactics
commonly utilized by users and device manufacturers to tackle security vulnerabilities in
consumer smart devices. These could involve: robust password management and user
authentication protocols, routine software upgrades and security fixes, adoption of encryption and
privacy-centric features on devices, user education initiatives advocating optimal practices for
secure device utilization.

The study will sidestep entirely new mitigation strategies due to its concentration on prevailing
practices and their efficacy.

Geographical Focus: The primary spotlight will be on the security landscape of consumer smart
devices within the Gweru metropolitan area. This approach permits a focused scrutiny of
vulnerabilities and threats pertinent to users in this particular locale.

The conclusions drawn may not be universally applicable to other regions with differing
technology adoption rates, user demographics, or regulatory frameworks.

1.7 Limitations of the study.


The study's objective is to conduct a thorough analysis of the security environment concerning
consumer smart devices in the Gweru metropolitan area. Nevertheless, there exist certain
constraints that must be taken into account:
Data Availability: Access to internal security data is restricted: Securing information on specific
vulnerabilities and attack attempts could be limited due to proprietary data held by device
manufacturers or mobile network operators.

Dependence on publicly accessible data: The study will heavily rely on publicly accessible data
from various sources such as research reports, security advisories, and user accounts. However,
this data might not offer a completely accurate representation of the security landscape within the
Gweru region.

User Behavior and Awareness: Limited influence on user behavior: Although the research
concentrates on existing mitigation measures, their efficacy ultimately relies on user practices and
security awareness. Predicting or controlling user behavior is challenging, potentially affecting the
generalizability of the findings.
Challenges in collecting user data: Assessing user awareness and security habits within the
Gweru area may necessitate surveys or interviews. Nevertheless, these methods could introduce
biases and limitations due to sampling techniques and response rates.

Technical Considerations: Constantly changing threat landscape: The emergence of new


vulnerabilities and attack methodologies is continuous. As a result, the research may not
encompass the most recent threats by the time of its completion.

Resource constraints for thorough vulnerability assessments: Investigating the technical


aspects and exploitability of vulnerabilities may be beyond the project's scope due to limited
resources.

Focus on Gweru Metropolitan Area: Restricted generalisability: The findings and conclusions
drawn may not be directly transferable to other regions with distinct user demographics, levels of
technology adoption, or regulatory frameworks.

By recognizing these limitations, the study underscores the necessity for continual vigilance and
adaptability in response to the perpetually evolving security landscape concerning consumer smart
devices.

1.8 Definition of key terms.


Internet of Things (IoT)-
Cyber-attacks-
Radio-Frequency Identification (RFID)-
Near-Field Communication (NFC)-
World Wide Web (WWW)-
Bluetooth-
Wireless Fidelity (Wi-Fi)-
Low-Power Wide-Area Networks (LPWANs)-

1.9 Research ethics.


This research project investigates the security vulnerabilities of consumer smart devices
(smartphones, tablets, wearables) within the Gweru metropolitan area. To ensure responsible
research practices and user protection, the following ethical considerations will be strictly adhered
to:

1. User Privacy:
 Anonymity and Data Protection: Any data collected from users through surveys or
interviews will be anonymized. No personally identifiable information (PII) will be
collected without informed consent. All data will be stored securely and disposed of
following best practices upon project completion.
 Data Minimization: Only data essential for the research will be collected. User behavior
and device usage data will be limited to aspects directly relevant to security vulnerabilities
and mitigation strategies.

2. Responsible Disclosure of Vulnerabilities:


 Disclosure Policy: A clear vulnerability disclosure policy will be established. If new
vulnerabilities are discovered, the device manufacturer and relevant cybersecurity
authorities will be notified following responsible disclosure practices. This ensures a patch
is implemented before public disclosure, minimizing potential risks to users.
 Balancing Transparency and Harm: Research findings will be presented objectively,
raising awareness about security vulnerabilities without causing undue panic or
discouraging technology adoption.

