This research proposal explores the advantages and disadvantages of using IoT based devices in corporate establishments and society. It discusses the security concerns, privacy issues, and business inconsistencies of IoT devices.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:ADVANTAGES AND DISADVANTAGES OF IOT Advantages and disadvantages of IoT Name of the Student Name of the University Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ADVANTAGES AND DISADVANTAGES OF IOT Table of Contents Introduction................................................................................................................................2 Background Study......................................................................................................................2 Aims and Significance...............................................................................................................6 Research Plan.............................................................................................................................7 Publication Plan.....................................................................................................................7 Conclusion..................................................................................................................................8 References..................................................................................................................................9
2ADVANTAGES AND DISADVANTAGES OF IOT Introduction The use of the IoT based devices have both limitations as well as benefits which will be identified in this research proposal. Based on the investigative sources it can be said that the privacy, as well as the security of the IoT based devices, is the most significant disadvantage of the IoT based devices, at the same time it can be said that the optimisation of the work schedules is the significant benefit of the IoT based devices. ï‚·What are the benefits of using the IoT based devices? ï‚·What are the most common limitations of the IoT based devices? This research proposal will be considering the secondary data collection method, opinions and statement of reputed scholars will be presented in the background study of the proposal. The time frame of this proposal will be presented as a Gantt chart in the concluding sectionsoftheproposal.Thesubsequentsegmentofthisresearchproposalwillbe highlighting the foremost research questions of this proposal. Background Study As detailed byAlsaffaret al. (2016), most of the IoT based devices have security issues coming from both the users as well as from social engineers. The researcher of this resource stated about the impact of the hacking activities of the social engineers on the IoT based devices which are increasingly used in our society such as the thermostats (Machado and Shah 2016). The investigators of this resource stated that stolen identities is the other significant security concern for the users of the IoT based devices (Chandyet al.2017). The paper successfully identified the use of the SQL injection by the social engineers in the security attacks of the IoT based devices (Patelet al. 2017). The researcher of the paper also
3ADVANTAGES AND DISADVANTAGES OF IOT stated about the data security issues of the IoT based devices, which is one of the most significant limitation of this technology. However, Al-Turjman and Radwan (2017), stated that the business inconsistencies of the IoT devices is the most significant disadvantage of IoT based devices. The investigators of the resource mentioned that the business inconsistencies of the IoT based devices is due to the manufacturing defects of the devices and the business protocols of the system where the IoT based devices is incorporated. The paper also helps in identifying the stakeholder issue of the IoT devices, which can have a significant impact on the users (Dasguptaet al.2019). The researcher of the paper stated that there are lots of complexities of the cloud servers which are connected with most of the IoT devices which are increasingly used in the corporate establishments (Patel and Champaneria 2016). The paper also focused on the importance of the IT governance plan to deal with the complexities of IoT based devices (Maet al. 2016). This resource can be very much important for the readers of this proposal to have an idea about the limitations of the IoT based devices. However, the research gap of these paper is that none of the paper highlighted the ways to resolve the limitations of the IoT based devices. As mentioned by Ansariet al. (2015), safety and comfort of the users are the two main advantages of the use of IoT based devices in our society. The investigators of this resource stated that the advantages of the IoT based devices which are used in the corporate establishments must be retained at any cost so that the efficiency of this technology is enhanced (Parket al. 2018). The investigator of the resource also mentioned about the usability of the IoT devices which are increasingly used in our society such as the Google home voice controller and the August doorbell camera (El-Hajjet al.2017). The usefulness of the Kuri mobile robot was also identified from this resource. The resource can be very
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4ADVANTAGES AND DISADVANTAGES OF IOT much beneficial for the readers of this document to understand the effectiveness of wide range of IoT devices which are used in our society such as Amazon Dash button and Footbot Air Quality Monitor (Paethong, Sato and Namiki 2016). The researcher of the paper successfully highlighted the usefulness of each of these IoT based devices. The paper also explains the increasing use of the IoT based devices due to the extensive facilities and specifications provided by the IoT based devices (Estrada-Lópezet al.2018). There are lots of drawbacks in this resource, one of the foremost drawback of this paper is that it does not discuss the limitations of the IoT based devise, however the security vulnerabilities and the networking issues of the IoT based devices were not highlighted in this paper. However, the paper explains the usability of the IoT based devices in a professional manner. However, Atmokoet al.