NORMA eResearch @NCI Library

Importance of IoT Security & Privacy to Mitigate Cyberattacks

Khurana, Umesh Vinaykumar (2021) Importance of IoT Security & Privacy to Mitigate Cyberattacks. Masters thesis, Dublin, National College of Ireland.

[thumbnail of Master of Science]
PDF (Master of Science)
Download (1MB) | Preview
[thumbnail of Configuration manual]
PDF (Configuration manual)
Download (1MB) | Preview


The Internet of Things (IoT) is the next technology leap that will greatly improve a variety of aspects of human life, notably healthcare, business, and transport. Despite the fact that technology may lead to positive individual and financial outcomes, artefact and user Security and privacy protection are still major issues that have arisen. Specifically, information flow must now be monitored and regulated by security mechanisms. This study looks into the origins of (a) various security and privacy issues, (b) challenges faced in defending infrastructure and technology based on IoT, (c) appropriate security measures, and (d) types of secrecy that are most suited and necessary for different features of Internetof-Things-driven apps. This study proposed an emerging IoT layers strategy. With security and privacy characteristics, as well as layer id, it is general and expandable. The planned IoT system with cloud/edge support has been developed and tested. The IoT nodes produced as Amazon Web Service Virtual Machines (AWS)as Amazon Web Service Virtual Machines (AWS) constitute the bottom layer. The intermediate layer (edge) was built using hardware for the Raspberry Pi 4and AWS' Greengrass Edge Environment. We used AWS' cloud-enabled IoT to create the top layer. Environment (the cloud). Safety protocols and critical organisational activities were developed across all of these layers to ensure the privacy of the clients' data. To allow data movement between the planned cloud/edge empowered IoT paradigm's layers, we built security certificates. The suggested system model not only eliminates potential security vulnerabilities but can also be utilised in conjunction with the best security strategies to mitigate the cybersecurity risks that each of the layers, cloud, edge and IoT face.

Item Type: Thesis (Masters)
Uncontrolled Keywords: Internet of Things; security and privacy; cloud IoT system; IoT layer model; Raspberry Pi 4; AWS Greengrass; cybersecurity
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunications > Computer networks > Internet of things
Divisions: School of Computing > Master of Science in Cyber Security
Depositing User: Tamara Malone
Date Deposited: 19 Dec 2022 17:33
Last Modified: 07 Mar 2023 17:05

Actions (login required)

View Item View Item