Sie sind auf Seite 1von 5

Network Management in

Organisations
Ethical issues associated with various
technologies
Student Name: Pooja
Student ID: MIT192843
Annotated Bibliography

Contents

1
Scenerio.............................................................................................................................................3

Annotated Bibliography.....................................................................................................................3

References.........................................................................................................................................4

2
Scenerio
Inter of things (IoT)

Annotated Bibliography
Artic issue is examined Author’s research Relevance for 3 key ideas emerged
le ID in the article approach our research
1. Security challenges N-Named A-Area N- Key idea for  Private own network
of smart home for Networking for IoT securing home through NDN
man in middle devices. The NDN IoT devices network
attack, DDoS and establishes trusted local through local  New devices can be
reply attack networks for IoT devices. network without allowed into private
The network constructed adopting cloud IoT network through
using local trust anchor, services cryptographically
and S-secure S-sign on P- authentication
protocol (SSP). Each  SSP protocol enables
device identified through secure as well as
unique name. New device automated sign on
sign in into network with new devices with
two certificates. Local pre-shared
trust anchor’s certificate information
for authenticating other
devices, its own own
certificate signed by trust
anchor for certifying
authenticity
2. Identifying the Selected hypothetical IoT Give an  IoT security can be
security risk enables scenarios in overview on achieved through
(confidentiality, Australia such as smart security coordinated work of
access control, Home (Belkin motion vulnerabilities supplier of IoT,
authentication) of sensor, TP link indoor & (confidentiality, consumers, insurer
IoT enabled outdoor sensor, Nest integrity & and regulators
devices smoke) IoT devices for authentication,  Security softwares
elder people(Blipcare, access control, are not updated for
sleep monitor, weight reflection IoT devices due to
monitor etc), smart attacks) of low memory capacity
electricity devices(LIFX various IoT  Manufacturer should
& Phillips hue light, TP pose security at
link power switch etc), design phase,
smart electronic consumer should
devices(smart TV, pose security
portable) speaker etc. ) methods at usability
Testing those IoT phase, insurer ensure
devices, Evaluating proper policies for
Security Risk, proposing cyber security,
security methods, government enforce
policies and
standards
3. Security Illustrates components of Provides  Security can be
vulnerabilities of IoT ecosystem(Devices Methodology for achieved at each
IoT ecosystem of IoT, device manager, designing secure layer
sensor bridges, services IoT devices.  Application layer
of IOT) and layers security- encryption,

3
(Perception, Network, PKI, authentication,
Data processing and authorization,
application) associated validation of user &
with the system, threats data
and solutions for the  Network layer:
threats at each layer firewall, encryption,
IDP etc
 Perception : physical
security, embedded
key, public key,
securing physical
devices
 Security principles :
confidentiality
privacy, trust

References
[1]. Yanbiao Li, Zhiyi Zhang, Xin Wang, Edward Lu, Dafang Zhang, and Lixia Zhang, “A Secure
Sign-On Protocol for Smart Homes over Named Data Networking”, FUTURE INTERNET:
ARCHITECTURES AND PROTOCOLS, IEEE Communications Magazine, July 2019.

[2]. Vijay Sivaraman, Hassan Habibi Gharakheili, Clinton Fernandes, Narelle Clark,
and Tanya Karliychuk, “Smart IoT Devices in the Home, Security and Privacy Implications”,
IEEE TEchnology and SocIETy MagazInE, 2018

[3]. Anshul Jain, Tanya Singh, Satyendra K. Sharma, “Threats Paradigmin IoT Ecosystem”, IEE
conference, 2018

Das könnte Ihnen auch gefallen