logo

Report on IOT model analyses

   

Added on  2020-04-07

4 Pages2659 Words47 Views
Overview of Network Security Internet of ThingsAuthors Name/s per 1st Affiliation (Author)Authors Name/s per 2nd Affiliation (Author)Abstract Abstract— Internet of things is one ofthe most revolutionary concepts of informationtechnology where devices and objects will gainendless connectivity. This connectivity will increasethese devices intelligence, an outcome that willincrease their application in the real world.Keywords— IoT, RFID,I.INTRODUCTIONInformation technology encapsulates manytechnological advancements that aim to increase theefficiency and availability of information. The internet isone such advancement which throughout the years hasbecome a major driving of IT system andtelecommunication in general. In all, the internet is ableto deliver resources and services based on the needs ofthe users without any form of restriction, be it location orsize[1]. Now, the Internet of Things (IoT) is next in lineto promote these benefits of information availabilitywhere it will increase the existing worldwideconnectivity as supported by the internet. In essence, thistechnology (IoT) will facilitate the connectivity of alldevices and objects notwithstanding their field orapplication. However, this extended connectivity doesalso present many challenges most of which are related tothe security and privacy of the data being used[2].Moreover, IoT requires an advancement of the existinginternet infrastructure which also holds many issues andthreats. This report analyses IoT as a technology whereits model, functionalities and issues are given based on itsproposed architecture.II.LITERATUREREVIEWWhile the phrase Internet of Things was coined in thelate 1990s, the concepts of the technology have alreadybeen proposed based on the existing networkinginfrastructures. In fact, when one considers the birth ofthe internet as we know it today, the foundationalelements of the IoT are given based on the rudimentaryfunctionalities of the initial systems. In the early days,networks such as APRANET aimed to increase theconnectivity of computer system through packetswitching techniques. These techniques were desired asthey increased the transfer of information withoutestablishing physical connections [1].Now fast forward to today and these foundationalelements have propelled the movement towards smartsystems, the cornerstone of IoT. In today’s world devicessuch as smartwatches, smartphones and smart T.Vscharacterize the digital world. Moreover, these deviceshave endless resources as they are able to connect to theworldwide web. In essence, this connectivity is the basicidea behind IoT where other subsidiary devices will beconnected to the web thus increase their autonomy andintelligence. Therefore, in the future smart devices andobjects will include gadgets such as vehicles, cookingstations and even windows [1]. Nevertheless, to meetthese requirements the existing devices and objects willhave to incorporate some new technologies as outlinedbelow.IoT implementation technologiesTo start with, IoT will require an endless connectivitysupported by a worldwide networking infrastructure. Thisrequirement will be easily satisfied by the internet whichis the biggest network known to man today spanningbillions of devices, an outcome that facilitates thetransmission of information across various digitalplatforms. Furthermore, the internet and its connectivityfeatures will have to be supplemented by an agileinfrastructure as most IoT devices will be mobile basedon the needs of the user[3]. Now, the requirement willbe met by wireless connectivity, a technology that hasgrown tremendously throughout the years to become themost popular technology in the world. In addition to these foundational elements ofconnectivity and networks, IoT will require othersubsidiary technologies in order to support theidentification of the devices. While there are manytechnologies that can support this role, RFID is

envisioned as the technology of choice. RFID (RadioFrequency Identification) integrates the functionalities ofwireless connectivity with those of system identification.In essence, devices are equipped with RF tags whichfacilitates their tracking and hence their identification [1].Moreover, RFID provides other additional benefitsincluding the ability to collaborate with the internetthrough its operational protocols such IP. Now, IP isanother support technology that has grown in the pastfew years in an effort to meet the demands of the users.Today, IP is characterized by IPv6, an addressing schemethat holds countless addresses which is a requirement forIoT because many devices will be hosted online[4].The IoT Model/architectureA model or defining architecture is always importantwhen developing technologies because their applicationsare usually not limited to any single devices or gadget.IoT also holds similar objectives where a wide range ofdevices are proposed, having different specifications andmanufacturers. To fill this gap, the model outlines acommon structure which will be used to implement thetechnology[5].Fig: IoT ModelThe IoT layers:Sensory and access layer: These layers are combinedin this discussion as they depend on each other to meettheir functionalities. The sensory layer will hold thesensors and actuators (RFID tags) which will collect dataand control the devices. On the other hand, the accesslayer will form the gateway for accessing these devices.Therefore, through the access layer, the sensors andactuators will be able to connect to the IoT infrastructure.Moreover, the access layer will hold networkingtechnologies such as Ethernet, 6LowPAN and ZigBee inorder to support the access networks i.e. LAN and WAN[4].Network layer: After establishing the sensory andaccess layers, these IoT segments will require acollaborator i.e. a connector of all the existing networks.This collaboration requirement will be the role of thenetwork layer which will aggregate all the network used(LANs and WANs). Now, this layer will hold the sameprinciples as the existing network layers where the IP andits defining model TCP are used. Moreover, theembedded system of the devices including their operatingsystems will also facilitate the network's integration [6].Middleware layer: This layer can also be defined asthe management layer since it will monitor and controlthe entire IoT infrastructure based on the data collected.This layer’s roles will include; object management,security control and information analysis [6] [4].Application layer: The end-user resource which willpresent the functionalities of the technology to theconsumers. This layer will be characterized by versatileAPI (application presentation interfaces) which willpresent the functionalities and data to the users. However,these APIs will vary from one industry to another basedon the application of the IoT technology[7] [8].III.CRITICAL ANALYSISIoT like any other technology holds its share ofchallenges more so, in its implementation where theexisting internet infrastructure will be extended. Thissystem extension will also facilitate the growth of theproblems of the internet. Furthermore, IoT will requireseveral parties to collaborate in order to extend theexisting limitations of the internet. Again, thiscollaboration is not guaranteed which is anothersubstantial concern [9] [10].IoT security threats:a. Data security and privacy – To meet its overallobjectives of maximum connectivity, IoT will require thecollaborating devices to share all the information theyhold. Moreover, it will extend the limitations ofconnectivity to include other subsidiary devicespreviously not considered for connection. Therefore,simple objects such bags will connect to networks whichbased on the existing security systems will make thenetwork vulnerable thus exposing the data available inthe networks. Furthermore, connectivity will be based onsecurity measures such as authentication and encryptionwhich requires the user confidential information. Now,these resources may be hacked or attacked which will notonly expose the data of a single system but that of anextensive network [9].b. Extensive system diversification – uniformity is agood concept of maintaining strong security featuresmore so, those affiliated with cyber systems. It is because

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Challenges in Emerging Networks | Assignment
|4
|2579
|48

Security Challenges in Emerging Networks Assignment
|4
|2314
|59

IOT - Security Issues and Solutions - Report
|9
|2197
|75

Overview of Network Security in Internet of Things
|4
|2832
|54

Internet of Things (IoT) Security
|10
|873
|56

Mobile technologies and Internet of Things
|5
|1015
|72