logo

IoT Security and Privacy - PDF

   

Added on  2021-06-15

9 Pages2288 Words224 Views
Running head: INTERNET OF THINGS 1IoT Security and Privacy Regime/Challenges in Domains of IoTStudent’s NameInstitutional affiliateDate
IoT Security and Privacy - PDF_1
INTERNET OF THINGS 2Milestone 3Introduction Here, the literature will be reviewed through the concept for IoT on security/privacy issuesand also the challenges faced by IoT domains. It also outlines different uses of the internet of things and what might occur in future regarding security/privacy of IoT. The Internet of Things (IoT) According to (Kuryel, 2015), Internet of Things refers to a scenario where the objects, animals, and people are given aunique identifieror anability to move data through a network with no interaction between the humans or an interaction between the humans with the computers. IoT has developed from the group oftechnologies which are wireless, systems of microelectromechanical together with the Internet. From the wordInternet of Things, it refers to a person who has a monitor implant in their body. The monitoring implant can be a biochip transponder in a farm animal, an automobile with a built-insensorwhichalerts a driver in case tire pressure has low and any natural/ human-made object which can be given theIP addressorprovided an ability to move data through a network (Mihr, 2017). Internet of Things used to be referred as the control networks, it was described at the IEEE Spectrum to moving the small packets in a data to the large group of nodes to integrate or automate all home appliances and the entire factories. The control networks which were operating locally could be connected to an Internet or intranets in which information could pass from any place and anybody to anything. Therefore, People could easily reach things and also the other people (Singh, Tripathi, and Jara, 2014).Growth and Application of Internet of Things
IoT Security and Privacy - PDF_2
INTERNET OF THINGS 3 In the 1960s, communication between two computers was made possible through a computer network was used to make communication among two computers easy. Later, mobile internet was made through the connection of mobile devices with the internet (Roman, Lopez and Mambo, 2018). The coming up of the social networking, made the users to be connected through the Internet. Now objects can connect and communicate to one other without any humanintervention. Throughout the recent decade, IoT has acquired important attention both in academia and in the industry of information technology. The main goal involves coming up with the best world to the human beings, in which objects within us can know likes of people, their wants and their needs and respond well (Namyslowska and Joblonowska, 2017). (Jones, Ruddell and Leyton, 2014) Stated that the rapid growth is because objects can be equipped with minuscule recognizing devices and machine-readable recognizers which will be tasked with transforming life daily through several good ways. The ability of a person to work with the objects has been interfered with remotely by immediate and current needs, through the available end-useragreements (Kvellheim, 2017). For instance, that kind of technology enables more strong control to the content creators or owners for their creations through better application of copyright restrictions with the management.Challenges Facing IoT According to Kuryel, (2015), the high cost of IoT implementation is one of the main challenges. Technology is used in IoT to connect tangible objects to the Internet. In IOT ways of growing, the cost incurred in the components which are used to protect capabilities like the sensing, the tracking and the control mechanisms required to be very cheap in future. Another main concern is the privacy. Securing of data and the privacy makes it a major challenge to convince users to shift into the new technologies. The concerns about the privacy and protection
IoT Security and Privacy - PDF_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security and Privacy Issues in IoT
|5
|3262
|310

Security and Privacy Issues in the Internet of Things (IoT)
|10
|2038
|57

Internet of Things Assignment
|12
|2787
|46

Security Challenges in Emerging Networks
|7
|2286
|160

Introduction to the institute: Internet of things internet of things Internet of things student's name
|13
|2567
|487

The Main Concept of loT is Wireless Sensor Networks
|8
|1673
|42