3. User Awareness and Education:


 Ethical Reporting: Findings will be communicated in a clear and understandable manner,
highlighting security risks and mitigation strategies.
 Recommendations for Users: Actionable recommendations for users will be provided,
promoting best practices for password management, software updates, and secure device
usage.

4. Respect for Intellectual Property:


 Copyright and Permissions: All existing research, security advisories, and other sources
used in this study will be properly cited and referenced, respecting copyright laws.

5. Research Integrity:
 Transparency and Honesty: Transparency will be maintained throughout the research
process. Methods, findings, and limitations will be reported accurately. Any potential
conflicts of interest will be disclosed to ensure research integrity.

By upholding these ethical principles, this research aims to contribute valuable insights to the
security landscape of consumer smart devices while maintaining user trust and promoting
responsible practices within the field of cybersecurity.

1.10 Preliminary Literature Review.


The Internet of Things (IoT) revolution is transforming our world, integrating smart devices into
every facet of our lives. However, this rapid growth has come at a cost – the alarming lack of
robust security measures within the IoT ecosystem. This literature review explores the primary
vulnerabilities of IoT devices, the potential security threats they pose, existing mitigation
strategies, and the importance of security integration into the design and development process.

Primary Vulnerabilities of IoT Devices:

Multiple studies highlight the inherent limitations of IoT devices that contribute to security
vulnerabilities. For instance, (Haitjema, et al., 2018) emphasize the resource constraints of IoT
devices, limited processing power and memory, hindering the implementation of complex security
solutions. This creates an environment ripe for exploitation. (Wei et al., 2015) categorize common
vulnerabilities, including weak authentication protocols (e.g., reliance on pre-shared keys), lack of
encryption for data transmission and storage, and outdated firmware due to limited update
mechanisms. These vulnerabilities create easy entry points for attackers to gain unauthorized
access to devices, steal data, or disrupt operations.

Potential Security Threats Posed by Insecure IoT Devices:


The consequences of insecure IoT devices can be significant. (Haitjema, et al., 2018) Highlight
the evolving cyber-threat landscape, where attackers target the vast amount of data collected by
IoT devices, including personal information, financial data, and even real-time environmental data.
This data can be exploited for identity theft, financial fraud, or physical harm if critical
infrastructure is compromised. As a prime example, (Dalla, et al., 2016) discuss the infamous Mirai
botnet attack, where compromised home routers and internet-connected cameras were exploited
to launch a massive Distributed Denial-of-Service (DDoS) attack disrupting major internet
services. These attacks showcase the potential for widespread disruption and the need for robust
security measures.

Existing Best Practices and Mitigation Strategies for Securing IoT Devices:
Several approaches are being explored to address IoT security vulnerabilities. For instance, (Lin,
et al., 2017) propose the adoption of mandatory security standards for IoT devices to establish
baseline security requirements. This can be crucial in ensuring a minimum level of security across
the vast array of IoT devices being developed and deployed. (Menezes et al, 2020) explore the
importance of firmware updates, ensuring timely patching of vulnerabilities to prevent
exploitation. Additionally, (Krombholz, et al., 2019) discuss the value of user awareness
campaigns to educate users on best practices for securing their devices, such as using strong
passwords and keeping software updated. While these strategies are a starting point, (Li, et al.,
2021) emphasize the need for further research on developing robust security protocols tailored to
the limitations of IoT devices.

Security Considerations in IoT Design and Development:


Integrating security from the outset is crucial for a secure IoT ecosystem. (Haitjema, et al., 2018)
Propose secure coding practices and secure boot processes to mitigate vulnerabilities. This requires
a shift in development culture, prioritizing security considerations alongside functionality and
performance. (Liu et al, 2020) argue for the development of lightweight encryption algorithms
specifically designed for resource-constrained IoT devices. These advancements can significantly
enhance the overall security posture of the IoT landscape.

