Advertisement
Guest User

Untitled

a guest
Jun 19th, 2019
108
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.02 KB | None | 0 0
  1.  
  2. Since 1999 where the term IoT (Internet of Things) was first coined, the world of IoT has exploded in all forms of manner. Although the term IoT is somewhat vague, all classes of devices that are in some form interconnected to communicate while being relatively compact in both size and resources, is considered to be an IoT device. IoT devices are generally seen in multiple use cases, for example numerous sensors monitoring objects, tracking, creating smart homes, etc. The main objective of IoT is to interconnect everything in order to improve the everyday life in regards to businesses and the single individual, amongst many more. In 2019, it is estimated that there are approximately 26 billion IoT connected devices worldwide, while it is thought that in 2025 more than 75 billion devices will be connected. The field of IoT is therefor especially interesting as it will most likely have more and more influence on society as a whole, as well as critical infrastructure. However, IoT also creates an abundance of new and unanticipated issues. One of the major critique points towards IoT, is the lack of security, where many have stated that the use of IoT creates the possibility of comprising systems with the use of IoT devices. In addition, multiple vulnerabilities are also likely to occur since IoT systems generally use no encryption for data, uses weak authentication, have no possibility to perform critical software updates remotely. Furthermore, as the amount of IoT devices has exploded, thousands of Distributed Denial of Service attacks has used IoT devices to perform the attacks, as so many devices are left vulnerable and easy targets to infect and exploit.
  3.  
  4. As explained there exists several security issues related to IoT. Therefor, there will in this project be developed an IoT system capable of transmitting data securely back and fourth while being resistant of third parties sniffing unencrypted data. Furthermore, as IoT devices are both vulnerable and used in DoS attacks, the IoT system will also be tested against DoS attacks.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement