Overview of Network Security in Internet of Things (IoT)

Verified

Added on  2024/05/14

|11
|2567
|234
AI Summary
This overview delves into the literature review, characteristics, applications, security issues, and countermeasures in the Internet of Things (IoT). It covers topics like unauthorized access, DoS attacks, malicious injections, and their solutions.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Overview of Network Security

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
1. Literature review of Internet of Things (IoT):.............................................................................................2
i. Introduction to IoT........................................................................................................................................2
ii. Characteristics of IoT compared to the traditional network (please include the variety of devices
that are used in IoT).........................................................................................................................................2
iii. Discuss three areas of applications for IoT................................................................................................3
2. Analyse critically, three current or future security issues in IoT and its countermeasures.........................3
i. Explain and analyse critically three security issues in IoT...........................................................................3
ii. Explain the countermeasures/mitigation techniques and tools used for each of the security issues...........4
3. Presentation..................................................................................................................................................4
Conclusion.......................................................................................................................................................9
References......................................................................................................................................................10
1
Document Page
1. Literature review of Internet of Things (IoT):
i. Introduction to IoT
Internet of things is the technology that has changed the world to a great extent and is extending its
area to convert almost all real entities into the virtual entities of high intelligence. The major motive
of the IoT is to maintain unity among the everything that surrounds us and taking information
states the state of the things through intelligence medium. The global system of internet is
responsible for providing the connectivity and it uses a medium of standard protocol suite so that
multiple users can access it. Instead to this, there are various types of networking system such as
public, private, governmental and so on that serves for different purposes and these networking
system are developed with the help of several wireless, electronic and optical type of technology. It
has been found through some resources that world population’s 32.7% people are using this internet
connectivity. There is also possibility of setting internet into the space in the coming years and this
will provide advantage in the future [1].
IoT is the type of thing or person which has large difference when compared to the actual real
entities. It is actually a combination of intelligent objects structured in specific way so that it has the
capacity to organise and share information automatically or either under the control of humans. It is
type global infrastructure which can be deployed anywhere and can provide the internet
connectivity anywhere. The connectivity of population using the internet is done by various means
of communication such as telephones, servers, computer system, social networking sites. When the
devices connected into the networking system transfers huge volume of data then the availability of
the internet connectivity provides path for communication through internet protocol standards and
received through some networking tools [2]. These tools understand the complexity and give
response very intelligently. However, it is actually a technical innovation which is responsible for
representing computing future in addition to communication channel. It involves advanced
innovation if several fields such as wireless, nanotechnology and so on.
ii. Characteristics of IoT compared to the traditional network (please include the
variety of devices that are used in IoT).
The basic characteristics of the IoT are described here as:
1. Interconnectivity: IoT helps in interconnection between various types of infrastructures so that it
will support global information sharing and communication
2. Things-related services: With the help of IoT, it becomes easy to things related services having
some associated constraints in the form of privacy and consistency between the associated physical
and virtual objects. Both these things after getting the services will change due to advancements ni
their functioning [3].
3. Heterogeneity: IoT consist of several devices and all the devices are heterogeneous because they are
related to different platforms and networks. They require different types of network to interact with
some other types of devices and networks.
4. : There exist several stages of a particular device such as connecting or disconnection and it changes
dynamically. The other factors such as their number of devices, location and speed of the devices
also vary with their application for use.
5. Enormous scale: The magnitude of devices connected to the network for the communication should
have high order when compared with the order of internet connected devices. The data transferred
from one end to another, it should be managed efficiently for better semantic of data.
6. Safety: This feature is important one as IoT is advanced technology and with it safety must be
applied so that no damage will occur to the connected devices. It must designed for each types of
hardware, endpoints, network and even also for data transfer so that security can be maintained for
the IoT liabilities.
2
Document Page
7. Connectivity: For connectivity, the major two factors must be considered and they are accessibility
and compatibility where accessibility is defined for the network availability and compatibility is
defined as the capability to use and retrieve the useful data [4]
iii. Discuss three areas of applications for IoT.
ï‚· IoT for smart living: for the smart living, there is use of several appliances which are used to save
energy and restricts any issue. The IoT devices are also used for the transmission of data for long
distances. To helps in regular working of the people such as kitchen or washing work and they need
to monitored with the smart devices. Instead of all these things, IoT can be used for making the life
secure by using digital camera or either advanced alarm system.
ï‚· IoT for smart cities: Smart devices can be used the development of building and other
infrastructures to provide safety by checking vibrations in them. Use of smart lights at the streets to
manage the working at the streets. Intelligent road and smart highways with security note help in
preventing unnecessary events at the roads and highways. Use of advanced parking system helps in
detecting the reserved space to manage the parking section. IoT also helps in management of the
waste across the city.
ï‚· IoT for smart industry: There are different types of industry on the global level and some of them
deal with the need of high safety. So IoT devices fulfil such need of providing help bu detecting the
level of danger by the use of various sensors. Some industries also requires the evaluation of
malfunctioning of the machines and the infrastructure over there, and IOT also helps in such
evaluation and development of their documentation [4].
2. Analyse critically, three current or future security issues in IoT and its
countermeasures
i. Explain and analyse critically three security issues in IoT.
1. Unauthorized access
When there is no proper authentication, any information can be accessed by anyone and will result
into the loss of information. The threat agent can extract the data and modify it to provide damage
of the associated organization. In this issue, the agent attacks the IoT devices to get the access to the
data and the relevant services and can delete the data and is very fatal to the system. This issue is
major when considered for the large enterprises where lots of personal data is stored such as bank or
financial institution. The threat agent firstly checks the vulnerability at the IoT devices because any
fault in the IoT device can initiate the attack [5].
2. DoS attack
This attack is related to the privacy issue of the services provided by the IoT devices. During this
attack, all the system of an associated organisation fails to provide the services and system shuts
down. The breaching is regarding the hacking of the system to break the data privacy. The best
example is that the agents makes the victim fool by providing that the attacking is appearing
somewhere at other location and steal the information that he wants. This also involves the
unwanted traffic at the network channel introduced by the hacker so that it becomes easy to exhaust
the targeted system which results into failure of functioning of the services
3. Malicious injection
This attack involves the indulging of some unwanted software into the system with which hacker
can control all the system and the IoT devices. This can lead to the loss of data, control and privacy
of the system and even sometimes system also starts malfunctioning. The software injected contains
3