1.11 Research Methodology.


This research aims to gain a comprehensive understanding of the security vulnerabilities plaguing
consumer smart devices (smartphones, tablets, wearables) within the Gweru metropolitan area. A
multi-method approach will be employed to achieve this objective, combining the strengths of
various data collection techniques:

1. Literature Review:
 An extensive review of existing research will be conducted to explore the known security
challenges faced by consumer smart devices. This includes:
o Analyzing academic journals, conference proceedings, and security reports
focusing on vulnerabilities in IoT devices.
o Identifying common categories of vulnerabilities, such as weak authentication
protocols, lack of encryption, and outdated firmware.
o Evaluating the potential consequences of these vulnerabilities for users and the
broader ecosystem.
 Citations will be included throughout the review to ensure proper referencing of sources.

2. Case Studies:
 In-depth analysis of real-world cases where IoT devices were compromised will be
conducted. This includes:
o Selecting relevant case studies of high-profile attacks targeting consumer smart
devices (e.g., Mirai botnet attack).
o Analysing the specific vulnerabilities exploited in these attacks and the resulting
consequences.
o Drawing insights into attacker motivations, methods, and potential mitigation
strategies.

3. Interviews:
 Semi-structured interviews will be conducted with experts from various backgrounds to
gain diverse perspectives:
o Security industry professionals: Interviewing cybersecurity experts will shed light
on current industry practices, detection methods, and emerging threats.
o IoT users in the Gweru area: Interviews with individuals using consumer smart
devices in various sectors (banking, healthcare, personal) will provide valuable
insights into user experiences, security awareness, and perceived risks.
 An interview guide will be developed to ensure consistent data collection across
participants.
 Informed consent will be obtained from all interviewees, and anonymity will be preserved.
 Interview data will be transcribed and thematically analyzed to identify key themes and
insights.

4. Data Analysis:
 Data gathered from the literature review, case studies, and interviews will be analyzed
using a mixed-method approach. This combines quantitative (e.g., frequency of specific
vulnerabilities) and qualitative (e.g., user perceptions) analysis to generate a holistic
understanding.
 Thematic analysis will be used to identify patterns and recurring themes within the
interview data.
 Triangulation will be employed by cross-referencing findings from different data sources
to enhance the research validity.

5. Ethical Considerations:
 Informed consent will be obtained from all participants in interviews.
 Anonymity will be assured for interviewees to encourage honest and open responses.
 Data will be stored securely and disposed of following best practices upon project
completion.

This multi-method approach will provide a comprehensive picture of the security landscape for
consumer smart devices within the Gweru metropolitan area. By combining insights from existing
research, real-world attack examples, expert opinions, and user experiences, the study aims to
develop actionable recommendations for enhancing the security posture of smart devices and
promoting user awareness.

1.12 Research Design.


This research employs a descriptive, multi-method design to investigate the security vulnerabilities
of consumer smart devices (smartphones, tablets, wearables) within the Gweru metropolitan area.
This combined approach allows for a comprehensive understanding of the security challenges from
various perspectives.

1. Research Phases:
The research will be conducted in the following phases:
 Phase 1: Literature Review:
o Conduct a comprehensive review of existing research on security vulnerabilities in
consumer smart devices.
o Identify common vulnerabilities, potential threats, and existing mitigation
strategies.

 Phase 2: Case Study Selection:


o Select relevant case studies of high-profile attacks targeting consumer smart
devices.
o Analyse the attack vectors, exploited vulnerabilities, and resulting consequences.

 Phase 3: Interview Development:


o Develop an interview guide for semi-structured interviews with diverse
participants.
o Recruit participants from the security industry and user groups in Gweru (banking,
healthcare, personal).

 Phase 4: Data Collection:


o Conduct interviews with security experts and IoT users.
o Ensure informed consent and anonymity for participants.
o Collect data from the literature review and case studies.

 Phase 5: Data Analysis:


o Analyse interview data using thematic analysis to identify recurring themes and
insights.
o Analyze data from the literature review and case studies to understand
vulnerabilities, threats, and mitigation strategies.
o Employ triangulation to cross-reference findings and enhance research validity.

