Site Loader
Rock Street, San Francisco


2.3.1 Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) is a system that
supplies user’s or device’s identity information wireless radio waves in the
structure of some serial number 3. RFID technology has a crucial role in
solving identification issues in the digital world in a cost effective manner
and is composed of a tag, reader, software and server. It is grouped into three
types based on different provision methods of power supply i.e. Active RFID,
Passive RFID and Semi Passive RFID. This technology has a widespread
application such as tracing, monitoring patient health information and military
activities 4.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

2.3.2 Barcode

Barcode is a method of encoding letters and numbers using
combination of spaces of varying width and bars. There is different kind of
barcode i.e. QR code (Quick Response) first designed and used in automobile in
Japan. Due to its fast readability and greater storage capacity as compared to
the standard type, it usage has been widely adopted in the industries even
outside the automobile industries. They are only machine readable (readable by
laser scanners and cameras) and used to store information associated with the
object it is attached to.

2.3.3. Near Filed Communication (NFC)

Near Field Communication (NFC) is a set of communication
protocols that allows short range wireless connection between two devices which
are few centimeters near or proximate to each other (typically 4 cm) without
the use of internet connection. NFC allows exchanging digital content, carrying
out transactions, connecting electronic devices with a touch and supports
contactless payments via a smartphone’s NFC chip.

2.3.4. Artificial Intelligence (AI)

IoT is the core of Artificial Intelligence which provides a
responsive and sensitive environment to the presence of objects and people. In
Artificially Intelligent environment, devices are designed to digitally
exchange electronic data, make decisions based on anticipation, and cooperate
with other digital devices to support organization’s processes or individual’s
daily activities.


3.0. Cyberattacks Using IoT technology

4.0. Cause of Attacks/ Vulnerability of IoT

There is no centralized management of IoT devices where
updates could be distributed to patch the vulnerabilities. The absence of reliable
fast patch distribution system for IoT is an ongoing critical and
attention-requiring failure in terms of security deployment in IoT field. IoT
devices are difficult to patch even when vulnerabilities are known, identified
and a fix is in hand. Secondly IoT network is not segregated from internet
which provides open and unrestricted area for attacks on IoT devices and
uninvited connections. Moreover local and remote communications through IoT
devices are not encrypted. Nowadays most of the devices or communication
services are developed in compliance with cryptographic standard across the
board in order to ensure the confidentiality, authenticity and integrity of the
data being transmitted over the internet. However, IoT devices provide services
that fail to comply with the widely and increasingly adopted security standard

Post Author: admin


I'm Dora!

Would you like to get a custom essay? How about receiving a customized one?

Check it out