(2017), decision making concerning the use of IoT based devices is the most important factor for the smooth functionality of IoT based devices. The investigator of this resource stated that smart decision must be taken by the users of the IoT based devices during the enactment of the IoT based smart devices (Pattaret al. 2018). The investigator of the resources helps to identify the revenue generating feature of the IoT based devices which can be very much beneficial for the users of the IoT as well (Hanet al. 2017). The researcher of the paper stated that healthcare implants as well as the smart buildings can be significantly affected using the IoT based devices. The use of the IoT based wearable technology also have significant issues such as the network security issues which can have disastrous negative effects on the users of the IoT based devices (Newcombeet al.2017). The researcher of the paper stated that video surveillance facility of IoT devices which are used in corporate establishment can have a negative financial impact on the growth and productivity of commercial organizations (Huanget al. 2016). The investigator of the paper stated that the privacy as well as the scalability concerns of the IoT based devices must be resolved in the first place so that the efficiency of the IoT technology is maintained (Nasr,
5ADVANTAGES AND DISADVANTAGES OF IOT Kfoury and Khoury 2016). This resource have both drawbacks as well as advantages, the prime drawback of this resource is it does not helps in identifying most of the factors which can play a significant role of the usability of the IoT based devices (Imani et al., 2018). Both the researcher contradicted on their opinion about the advantages of the IoT based devices. The research gap which can be identified from the paper is these paper have not provided any detaileddescriptionofthedifferentwayswhichcanhelptheuserstoincreasethe effectiveness of the IoT based devices. According to Begum and Dixit (2016), the IoT based devise which are used for communication purpose in most of the global corporations have numerous security issues. The investigator of the paper mentioned that the privacy concerns of the IoT devices has to be managed in the first place using IT experts. At the same time, the paper successfully identifies the other limitation of IoT such as the over-dependency if the users of the IoT devices (Irajiet al.2017). The investigators of this resource compared most of the limitations of the IoT based devices such as the over-dependency of the IoT devices, privacy concerns in terms of the cybersecurity issues such as the side channel attacks, phishing emails and ransomware (Liuet al.2017). The investigator of this resources address the complexity issues of the IoT based devices which is a significant concern for most of the users of this technology who have no idea who to deal with the issues of this technology. The investigator of the paper stated that most of the security issues of the IoT based devices comes from the threats coming social engineers who are using new techniques in each of the recent cybersecurity issues (Jenson 2017). The researcher of this resource stated that the security issues of the IoT devices has to be resolved in the first place using the risk management procedures (Minoli, Sohraby and Kouns 2017). This resource have lots of limitations as well as benefits, the main benefit of this resource is it helps in the identifying the security concerns of the IoT based devices such as the phishing emails, ransomware and the side channel
6ADVANTAGES AND DISADVANTAGES OF IOT attacks. However, the prime limitation of the paper is it does not discuss the risk mitigation steps of each discussed cybersecurity issues. However, as declared by Bhayani, Patel and Bhatt (2016), meeting the expectation of the IoT devices is one of the challenges of IoT. The investigator of this resource mentioned that the IoT devices must be regularly updated so that the security loopholes of the IoT devices are minimized (Limet al.2017). The paper successfully identifies the connectivity issues of the IoT based devices, at the same time, it can also be said that there are lots of stringent government regulations with the use of the IoT based devices. The investigator of the resource also helped in the identification of the over dependency on the IoT devices (Kocakulak and Butun 2017). The paper also highlighted the financial impact of the IoT based devices, the researcher briefed that the use of the automated IoT based technologies has resulted in huge loss of jobs and over-reliance of the technology. This paper have numerous benefits in terms of the detailed description of the challenges of IoT based devices such as the cloud attacks, botnet concerns and the AI-based security issues (Krasniqi and Hajrizi 2016). The prime limitation of the paper is it fails to identify the ways to deal with the challenges of this technology (Machaka and Nelwamondo 2016). The gap in literature states that no of the paper helps in identifying the ways to deal with the security challenges of the IoT based devices, it only discussed the reasons behind and the impact of the security challenges. Aims and Significance The overall objective of tis research proposal is to identify the disadvantages as well as the benefits of using the IoT based devices in corporate establishments as well as in our society.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7ADVANTAGES AND DISADVANTAGES OF IOT Research Plan Each of the activities of this research proposal considering the task plan and the publication plan will be presented in the following Gantt chart table Activities1-6th month 6th- 12th month 12th -18th month 18th to24th Week 24th to30th Week 31nd to34th Week 35thto 36th Week Identify topicofthe proposal  Selectdata sources  Makea research layout  Research plan  Literature review  Data analysis  Formthe structure of the proposal  Publication plan  Proposal submission  Table 1: Timeframe of the proposal (Source: Created by the author) Publication Plan All the data of this proposal can be used for future research purposes as data has been collected from peer-reviewed journals. The data of this paper can be used in journals, conferences as well as in exhibitions. The open queries which can be identified from this proposal are as follows: What are ways to address the security challenges of IoT based devices?