 Phase 6: Reporting and Recommendations:


o Prepare a comprehensive research report with findings, conclusions, and
recommendations.
o Develop actionable recommendations for users, device manufacturers, and
policymakers to enhance the security of consumer smart devices in Gweru.
2. Research Variables:
 Independent Variables: These are the factors influencing the security of consumer smart
devices. In this study, they include:
o Device type (smartphone, tablet, wearable)
o User behavior (security practices, awareness)
o Existing security features on devices
 Dependent Variable: This is the outcome we are measuring. In this study, it is the level
of security risk associated with consumer smart devices within Gweru.

3. Data Collection Instruments:


 Literature review tools: Academic databases, security reports, conference proceedings.
 Case study selection tools: Reputable online resources, security industry publications.
 Interview instrument: Semi-structured interview guide tailored for each participant group.

4. Data Analysis Techniques:


 Thematic analysis for interview data.
 Content analysis for data from literature review and case studies.
 Triangulation to cross-reference findings from different data sources.

5. Ethical Considerations:
 Informed consent will be obtained from all interview participants.
 Anonymity will be maintained for participants.
 Data will be stored securely and disposed of following best practices.

By employing this multi-method design with clear research phases, variables, data collection
instruments, and analysis techniques, the research aims to achieve a rigorous and comprehensive
understanding of the security landscape for consumer smart devices within the Gweru metropolitan
area.

1.13 Conclusion.
This research proposal seeks to provide valuable insights into navigating the complex security
challenges posed by the Internet of Things, ultimately contributing to a safer and more resilient
IoT ecosystem, this is hereby going to be done by highlighting the urgency of addressing security
concerns within the rapidly evolving world of IoT. By exploring vulnerabilities, best practices,
and potential solutions, this research aims to contribute to a more secure and reliable future for the
Internet of Things.
References
Ashton, K., 2011. That "Internet of Things" Thing. RFiD Journal, Volume 22, p. 7.
Dalla, M., Zanjir, Y. & Dehghani, M., 2016. A Survey on the mirai botnet attack: Its architecture, impact and defense
strategies.. IEEE International Symposium on Computers and Communications (ISCC), pp. 1-6.
Das , D. & Sharma, B., 2016. General Survey on Security Issues on Internet of Things. International Journal of
Computer Applications, 139(2), pp. 23-29.
Goeke, L., 2017. Security Challenges of the Internet of Things, s.l.: Haaga-Helia University of Applied Sciences.
Haitjema, R. J., Rad, P. M. & Choo, K. R., 2018. The Internet of things: A survey on enabling technologies, security
and privacy, and applications.. Future Internet, 10(6).
Krombholz, O., EBig, A. & Hoffman, M., 2019. An analysis of user awareness and secure behavior in the context of
the internet of things.. Pervasive and Mobile Computing, 58(101050).
Lin, C., Shen, J., Pan, C. & Chen, Y., 2017. Mandatory security requirements for internet of things devices: Avendor-
neutral approach.. IEEE Internet of Things Journal, 4(1), pp. 315-324.
Li, S., Xu, L. & Zhao, S., 2021. The security challenges and solutions for blockchain technology in the internet of
things.. IEEE Transactions on Industrial Electronics, 68(4), pp. 3110-3118.
Munira, A. S., Musa , D.-a. M. & Muhammad , B. A., 2024. Challenges with Internet of Things (IoT) Security. Global
Journal of Research in Engineering & Computer Sciences, 4(2), pp. 64-68.
Restucia, F., D'Oro, S. & Melodia, T., 2018. Securing the Internet of Things: New Perspectives and Research
Challenges. IEEE INTERNET OF THINGS JOURNAL, 1(1), pp. 1-16.
Smith, S., 2017. The Internet of Risky Things. Trusting the devices That Surround Us.. s.l.:O'Reilly Media Inc..

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy