logo

Assignment Network Management | Internet of Things

   

Added on  2020-04-01

4 Pages1836 Words31 Views
Network ManagementInternet of ThingsAuthors Name/s per 1st Affiliation (Author)line 1 (of Affiliation): dept. name of organizationline 2-name of organization, acronyms acceptableline 3-City, Countryline 4-e-mail address if desiredAuthors Name/s per 2nd Affiliation (Author)line 1 (of Affiliation): dept. name of organizationline 2-name of organization, acronyms acceptableline 3-City, Countryline 4-e-mail address if desiredAbstract The concept of IoT is based on thecollection of many interconnected objects, people,device and services that can interact as well as sharedata along with information to accomplish commonset of goals in different sectors and applications. Keywords—IoT, data, integrity, authenticationI.INTRODUCTIONThe IoT is the concept for allowing the objects to besensed or controlled in the network infrastructure. It cancreate better opportunities for the direct integrationinto the computer based systems. [1] The improvedefficiency with economic benefits is mainly to reduce thehuman intervention. II.LITERATURE REVIEWIoT is mainly to offer the advancement in the connectivity of the devices, systems and then working over the machine—to-machine communication and covering the different variety of protocols. The interconnection of the protocols, domains and the applications is set with enabling the advancement of the application. The strategy is clear and clever since it is backed with functions that will help in heating in remote manner and set it to completely turn down the temperature when not required or no one is using. Some can also tell the latter with the help of the technology like motion sensing cameras or by tracking iton smartphone. [2]The concept of IoT is not limited to this because ithas the capacity to scale up and consist of many kinds ofsmart towns where connected traffic signals that cansupervise the use based on utility. There are smart binsas well which says that they should be emptied and theindustry with all kind of connected machinery for thingscover tracking the part to monitoring the crops. There isa fact where the government is motivating energy basedcompanies to handle smart meters and all the functionsalong with automated usage is more effective whichmeans there is usage of less energy. [3] There arenumber of areas of IoT that shows such advantages withthe help of advanced gadgets which are more based one

whizz impact than the effectiveness and it may also bethe reason of more smart gadgets around. It is veryimportant to understand that every new and shiny thinghas some disadvantages as well and there is existence ofsecurity as well as privacy that are some of the biggestchallenges for IoT. All the machines as well as systemscan collect a lot of personal based data related to peopleand have smart kind of meter that understands thepresence of people at home or usage of electronic itemsin the presence of people and it is also shared with othermachines as well and held based on databases as andwhen provided by the companies. [4] There are numberof security experts that claims that there are not all thepossible actions are taken to build the security systemalong with privacy into it usually at the early stages. Toprove this, some experts hacked the number of devicesfrom a connected monitor to automate the lights as wellas smart devices along with many city-wide systems liketraffic signals. The hackers have not for many part put alot of attention on the concept of IoT and there aremany people who connected their devices against anykind of attack. But it is obvious with time hackers orcyber-criminals will find a way for it as well. [5]The framework of IoT is further susceptible to any kindof attack with every layer and thus, there are manychallenges associated with security and need that mustbe addresses. The present state of research in theconcept of IoT is mainly aimed on authenticating andwith access based control protocols. However, with risein level of advancement of present technology it isimportant to also incorporate new networking basedprotocols like 5G to accomplish the mashup of IoTbased topology. Another crucial method for theauthentication of ID at sensor nodes of the system. It isalso considered as a one time and one of its kind ofcipher based on request related methods. There aredynamic elements cipher is executed by usage basedpre-shared matrix that exist between the interactionrelated parties. The parties can create a randomlycoordinated effort that will help as the main coordinate.The important coordinate which can get transferredbetween the two parties not the important stuff. Thekey in other words is also called as password and is alsogenerated from the present coordinate. All themessages are then sent with the help of encryption withthe help of the key along with important coordinate,timestamp and device IDs. [6] Therefore, there are twodevices that can interact by properly validating thetimestamps and therefore can also cancel the sessionassociated with it. A mutual authentication scheme waspresented by IoT since the platform and because ofterminal nodes. The scheme also based on hashing andthe nature of extraction. The characteristics ofextraction was also combined with hash activity toignore any kind of collision attack. The scheme alsoprovides a desirable solution for gaining authenticationin the system. The used process of extraction has all theimportant properties that are completely irreversibleand needed to make sure the security level and it is alsolight weight which can be desired in the process. Thescheme also aims on many authentication processesespecially when the platform is trying to sendinformation to the nodes of terminal. However, thescheme will also improve the security by comfortablykeeping the information sent is decreased and it work

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IoT in Smart Restaurant: Enriching Traditional Business Services
|4
|2258
|219

Importance of Internet of Things in Vehicles
|5
|1749
|452

Security Issues in Internet of Things
|2
|1166
|378

ITC561: Cloud Computing Assignment
|4
|2494
|81

Internet of Things
|6
|951
|379

Internet of Things - Attacks and Authentication
|12
|2759
|21