8ADVANTAGES AND DISADVANTAGES OF IOT ï‚·How to increase the efficiency of IoT based devices? ï‚·Can a private network address the security issues if the IoT based devices? ï‚·How to prevent cyber security attacks on IoT devices? ï‚·What are the recent security concerns of the IoT devices? Conclusion The proposal helps in identifying both the add gains as well as the hindrances use of the IoT based devices in corporate establishments as well as in our society.
9ADVANTAGES AND DISADVANTAGES OF IOT References Alsaffar, A.A., Pham, H.P., Hong, C.S., Huh, E.N. and Aazam, M., 2016. An architecture of iot service delegation and resource allocation based on collaboration between fog and cloud computing.Mobile Information Systems,2016. Al-Turjman, F. and Radwan, A., 2017. Data delivery in wireless multimedia sensor networks: Challenging and defying in the IoT era.IEEE Wireless Communications,24(5), pp.126-131. Ansari, A.N., Sedky, M., Sharma, N. and Tyagi, A., 2015, January. An Internet of things approach for motion detection using Raspberry Pi. InProceedings of 2015 International Conference on Intelligent Computing and Internet of Things(pp. 131-134). IEEE. Atmoko, R.A., Riantini, R. and Hasin, M.K., 2017, May. IoT real time data acquisition using MQTT protocol. InJournal of Physics: Conference Series(Vol. 853, No. 1, p. 012003). IOP Publishing. Begum, K. and Dixit, S., 2016, March. Industrial WSN using IoT: A survey. In2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 499-504). IEEE. Bhayani, M., Patel, M. and Bhatt, C., 2016. Internet of Things (IoT): In a way of smart world. InProceedings of the international congress on information and communication technology (pp. 343-350). Springer, Singapore. Chandy, J.A., Fahrny, J., Haque, A., Wortman, P.A., Karimian, N. and Tehranipoor, F., 2017. Exploring Methods of Authentication for the Internet of Things. InInternet of Things(pp. 71- 90). Chapman and Hall/CRC.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10ADVANTAGES AND DISADVANTAGES OF IOT Dasgupta, A., Daruka, A., Pandey, A., Bose, A., Mukherjee, S. and Saha, S., 2019. Smart Irrigation: IOT-Based Irrigation Monitoring System. InProceedings of International Ethical Hacking Conference 2018(pp. 395-403). Springer, Singapore. El-Hajj, M., Chamoun, M., Fadlallah, A. and Serhrouchni, A., 2017, October. Analysis of authenticationtechniquesin Internetof Things(IoT).In2017 1stCyberSecurityin Networking Conference (CSNet)(pp. 1-3). IEEE. Estrada-López, J., Abuellil, A., Zeng, Z. and Sánchez-Sinencio, E., 2018. Multiple Input EnergyHarvestingSystemsforAutonomousIoTEnd-Nodes.JournalofLowPower Electronics and Applications,8(1), p.6. Han, S., Zhang, J., Zhu, M., Wu, J., Shen, C. and Kong, F., 2017, September. Analysis of the frontier technology of agricultural IoT and its predication research. InIOP Conference Series: Materials Science and Engineering(Vol. 231, No. 1, p. 012072). IOP Publishing. Huang, H., Zhou, J., Li, W., Zhang, J., Zhang, X. and Hou, G., 2016. Wearable indoor localisation approach in Internet of Things.IET Networks,5(5), pp.122-126. Imani, M., Moghadam, A.Q., Zarif, N., Noshiri, O., Faramarzi, K., Arabnia, H. and Joudaki, M., 2018. A comprehensive survey on addressing methods in the Internet of Things.arXiv preprint arXiv:1807.02173. Iraji, S., Mogensen, P. and Ratasuk, R., 2017. Recent advances in M2M communications and Internet of Things (IoT).International Journal of Wireless Information Networks,24(3), pp.240-242. Jenson,S.,2017,September.TheUXofIoT:unpackingtheInternetofThings.In Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services(p. 76). ACM.
