Improving Security in IoT Systems

   

Added on  2023-06-11

6 Pages1041 Words52 Views
Running head: Internet of Things 1
Internet of Things
Name of the Student:
Name of the Institution:
Improving Security in IoT Systems_1
Internet of Things 2
Improving Security in IoT Systems
The primary benefit of internet of things technology and related system is the capability
of extending the human physical world to go beyond the boundaries and limitations of human
imaginations. Internet of things network system have some special feature- only known to them
and that make them very much different from traditional networks. This fact alone means that
there are special security attacks and threats that affect IoT only, and at the same time, traditional
security mechanisms designed to counter cyber-attacks cannot be applied in IoT based systems.
Other security challenges, apart from the design technologies, emanate from integration of IoT
network systems with others- either IoT based or traditional networks. Among the top security
threats that the industry in the internet of things has to deal with amicably are privacy, integrity,
confidentiality, availability and physical attacks to the system.
Going by the fact that traditional network security and privacy methods cannot work for
IoT systems, and given the great business prospective that internet of things brings with them on
the other hand, increasing demand for comprehensive solutions, privacy have been developed in
order to protect both local systems together with the broader IoT network systems’ aspects. The
following are some of the methodologies and techniques used to offer security in the internet of
things world.
Mobility based IoT Architecture.
This technology represents an architectural design whose main aim is to provide solution
to the aforementioned challenges facing IoT. The goals of the design are anchored on mobility
and trustworthy. Such a design works successfully by breaking data receipts, maintaining content
addressability, robustness and evolvability, all which come together to solve a common problem.
Improving Security in IoT Systems_2
Internet of Things 3
In this architecture is a protocol from the traditional network systems called narrow waist,
and which has been given an added functionality of a name based service layer made up of the
Name certificate and Resolution Service (NCRS) and the Global name Resolution Service. These
two new protocol services are anchored on the concept of flat security service and works as an
identifier and public key of the object in question. A local gateway server encompassed in this
architecture helps maintain system security by allowing access only identifiable and addressable
objects access to the system. The global positioning system, a technology that is also used in the
architecture, helps in capturing real time data of events and system logs (Xiruo, Meiyuan,
Sugang, Feixiong, & Wade, 2017).
Password Based Methods.
The lack of secure storage facilities that could be integrated with key management
services in the internet of things technology, and password lengths are among the many
hindrances encountered in the implementations of password-based systems and password
usability respectively. Other bottlenecks to the realization of password-based systems include the
scalability issues thanks to the number of devices that could be under custody of one user, thus
making security realization a far distant dream. Nevertheless, several proposals have been made
aiming at the development of a one-time use password as a way of reducing eavesdropping and
replay attacks. Unfortunately, this method proposal does not represent or offer an ideal solution
to the security issues being experienced at the internet of things industry since password
redefinition requires a shared list and sequential system updating hence rendering the password
based method expensive to adapt and use in both dynamic and decentralized networks.
Improving Security in IoT Systems_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet of Things Privacy and Security Issues
|10
|2130
|317

IoT Threats to Database Security
|5
|1145
|364

IoT Security & Privacy: Literature Review
|8
|1987
|72

Internet of Things: Privacy Issues and Contents
|9
|1402
|116

The Internet of Thin Films: Research Limitation, Future Scope and Conclusion
|42
|10071
|480

IoT Cloud-based Security Issues: Blockchain Technology as a Solution
|27
|5671
|406