logo

Network and Security

   

Added on  2023-01-19

15 Pages3266 Words22 Views
 | 
 | 
 | 
Running head: NETWORK AND SECURITY
Network and Security
Name of the Student
Name of the University
Author’s Note
Network and Security_1

1
NETWORK AND SECURITY
Answer to Question 1:
Introduction
Internet of thing (IOT) can be defined as an electronic community where any number of
devices can be interconnected with each other and to the Internet. It is a network giant which
connects devices and the users. The process involves creation, collection and sharing of data on
the network channel. A large number of smart devices are connected to the network, automated
devices and the devices can be controlled wirelessly from anywhere. It is a community of
intelligent devices interacting with one another to get numerous tasks done simultaneously. The
objects and device have sensors connected to the Internet of things platform. The sensor
integrates data from all the connected devices and uses programmed analytics to address the
needs. Wireless connection has made a shift to smart mobile IoT or M-IoT platforms. An
application on the mobile is used to remotely control the functionality of the all the devices
connected. The contemporary concerns of IoT are security threats and privacy concerns. IoT has
its significant because the digitally represented object morphes into something great than itself.
They interact with environment around them with ambient intelligence.
Discussion
Challenges of cryptography for Internet of things
Cyber security is a global issue as cyber crimes are alarmingly increasing. Cryptography
is a sound method to counter such threats and crimes. Iot is easily vulnerable to cyber threats and
an attack can cause lead to huge amount of sensitive data loss. IoT faces several challenges
regarding encryption and decryption of content. The devices connected on the IoT are secured by
cryptography to provide quick user identification (unique identifiers UID), authentication and
Network and Security_2

2
NETWORK AND SECURITY
protection of user data. Devices with low availability of energy have many advantages yet causes
unique security threats (Chen 2015). The low energy environment constraints the cryptographic
protocols to address the performance and this leads to the slow performance of the device
connected. Limitation of energy storage cause delay in runtime for completion of operations. The
resources running the cryptographic protocol face additional constraints. Devices with low
RAM/ROM like fitness trackers, smart lighting and smart watches provides hurdles for
cryptographic protocols. The low storage does not provide enough memory space to run proper
cryptographic protocol (Conti, M., Dehghantanha, Franke, and Watson 2018). Cryptography
protocols are big in size and require sufficient memory space to execute the program. Each
platform of IoT requires different and complex cryptographic protocols to ensure complete
security of data (Liu 2017). Low memory is a threat as the protocol used for the particular
devices is simplified and thus reduces tightness of security of the device. Data leakage becomes
an issue. Several lightweight cryptography protocols are in the design process to counter such
problems and provide complete security to the devices connected.
Challenges of internet of Things in secure device management
The concept of Internet of Things is a vital part of the computer science that deals with
the connection of day-to-day physical object to the internet and make themselves identify to
other existing device (Gubbiet al. 2013). The significance of internet of things is noticeable as,
the object, which represent itself, become digitally larger than the object by itself. Device
management can be a part of the strategies of the internet of things from inspection (Leeand
Lee2015). However, the IoT can effectively perform only when the connected devices are
efficiently managed and monitored. The process of device management in the IoT is possible by
the device cloud that is the device cloud is responsible for collecting and integrating a series of
Network and Security_3

3
NETWORK AND SECURITY
data from enabling operators and disparate device automatically and locking the valuable data
with the help of IoT. However, there exist some challenges that occurs in case of device
management using the IoT (Madakam, Ramaswam and Tripathi 2015). The key challenge that
encounter in case of the device management is the IoT security, which can create a numerous
dangerous vulnerabilities if the devices are not effectively protected. In case of most of the
enterprises, the compelling case of the IoT, comes with the ability of accessing the important,
else confidential data that will be generated by a number of field devices. This particular process
will happen, when the devices are delivering the data, along with the gateway, which will direct
those data into the enterprise system will perform coordinately in an effective manner as
expected. Any kind of miss happenings can lead to serious security issue affecting the security of
the entire device management system.
Cyber kill chain
Cyber kill chain is used to identify and describe the different stages of any kind of cyber
attack, which directly pertains to the concept of network security (Novo 2018). Beginning with
the reconnaissance to the process of completion of the attack, the cyber kill chain lays out every
stage efficiently. Moreover, when the vulnerability is detected in the IoT device and the attack is
progressed, braking the kill chain final stage become crucial, as the last stage of the cyber killing
chain provides the overview of the infector or attacker (Huh, Cho and Kim2017).Taking an
instance, the internet of things such as in case of the security cameras, wearable and smart
thermostats are considerably easy target for the intruders of the kill chain. However, the layered
methodology enhance the security approach by avoiding the dangerous attacks (Perumal, Datta
and Bonnet 2015). Apart from that, the IoT devices comprising both partially managed and
managed devices, the network discovery process assigned with it for understanding and
Network and Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Securing IOT and Cyber-Physical Environment
|7
|1570
|298

IoT Security and Privacy Challenges
|9
|1402
|116

Lightweight Encryption Algorithm for Secure IOT
|53
|14901
|228

Wireless Communication Protocols and Technologies Used in IoT
|5
|1730
|427

Assignment on Cyber Crime
|15
|4799
|77

IFN643 Ransomware Removal Report
|11
|1954
|42