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
the malicious code which can also makes the whole system fail in order abrupt the operation of the
associated organisation [6].
ii. Explain the countermeasures/mitigation techniques and tools used for each of
the security issues
The countermeasures are
1. Authentication: The best method to provide the high level of authentication is cryptographic
hash algorithms. With the help of this method, there is the development of digital signatures so that
the information related to the particular person cannot be hacked easily without the digital
signatures. This also leads to prevention of sharing of false information among various persons.
With this, the DoS type of attack can be prevented by controlling the unwanted traffic through
reducing the fake sharing of information.
2. Intrusion Detection: This technique of detecting the possible intrusion within the system is
specific and it checks the various security threats in the system. This method evaluates the
suspicious activity in the system of IoT by continuous monitoring the system. It also conducts
continuous log of the active intruders in the system and detects their activities and this will help in
detecting the type of intruder in the system. There were various type of notification system such as
alarm with which user can be notified for any suspicious activity. The examples of such techniques
are data mining and detection of anomaly. This can be used to counterfeit the malicious type of
intruders.
3. Data privacy and security: In this technique, the data integrity methods are used for the
evaluation of the applied data privacy techniques. Here the data transferred and received are same
as per the data integrity standards. Another type of privacy that can be applied includes the use of
encryption technology to transmit the data by the modification in the data can be prevented. For the
stoppage of malicious injection, various anti-DoS firewall can be applied in addition to their proper
updates to prevent the updated threat [7].
3. Presentation
Internet of things
Slide 1:
4
Document Page
Slide 2:
IoT is a system physical objects and things which provides internet connectivity and allows data
sharing and collection. It also provides better communication channel for the associated
organization. It is highly flexible and can be controlled remotely as it supports wider field of
application. It provides a platform for integration between physical world and computers based
system so that automation came into existence.
Slide 3:
5
Document Page
According to the report of business insider, internet of things has the maximum percentage of
growth.
Slide 4:
The major features of the internet of things are: better interconnectivity, supports heterogeneity,
enables things-related services, provides advanced security and supports dynamic changes for better
sustainability.
6

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
There are several applications of the IoT: provides automation in various devices, improves the
manufacturing techniques, helps in industrial monitoring, supports smart living, helps in energy
management.
Slide 5:
The major issues are unauthorized access, DoS attack and malicious injection. In the unauthorized
access issue, the issues is regarding the accessing the data through unauthorized technique and theft
and modification of the data. In DoS attack, the attack is related to the failure in the privacy issue
and unwanted network traffic to reduce the network efficiency. Malicious injection is related to the
introduction of malicious code which hacks the functioning of the system for data theft or
modification or to control the operation of the IoT system. The counter measure for such issues
includes the authentication through cryptographic hash algorithms, intrusion detection through data
mining and data privacy and security through use of encryption techniques.
Slide 6:
7
Document Page
IoT is a type of advanced technology and gaining huge popularity because It improves the
efficiency of a system and has its future in almost all kind of business.
Slide 7:
8
Document Page
Conclusion
The report is created in context to overview of the Internet of Things. It contains the literature
review for the Internet of Things and also explains its features and application. Instead to this, this
report also address to the issues and possible solution to the issues.
9

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
[1]S. Madakam, R. Ramaswamy and S. Tripathi, "Internet of Things (IoT): A Literature
Review", Journal of Computer and Communications, vol. 03, no. 05, pp. 164-173, 2015.
[2]B. Guo, D. Zhang, Z. Wang, Z. Yu and X. Zhou, "Opportunistic IoT: Exploring the harmonious
interaction between human and the internet of things", Journal of Network and Computer
Applications, vol. 36, no. 6, pp. 1531-1539, 2013.
[3]J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, "Internet of Things (IoT): A vision,
architectural elements, and future directions", Future Generation Computer Systems, vol. 29, no. 7,
pp. 1645-1660, 2013.
[4]K. Patel and S. Patel, "Internet of Things-IOT: Definition, Characteristics, Architecture,
Enabling Technologies, Application & Future Challenges", International Journal of Engineering
Science and Computing, vol. 6, no. 5, pp. 6122-6131, 2016.
[5]Q. Jing, A. Vasilakos, J. Wan, J. Lu and D. Qiu, "Security of the Internet of Things: perspectives
and challenges", Wireless Networks, vol. 20, no. 8, pp. 2481-2501, 2014.
[6]A. Sfar, E. Natalizio, Y. Challal and Z. Chtourou, "A roadmap for security challenges in the
Internet of Things", Digital Communications and Networks, vol. 4, no. 2, pp. 118-137, 2018.
[7]M. U.Farooq, M. Waseem, A. Khairi and S. Mazhar, "A Critical Analysis on the Security
Concerns of Internet of Things (IoT)", International Journal of Computer Applications, vol. 111,
no. 7, pp. 1-6, 2015.
10
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]