logo

ITC561: Cloud Computing Assignment

   

Added on  2020-05-16

4 Pages2494 Words81 Views
Cloud Network:Authors Name/s per 1st Affiliation (Author)line 1 (of Affiliation): dept. name of organizationline 2-name of organization, acronyms acceptableline 3-City, Countryline 4-e-mail address if desiredAuthors Name/s per 2nd Affiliation (Author)line 1 (of Affiliation): dept. name of organizationline 2-name of organization, acronyms acceptableline 3-City, Countryline 4-e-mail address if desiredAbstract Internet of Things or IoT is one of the emergingtechnologies in today’s world. This report mainly discusses aboutthe basic concept of IoT and along with the various threats thatare being faced by IoT. The report also provides the varioussolutions for the security threats faced by IoT. The reportcritically evaluates the paper name “A Study of Key Technologiesfor IoT and associated Security Challenges” by “MaryamDaud”, “Quratulain Khan” and “Yasir Saleem”. Thereport also elps in identifying the drawback of this paper alongwith the strength of this paper as well.I.INTRODUCTIONInternet of Things or IoT generally refers to the conceptwhich is associated with providing a description about idea ofeveryday physical objects that are connected to the internet andare capable of identifying themselves to other devices. This canalso be defined as a network of physical devices like vehicles,home appliances and many more which are embedded with anelectronics, software, sensors, actuators and connectivityhelping the devices to connect and exchange data among eachother [1]. The unique identification of this things are possibleby their embedded computing system. Along with this thedevices are also capable of inter operating within the existinginternet infrastructure.II.DISCUSSIONA.Business case:The paper named “A Study of Key Technologies for IoTand associated Security Challenges” by “Maryam Daud”,“Quratulain Khan” and “Yasir Saleem” has been chosenfor the business case. The paper is associated with criticalevaluates the basics of IoT along with the security and privacyissues related to IoT. The paper also provides the solutions forthe several threats related to IoT [12]. Along with this the paperalso proposes a model for the security of the IoT. B.Analysis of the business case:There will remain a huge difference between the internetthat is being used today and the internet that would be used inthe future. The paper is divided into 6 sections. The firstsection consists of the related works and the foundation of IoT.Section 2 consists of the security requirements along with thesecurity hazards that are identified rom the literature review.The third section consists of the solutions against the threatsdiscussed in section 2. Section 4 consists of the security modelthat can be implemented on the IoT framework and the section5 consists of the conclusion. Lastly, section 6 highlights theopen issues that are still in need of addressing. IoT is one of therapidly increasing technology which is spreading all over theworld. But still there exists some security risks regarding itsgrowth. Independent communication should not neglect thesecurity, privacy and trust [2]. With the growing trend theissues regarding the network security in IoT is also growing.The hacking of the IoT can create a lot of risks for the users intheir daily life. If the security requirements are fulfilled, then itbecomes very easy to embed the security in the IoT devices. III.CRITICALREVIEWA.Basics of Intenet of Things(IoT)This part of the paper helps in understanding the functionalarchitecture of IoT. The functional architecture of IoT mainlyconsists of different layer and this includes the “PerceptionLayer”, “Network Layer”, “Middle Ware Layer”, ApplicationLayer”, and lastly the “Optionally Business Layer” [4].Perception Layer or PL is the first level of IoT which isused for the purpose of collecting the information from varioussources which mainly includes the properties of the objectalong with the conditions of the environment. Sensors play avital role in this layer for the collection of information from thereal world [6]. The main objective of this layer includes theidentification of the unique objects along with the handling ofthe data collected by objects from various sources.Network Layer is associated with the sending of data to thecommunication system gathered from the PL.Middle or support Layer consists of the informationprocessing system and takes action according to the datacollected [5]. It is also associated with confirmation regardingthe service availability.Application Layer or the Implementation Layer isassociated with the application of various real-worldapplications of IoT that are needed by the users [8].The paper also helps in identification of the two technologythat is used for IoT which includes the Radio FrequencyIdentification or RFID and Wireless Sensor Networks or WSN.

B.Security and privacy of Internet of Things(IoT)Security of IoT framework is required at each andevery layer. The PL layer requires security regardingthe data privacy which is required by the user so as tobecome confident that their data is private and cannotbe used illegally by others. The security requirement ofNetwork layer is authentication, routing security anddata privacy in which the communicating entities areensured about the secured communication by means ofencrypted transmission [10]. This is done as dataencryption is one of the widely used solution for theconfidentiality of the data. The security requirement ofmiddle layer mainly includes the access or accessibilityto an error free information or data so as to check thedevices proactively against the vulnerabilities that areknown [7]. The security requirements of the applicationlayer include the authentication, risk assessment anddata security because of the reason that the digitalcontents need to be protected in the secure environmentand this involves the authentication of the externals thatare capable of permitting the permissions to the dataand the information.The security threats are increasing along with thegrowing trends of IoT. Day by day the security threatsare increasing and cyber-attack is one of the majorthreat amongst all this threats. Organizations which arehaving an automated system are the main targets of thehackers [3]. Various challenges are faced at each layerof the functional architecture of IoT. The possiblechallenges associated with the IoT are theft of sensitive,personal and financial data.Similarly, attacks are also face by the RFID technologyas well as the WSN.IV.SOLUTIONSFORTHETHREATS:various solutions have been proposed according to thevarious types of threats faced by the different layers of IoT.The below listed table provides the solutions for different typesof attacks at different layer of the IoT.A.Solutions and threats for Perception Layer:ThreatsSolutionsRf JammingElimination ispossiblebymethods likefrequencyhopping and codespreading.Tag CloningThis can beeliminated by byuse of tagidentifierauthenticationwhichisgenerally doneby using a valididentfier so as toclone the tag[11].SpoofingThis can beeliminated by useof IPsec.EvasdroppingThis type ofthreatas can beeliminated bysecuringthecommunicationused for relay.B.Solutions and threats for Network Layer:ThreatsSolutionsSybil attacksThis threat canbe aliminated bykeeping a trackabout the numberof clones that arebeing done.Sinkhole attacksThe eliminationof this threat ispossiblebyavoiding anytypeofcongestion.Malicious nodeThethreatsregardingmalicious nodecan be aliminatedby the process ofdetecting themalicious nodefollowedbyseparting thisnodesbyblacklisting them[9].C.Solutions and threats for RFID:ThreatsSolutionsForgeryThe eliminationof this threat ispossible by useof Faraday cage.CounterfeitingThis threat canbe eliminated byusing the twowayauthentication

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IoT in Smart Restaurant: Enriching Traditional Business Services
|4
|2258
|219

Assignment Network Management | Internet of Things
|4
|1836
|31

Importance of Internet of Things in Vehicles
|5
|1749
|452

Security Issues in Internet of Things
|2
|1166
|378

Assignment on Concept of Internet of Things or IoT
|8
|1948
|40

The internet of things in healthcare: An overview
|5
|4243
|31