Internet of Things: A Review of Literature and Security Issues
Verified
Added on 2023/06/12
|8
|810
|321
AI Summary
This presentation provides a comprehensive review of literature on the Internet of Things (IoT) and its security issues. It covers the characteristics, areas of application, and countermeasures of IoT. The presentation also discusses the security issues in IoT and the best countermeasures to these problems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Internet of Things [NAMES] [INSTITUTION] [DATE]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction Internet of Things (IoT)is an advancement of the internet. It will facilitate machine to machine (M2M) communication. Its functions will depend on the existing technological infrastructure. IOT will represent a global interconnection system of devices. A system that will use the standard TCP/IP protocol to automate machine interaction.
Literature Review The basic idea; to have an autonomous exchange of information. This exchange is facilitated by uniquely identifiable devices. Through leading technologies such as Wireless Sensor Networks (WSN) and RFID (Radio Frequency Identification). Characteristics Comprehensive perception determined by identification and recognition.
Cont.. Reliable communication and transmission using a variety of networks. Intelligent data processing using cloud computing, AI and systems analytics. Areas of Application Smart Cities/homes - IoT will automate all the objects found in homesteads and cities. Smart Energy - control will be integrated into the energy industry to have a smart energy management system. Smart Health -IoT monitoring services can manage tasks by collecting and analyzing data.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Security Issues Two contributing factors: IoT architecture and the internet infrastructure, Security issues in IoT I.Security of sensing devices -IoT does not provide adequate security for its objects. II.Security issues in the physical layer -two security issues are observed; node tampering and jamming. III.Security concern of the network layer -the concerns of illegal access, data confidentiality, and integrity.
Countermeasures I.Certification and secure access protocols - thistechnique can be used to verify the access devices e.g. RFID tag or WSN device. II.Access control – based on different authorization levels such as location and identity. III.Data Encryption –to protect information from tampering, which can occur in various forms such as editing, deleting and interception
Conclusion IoT represents the next evolution of the internet. IoT transfers IT efficiencies to the real world. Several security issues are yet to be solved. Comprehensive solutions are the best countermeasures to these problems.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References M. Farooq, M. Waseem, S. Mazhar, A. Khairi and T. Kamal, "A Review on Internet of Things (IoT)," International Journal of Computer Applications, vol. 113, no. 1. https://www.researchgate.net/publication/273693976_A_Review_on_Internet_of_Things_IoT, pp. 1-6, 2015. K. Desai and S. Mahalakshmi, "Internet of Things (IoT): A Review of Literature," International Research Journal of Management and Commerce, vol. 5, no. 2. http://www.aarf.asia/download.php?filename=../current/2018/Mar/xaUaIOvGVU0La5L.pdf&new=., 2018. E. Alsaadi and A. Tubaishat, "Internet of Things: Features, Challenges, and Vulnerabilities," International Journal of Advanced Computer Science and Information Technology, vol. 4, no. 1. https://pdfs.semanticscholar.org/ab0a/90ddd8208234e7335b1cc175b49461c2bae5.pdf, pp. 2-11, 2015. S. Rajguru, S. Kinhekar and S. Pati, "Analysis of Internet of Things in a Smart Environment," International Journal of Enhanced Research in Management & Computer Applications, vol. 4, no. 4. https://pdfs.semanticscholar.org/35fe/c9f1837928c482ed3ad344fa639736bd2506.pdf , pp. 40-43, 2015. Z. Mohammed and E. Ahmed, "Internet of Things Applications, Challenges and Related Future Technologies," World Scientific News, vol. 67, no. 2. https://www.researchgate.net/profile/Elmustafa_Sayed_Ali_Ahmed/publication/ 313651150_Internet_of_Things_Applications_Challenges_and_Related_Future_Technologies/links/58a6e9b64585150402f27785/Internet-of-Things- Applications-Challenges-and-Related-Future, pp. 126-148, 2017. C. Suchitra and C. Vandana, "Internet of Things and Security Issues," International Journal of Computer Science and Mobile Computing, vol. 5, no. 1. https://www.ijcsmc.com/docs/papers/January2016/V5I1201636.pdf, p. 133 – 139, 2016. M. Bhabad and S. Bagade, "Internet of Things: Architecture, Security Issues and Countermeasures," International Journal of Computer Applications, vol. 125, no. 14. https://pdfs.semanticscholar.org/94bb/0b62588808fd2614c572162fa170cce06856.pdf, pp. 1-4, 2015. X. Liu, M. Zhao, S. Li, F. Zhang and W. Trappe, "A Security Framework for the Internet of Things in the Future Internet Architecture," Future Internet, MDPI Journals, no. http://www.mdpi.com/1999-5903/9/3/27/pdf [Accessed 23 May 2018], pp. 1-25, 2017. L. Goeke, "Security Challenges of the Internet of Things," Bachelor’s Thesis Business Information Technology, no. https://www.theseus.fi/bitstream/handle/10024/128420/Goeke_Lisa.pdf?sequence=1&isAllowed=y