logo

Report on Internet of Things (pdf)

11 Pages3857 Words469 Views
   

Added on  2019-12-18

Report on Internet of Things (pdf)

   Added on 2019-12-18

ShareRelated Documents
PAPER REVIEW REPORT
Report on Internet of Things (pdf)_1
TABLE OF CONTENTSIntroduction......................................................................................................................................3Main problems of papers.................................................................................................................3Limitations.......................................................................................................................................3Critical review..................................................................................................................................3Conclusion.......................................................................................................................................6Evaluation........................................................................................................................................6References........................................................................................................................................72
Report on Internet of Things (pdf)_2
INTRODUCTIONInternet of things (IoT) is the physical devices that are interconnected. In the technicalenvironment it is very difficult to keep data secure. In such atmosphere privacy and security arethe challenge for the person (Olson, 2016). Present paper will critically discus the Internet ofthings, challenges related to this and solutions will be described in this study. MAIN PROBLEMS OF PAPERSThe report is on the topic of internet security. Now in the modern technological era mostof the people use internet for buying and selling. But cyber crime and hacking are taking placesday by days (Satyanarayanan and et.al, 2015). That creates problem for the organization, dataleakages and security are major problems for the corporation. Massive amount of deceives areconnected with the internet so it is essential to look upon the security. Otherwise, it may createproblem to the person and companies. The main issue of the present paper that some researchesare based on certification and labeling, and other is based on the designing. So it reacts confusionin preparing the topic effectively (Vermesan and Friess, 2014). Research methodologies are notbeen discussed properly so bases of study is not clearly expressed. LIMITATIONSThese all reports are based on the internet securities, that is wide topic and it requires tospent more time for the research, so that actual problems and solutions can be find out. Butresearchers were not having sufficient time for preparing this paper so some of topic like securitytools and other techniques are not being discussed in broad way (Patton and et.al, 2014).Researcher were not having funds for using the advanced software so that was another limitationof this paper. CRITICAL REVIEWSecurity in Internet of Things: Challenges, Solutions and Future DirectionsWith the increase in the usage of internet many developments have been seen in Internet of things and now internet is important everywhere. Without internet nothing can be done in industry. It is a medium of interaction with clients, it facilitates the information, etc. When Internet of things comes with so many positives on the other hand it will come with negatives too(Vlacheas and et.al, 2013). Having vast amount of information on internet, security issues 3
Report on Internet of Things (pdf)_3
arises which is makes people worry about their personal information. Researcher has made an effort to discuss the security features and issues that comes in the security of things on internet. Internet of Things can be used in various domains including healthcare,transportation, entertainment, power grids and smart buildings, etc. Internet of Things is a meansof attaining future technological innovations and its use is expected to rise exponentially over thecoming years. With lot of devices connected to it and huge data associated with it, here remains concern for security.Researcher has discussed in the paper that standard communication protocols needs to be adopted through interconnected and inoperable smart objects. International organizations such as the Internet Engineering Task Force (IETF) and the IPSO Alliance has been promoting the useof the Internet Protocol (IP) to the maximum as a inter operable objects because there a re billions of objects on internet which needs security, so in order to get security Internet protocol has been set as a standard. Internet protocol is a address of the person using internet, any malicious activity can be tracked from the IP address(Yang and et.al, 2015). How a data is secured right from its source station to its destination station is discussed by the researcher and also in addition researcher has given the names of the system that keep securing the data. Researcher has emphasized on making the internet of things that is how effective internetof things can been created. In order to create internet of things author has given 4 key layers which can play important part in the argument that researcher is arguing. The author has laid his emphasis on application layer which includes smart cities, smart homes, healthcare, etc. Second is perception layer followed by Network layer and physical layer(Vlacheas and et.al, 2013).Further more researcher has argued about the Security issues that are faced in internet of things. The author has argued issues that comes in application layer, perception layer, network layer, physical layer. The risks are huge. With personal data and IP stored on connected devices, hackers have the very real potential to completely limit an organization's performance(Yang and et.al, 2015).Other authors have two kind of security issues that prevails in the environment of Internet of things. Public perception is some what matters because some people think that their information can be stolen and some may not believe so. this depicts the level of worry which makes them purchase or not purchase connected devices. Hackers have been able to hack into real, on-the-market devices with enough time and energy, which means hackers would likely be 4
Report on Internet of Things (pdf)_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet of Things (IOT) - Assignments
|8
|1847
|445

Machine Learning in IoT
|14
|3220
|196

Domains of IoT Security
|7
|1867
|1

Literature Review on Internet of Things
|9
|2313
|74

Security in Cloud Computing: Opportunities and Challenges
|8
|2389
|69

Security Risks and Issues in IoT Technology
|7
|3094
|74