11ADVANTAGES AND DISADVANTAGES OF IOT Kocakulak, M. and Butun, I., 2017, January. An overview of Wireless Sensor Networks towards internet of things. In2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC)(pp. 1-6). IEEE. Krasniqi, X. and Hajrizi, E., 2016. Use of IoT technology to drive the automotive industry from connected to full autonomous vehicles.IFAC-PapersOnLine,49(29), pp.269-274. Lim, L.J., Sambas, H., MarcusGoh, N.C., Kawada, T. and JosephNg, P.S., 2017. ScareDuino: Smart-Farming with IoT.International Journal of Scientific Engineering and Technology, 6(6), pp.207-210. Liu, Y., Tong, K.F., Qiu, X., Liu, Y. and Ding, X., 2017, May. Wireless mesh networks in IoT networks. In2017 International Workshop on Electromagnetics: Applications and Student Innovation Competition(pp. 183-185). IEEE. Ma, Y.W., Chen, J.L., Lee, Y.S. and Chang, H.Y., 2016. GreenIoT architecture for Internet of Things applications.KSII Transactions on Internet and Information Systems (TIIS),10(2), pp.444-461. Machado, H. and Shah, K., 2016. Internet of Things (IoT) impacts on Supply Chain.APICS Houst. Student Chapter,77007(402). Machaka, P. and Nelwamondo, F., 2016. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey. InData Mining Trends and Applications in Criminal Science and Investigations(pp. 275-334). IGI Global. Minoli, D., Sohraby, K. and Kouns, J., 2017, January. IoT security (IoTSec) considerations, requirements, and architectures. In2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)(pp. 1006-1007). IEEE.
12ADVANTAGES AND DISADVANTAGES OF IOT Nasr, E., Kfoury, E. and Khoury, D., 2016, November. An IoT approach to vehicle accident detection,reporting,andnavigation.In2016IEEEInternationalMultidisciplinary Conference on Engineering Technology (IMCET)(pp. 231-236). IEEE. Newcombe, L., Yang, P., Carter, C. and Hanneghan, M., 2017, June. Internet of Things Enabled Technologies for Behaviour Analytics in Elderly Person Care: A Survey. In2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing andCommunications(GreenCom)andIEEECyber,PhysicalandSocialComputing (CPSCom) and IEEE Smart Data (SmartData)(pp. 863-870). IEEE. Paethong, P., Sato, M. and Namiki, M., 2016, May. Low-power distributed NoSQL database for IoT middleware. In2016 Fifth ICT International Student Project Conference (ICT-ISPC) (pp. 158-161). IEEE. Park, J.S., Youn, T.Y., Kim, H.B., Rhee, K.H. and Shin, S.U., 2018. Smart contract-based review system for an IoT data marketplace.Sensors,18(10), p.3577. Patel, A. and Champaneria, T.A., 2016, November. Fuzzy logic based algorithm for Context Awareness in IoT for Smart home environment. In2016 IEEE Region 10 Conference (TENCON)(pp. 1057-1060). IEEE. Patel, A.R., Patel, R.S., Singh, N.M. and Kazi, F.S., 2017. Vitality of Robotics in Healthcare Industry: An Internet of Things (IoT) Perspective. InInternet of Things and Big Data Technologies for Next Generation Healthcare(pp. 91-109). Springer, Cham. Pattar, S., Buyya, R., Venugopal, K.R., Iyengar, S.S. and Patnaik, L.M., 2018. Searching for the IoT resources: Fundamentals, requirements, comprehensive review, and future directions. IEEE Communications Surveys & Tutorials,20(3), pp.2101-2132
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser