Currently l am thinking of perusing research computing, ideal area cybersecurity problems and IoT, so far proposed research title "security risk assessment in IoT systems: Data privacy and security" any suggestions please experts
There are problems related to DDOS, Black Hole, Sink Hole, Worm Hole attacks in IOT. These you have to detect in resource constrained environment with limited storage, processing power and energy.
a detailed answer to your question can be found in this article:
Anca Jurcut, Tiberiu Niculcea,Pasika Ranaweera, Nhien‑An Le‑Khac : “Security Considerations for Internet of Things: A Survey”, SN Computer Science, Vol. 1, May 2020
As a research topic in this area, I propose the management of the risk of cyber crime of information systems and the potential loss of data transferred over the Internet, and the improvement of cyber security systems and instruments of information systems using modern ICT, Internet and Industry 4.0 information technologies, including the Internet of Things technology.
I really appreciate so much to all your superb and fantastic responds, very supportive.
Dariusz: Did you mean a proposed titles: 1. The management of the risk of cyber crime of information systems and the potential loss of data transferred over the Internet,
or 2. the improvement of cyber security systems and instruments of information systems using modern ICT,
or 3. Internet and Industry 4.0 information technologies, including the Internet of Things technology.
Common cybersecurity threats and attacks against IoT devices include:
Man-in-the-middle: An attacker breaches, interrupts, or spoofs communications between two systems.
Data and identity theft: Data generated by unprotected wearables and smart appliances provide cyber attackers with an ample amount of targeted personal information that can potentially be exploited for fraudulent transactions and identity theft.
Device hijacking: The attacker hijacks and effectively assumes control of a device. These attacks are quite difficult to detect because the attacker does not change the basic functionality of the device.
Distributed Denial of Service (DDoS): A denial-of-service attack (DoS attack) attempts to render a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. In the case of a distributed denial-of-service attack (DDoS), the incoming traffic flooding a target originates from multiple sources, making it difficult to stop the cyber offensive by simply blocking a single source. In fact, DDoS attacks are rising rapidly, primarily due to the lack of security in IoT Devices. The Mirai botnet attack was a massive distributed DDoS attack that left much of the internet inaccessible on the US east coast.
Permanent Denial of Service (PDoS): Permanent denial-of-service attacks (PDoS), also known as phlashing, is an attack that damages the device so badly that it requires replacement or reinstallation of hardware. BrickerBot, coded to exploit hard-coded passwords in IoT devices and cause a permanent denial of service, is one such example. Another example could see fake data fed to thermostats in an attempt to cause irreparable damage via extreme overheating.
IoT devices as data carriers. IoT devices are a very wide and diverse group of devices. These devices not only collect and exchange information, but can also store it. Important issues are access to this information, the ability to retrieve it from the device, and to effectively remove it when the device is decommissioned. While the issue of network protection is under investigation, the issue of access to information recorded on a device found in a garbage can seems to be waiting for its discoverer.
If you are talking about consumer IoT devices, the two problems are lack of understanding of security by vendors leading to serious vulnerabilities and the absence of security updates (timely or otherwise). Many (most?) consumer IoT vendors come from the CE space where there is a "fire and forget" sales model - they don't expect to hear from you except for hardware failures within the warranty period.
l'm writing proposal phd/research titled: Investigating IoT challenges and their risk management: sinkhole attacks on the internet of things and their prevention methods. any advice please
The interface (Api) is essential when dealing with IOT because iot applications are the points of interaction between any iot device and the internet connecting it, and this might be prone to cyber risk
I am sharing you the link to find out the current problems in Cyber-security and IoT. Follow this link: https://scholar.google.co.in/scholar?as_ylo=2019&q=Challenges+of+cyber+security+in+iot+systems&hl=en&as_sdt=0,5&as_vis=1
There are several challenges associated with cyber-security and IoT like Brute-forcing and the issue of default passwords, IoT botnets, IoT malware and ransomware, Insufficient testing and untrustworthy communication and many other security and privacy issues due to automation.