Report on Internet of Things (pdf)

Added on - Dec 2019

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 11 pages
PAPER REVIEW REPORT
TABLE OF CONTENTSIntroduction......................................................................................................................................3Main problems of papers.................................................................................................................3Limitations.......................................................................................................................................3Critical review..................................................................................................................................3Conclusion.......................................................................................................................................6Evaluation........................................................................................................................................6References........................................................................................................................................72
INTRODUCTIONInternet of things (IoT) is the physical devices that are interconnected. In the technicalenvironment it is very difficult to keep data secure. In such atmosphere privacy and security arethe challenge for the person (Olson, 2016). Present paper will critically discus the Internet ofthings, challenges related to this and solutions will be described in this study.MAIN PROBLEMS OF PAPERSThe report is on the topic of internet security. Now in the modern technological era mostof the people use internet for buying and selling. But cyber crime and hacking are taking placesday by days (Satyanarayanan and et.al, 2015). That creates problem for the organization, dataleakages and security are major problems for the corporation. Massive amount of deceives areconnected with the internet so it is essential to look upon the security. Otherwise, it may createproblem to the person and companies. The main issue of the present paper that some researchesare based on certification and labeling, and other is based on the designing. So it reacts confusionin preparing the topic effectively (Vermesan and Friess, 2014). Research methodologies are notbeen discussed properly so bases of study is not clearly expressed.LIMITATIONSThese all reports are based on the internet securities, that is wide topic and it requires tospent more time for the research, so that actual problems and solutions can be find out. Butresearchers were not having sufficient time for preparing this paper so some of topic like securitytools and other techniques are not being discussed in broad way (Patton and et.al, 2014).Researcher were not having funds for using the advanced software so that was another limitationof this paper.CRITICAL REVIEWSecurity in Internet of Things: Challenges, Solutions and Future DirectionsWith the increase in the usage of internet many developments have been seen in Internetof things and now internet is important everywhere. Without internet nothing can be done inindustry. It is a medium of interaction with clients, it facilitates the information, etc. WhenInternet of things comes with so many positives on the other hand it will come with negativestoo(Vlacheas and et.al, 2013). Having vast amount of information on internet, security issues3
arises which is makes people worry about their personal information. Researcher has made aneffort to discuss the security features and issues that comes in the security of things on internet.Internet of Things can be used in various domains including healthcare,transportation, entertainment, power grids and smart buildings, etc. Internet of Things is a meansof attaining future technological innovations and its use is expected to rise exponentially over thecoming years. With lot of devices connected to it and huge data associated with it, here remainsconcern for security.Researcher has discussed in the paper that standard communication protocols needs to beadopted through interconnected and inoperable smart objects. International organizations suchas the Internet Engineering Task Force (IETF) and the IPSO Alliance has been promoting the useof the Internet Protocol (IP) to the maximum as a inter operable objects because there a rebillions of objects on internet which needs security, so in order to get security Internet protocolhas been set as a standard. Internet protocol is a address of the person using internet, anymalicious activity can be tracked from the IP address(Yang and et.al, 2015). How a data issecured right from its source station to its destination station is discussed by the researcher andalso in addition researcher has given the names of the system that keep securing the data.Researcher has emphasized on making the internet of things that is how effective internetof things can been created. In order to create internet of things author has given 4 key layerswhich can play important part in the argument that researcher is arguing. The author has laid hisemphasis on application layer which includes smart cities, smart homes, healthcare, etc. Secondis perception layer followed by Network layer and physical layer(Vlacheas and et.al, 2013).Further more researcher has argued about the Security issues that are faced in internet ofthings. The author has argued issues that comes in application layer, perception layer, networklayer, physical layer.The risks are huge. With personal data and IP stored on connected devices,hackers have the very real potential to completely limit an organization's performance(Yang andet.al, 2015).Other authors have two kind of security issues that prevails in the environment ofInternet of things. Public perception is some what matters because some people think that theirinformation can be stolen and some may not believe so. this depicts the level of worry whichmakes them purchase or not purchase connected devices.Hackershave been able to hack intoreal, on-the-market devices with enough time and energy, which means hackers would likely be4
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access