Review Of Abomhara & Koien (2015) On Cybersecurity And IoT

Review of Abomhara & Koien (2015) on Cybersecurity and IoT

For this assignment, review the article: Abomhara, M., & Koien, G.M. (2015). Cybersecurity and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm.414 and evaluate it in 3 pages (800 words), using your own words, by addressing the following: What did the authors investigate, and in general how did they do so? Identify the hypothesis or question being tested. Summarize the overall article. Identify the conclusions of the authors. Indicate whether or not you think the data support their conclusions/hypothesis. Consider alternative explanations for the results. Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions). The relevance or importance of the study. The appropriateness of the experimental design. When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. Your paper should meet the following requirements: Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced) Follow APA 7 guidelines.

Paper For Above instruction

The article by Abomhara and Koien (2015) investigates the cybersecurity challenges associated with the Internet of Things (IoT). As IoT devices become increasingly prevalent in daily life, the authors examine the vulnerabilities, threats, intruders, and possible attack vectors that threaten these interconnected systems. The primary aim of the study is to highlight the security issues and propose a comprehensive understanding of the potential risks posed by IoT environments. The authors explore various threat scenarios and analyze different attack methods that malicious actors could utilize to compromise IoT devices and networks.

In terms of methodology, the authors conduct an extensive review of existing literature and industry reports to synthesize current knowledge on IoT security vulnerabilities. They analyze technical characteristics of IoT systems, including their resource constraints, heterogeneity, and scalability issues, which influence security strategies. They also evaluate multiple case studies of recent security breaches involving IoT devices. The paper does not employ empirical data collection or experimental procedures; instead, it relies on theoretical analysis and literature synthesis to delineate different attack types and vulnerabilities, such as denial-of-service attacks, malware infiltration, and data interception.

The central research question addressed in the article pertains to understanding how vulnerabilities in IoT architectures can be exploited and what measures can be implemented to mitigate these risks. The authors hypothesize that the unique physical and logical attributes of IoT systems make them susceptible to a wide range of attacks, which necessitate tailored security solutions beyond traditional cybersecurity measures. Their analysis supports this hypothesis by illustrating specific weaknesses in IoT protocols, device limitations, and security management issues.

The authors conclude that IoT devices are inherently vulnerable due to their resource constraints and the complexity of their deployment environments. They emphasize that current security practices are insufficient to protect these systems adequately and advocate for a multi-layered security framework tailored to IoT specifics. They also stress the importance of integrating security into the design phase of IoT systems and adopting standardized security protocols to address emerging threats effectively. Overall, their findings underscore the urgent need for rigorous security practices and ongoing research in IoT cybersecurity.

Regarding the support for their conclusions, the analysis primarily depends on secondary data, case studies, and logical reasoning. While compelling, the reliance on literature review without new empirical data limits the scope of validation. The assumptions about vulnerabilities are consistent with numerous documented attacks and known weaknesses, supporting the overall argument. However, alternative explanations might involve the effectiveness of emerging innovative security solutions or the adaptive capabilities of threat actors, which the article does not extensively explore.

The article's significance lies in raising awareness about IoT security vulnerabilities, which are increasingly relevant given the proliferation of connected devices across sectors such as healthcare, transportation, and home automation. Recognizing these risks is crucial for policymakers, manufacturers, and cybersecurity professionals. The synthesis of vulnerabilities and threats provides a foundational understanding necessary for developing more secure IoT architectures.

In terms of research design, the article's reliance on literature review and case analysis is appropriate for a conceptual exploration of a rapidly evolving field. However, future research should aim to include empirical testing, such as vulnerability assessments, penetration testing, and real-world threat simulations, to validate and extend the theoretical insights presented. Such experimental approaches would deepen understanding of attack vectors and effectiveness of security measures under varied conditions.

In conclusion, Abomhara and Koien’s (2015) study effectively highlights critical vulnerabilities in IoT systems and emphasizes the need for comprehensive security strategies. Despite limitations due to its theoretical nature, the article serves as an essential resource for understanding the landscape of IoT cybersecurity threats and the importance of proactive security measures. Follow-up research adopting empirical methods could further validate proposed solutions and develop robust defense mechanisms suited for the dynamic IoT ecosystem.

References

  • Abomhara, M., & Koien, G. M. (2015). Cybersecurity and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65–88. https://doi.org/10.13052/jcsm.414
  • Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266-2279.
  • Weber, R. H. (2010). Internet of things – New security and privacy challenges. Computer Law & Security Review, 26(1), 23-30.
  • Roman, R., et al. (2011). M2M communications in the IoT: An overview. Future Internet, 3(3), 358-394.
  • Sicari, S., Rizzardi, A., Lioa, A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Communications, 75, 263-274.
  • Al-Fuqaha, A., et al. (2015). Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.
  • Lee, J., & Jang, Y. (2019). IoT security: Challenges and solutions. IEEE Communications Magazine, 57(4), 38-43.
  • Sicari, S., et al. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Communications, 75, 263-274.
  • Conti, M., et al. (2018). A survey on security and privacy in IoT: Attacks, solutions, and challenges. IEEE Communications Surveys & Tutorials, 20(4), 2416-2442.
  • Miorandi, D., et al. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497-1516.