This assignment delves into the realm of the Internet of Things (IoT), examining its fundamental vision and defining architectural components. It explores various perspectives on IoT from leading researchers and organizations, including potential benefits and challenges associated with this transformative technology.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Security Challenges in Emerging Networks Internet of Things [Authors Name/s per 1st Affiliation (Author)][Authors Name/s per 2nd Affiliation (Author)] Abstract—Internet of Things defines a vision of expanding the existing connections of the internet to includeafullyautonomoussystem.Thisreport highlights this technology and the security challenges it presents. Keywords—IoT, Security, RFID I.INTRODUCTION Internet of things (IoT) represents a dynamic shift in theoperationalstructureoftheinternetwhere technologicalobjectsandgadgetareholistically embroiled into a worldwide network. In this network, thesedevicesidentifythemselvesautonomouslyand share information based on their needs and those of their users. Therefore, as a future technology IoT represent the next evolution of the internet where technology will take advantage of the advancement in digital systems more so, virtualization,computingpowerandsystem miniaturization[1].Furthermore,itisthroughIoT technology that smart systems will be developed having the ability to function without human intervention. In essence, the implementation of IoT will signal the start of smart cities, an outcome already seen today. Now, this report analyses IoT as a technology including the security challenges and threats that will be experienced as a result of its implementation. II.LITERATUREREVIEW In the current world, the foundational concepts ofIoTarealreadybeingseen,thingslikesmart television systems, smart watches and smart phones are propelling the digital era into a smart society. These gadgets rarely need human intervention to operate, an outcome that is used to define a smart object or device. Moreover, these devices are designed based on the needs of the users which make them dynamic and versatile as compared to conventional systems that were developed based on the existing conditions [2]. Again, this shift in thedesignoftechnologicalsystemoutlinesthe parameters needed to implement IoT where intelligence and self-awareness are critical components. However, in all the research and discussion given on the topic, no single accepted definition is given on the term (IoT) other than the ability to add intelligence into the various working environments [3]. IoT Technologies Toincreasetheworldwideconnectionof devices, extensive networks are needed which outlines the importance of the internet in the future of IoT. In fact, its integral role in connectivity outlines why smart systems and even IoT are named as its next evolution. However, at the same time, the digital environment has toconsiderthedemandsmadebytheendusers particularly based on their convenience requirements. This demand necessitates the need for agile and dynamic systems, factors that have led to the growth of wireless technology,acentremarkforIoT[4].Inessence, wireless technologies will act as the foundation of IoT connectingdifferentdatacentres,devicesandthe complementary features (sensors and actuators). Now, the complementary features (sensors and actuators) will enable the devices to connect with each other based on various identification technologies. At the moment, RFID (radio frequency identification) is still the main technology proposed for IoT as it serves the connection purpose and has multiple operational benefits suchassimpledesignstructureandminimalcost. Furthermore, RFID can be integrated with the existing internettechnologiesmoresoIP(InternetProtocol) addressingwhichismajorlyusedtoconnectand
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
uniquely identify devices online [5]. Now, IP has in the past few years experienced drastic changes especially in itsaddressingschemewheretheIPv6hasbeen developed to handle the number of devices expected in the future. In all, IPv6 will offer an unlimited number of addresses based on a bi-directional and symmetrical machine to machine (M2M) communication structure. Architecture Similartoothernewtechnologiesvarious models/architecture have been outlined based on the existingsystems.However,accordingtotheITU (International Telecommunication Union), IoT should be based on five implementation layers, i.e.: •Sensory layer (SL) •Access layer (AL) •Network layer (NL) •Middleware layer (ML) •Application layer (AL) [6] Fig: IoT architecture SL:Theinitialoperationallayerthatwillholdthe sensors and control actuators. These devices will collect information and turn it into important data to control the IoT devices. This layer covers a wide range of devices such as camera systems, detectors, accelerometer and even heart rate monitors among many others [7]. AL:consisting of the access gateways, this layer will aggregate the sensors and actuators through the various connection methods. In this case, the layer will hold networking concepts such as local area network (LAN) and wide area networks (WANs) to integrate the various devices.Furthermore,theseconnectionswillbe supported by the various networking technologies such as Ethernet, Wi-Fi, ZigBee, Bluetooth and 6LowPAN [8]. NL:the different networks used in the access layer will need a common aggregator that will combine them into the one IoT platform. Now, this will be the function of the network layer which will be based on the defining protocolssuchasIPandtheembeddedoperating systems. In essence, the network model defined will have to support a worldwide communication having the QoS parameters (latency, bandwidth, error probability and scalability etc.) [6]. ML:the intermediary layer that will manage the IoT servicesincludingthedatainvolved.Therefore,the middleware layer will act as both a service layer and a data management layer. Its management service will include;securitycontrol,objectmanagementand analyzinginformation.Ontheotherhand,itsdata management roles will filter data to produce the critical operational information [9]. AL:the final layer that will present the features of IoT to the end users based on appropriate APIs (application presentationinterfaces).Now,theseAPIswillvary based on the industry or application used. Furthermore, they will vary based on the needs of the users which couldbepersonal(homeapplication),enterprise (business),orutilityinnature(nationalorregional application). In all, the application layer will operate in a smartenvironmentholdingagileandadjustable operational domains [2]. Benefits of IoT IoT will present many benefits, most of which will arise from its autonomous nature and the ability to operate with minimal resources. Some of these benefits will be: Minimal operational costs – IoT will be fully automated requiring less operational resources. Minimal errors – decisions will be based on factual and accurate data, which will improve outcomes. Worldwideintegration–thiswillincrease information access and create new environments for business operations [10]. III.SECURITYVULNERABILITIES Most of the IoT components such as sensors and actuatorswillbedeployedonamassivescalethat traditional and conventional interconnections will not have experienced. These components will be intensified further by the number of devices that will be connected into the IoT framework. In all, this design structure will
have resounding pressures on the existing networking systemsmoreso,thesecuritystructuresthatare designed to contain and isolate networks. In essence, the existing security protocols will lose their strengths as IoT will infringe directly on their operation mechanisms which will make them vulnerable to intrusions/attacks [11]. Secondly,considerthediversityofdevices, protocols and network models that will exist within the general framework of IoT. In the existing structure of the internet,varioussystemsareusedwhichmakeit vulnerable to attacks as different security measures are used. Similarly, IoT will have different components that willeitherbeidenticalornon-identical.This homogeneity and heterogeneity will magnify the existing security problems of worldwide connections. In essence, some devices and networks will have the necessary security measure to protect the users as compared to others. A good example is a smart watch that may act a rogue access point having minimal security measures while connected to a home network having sensitive data [11]. Finally,considerthemanufacturersand developers of IoT devices and technologies. Most of thesecompanieswilldesignsystemsbasedonthe immediate needs of the users while having minimal security considerations. In fact, some companies will design systems without security features so as to boost support business. Moreover, other companies will design systems without upgrade features which will affect the overall IoT security when new intrusion mechanisms are developed. In addition to this, some devices will outlive their manufacturers while they are still connected to the worldwide structure which will create serious security vulnerabilities as they will have no technical support [12]. IV.POSSIBLESOLUTION Although the solution outlined in this section coversthedeploymentofIoTdevicesi.e.thefirst vulnerability,thismitigationprocedurecanaswell prevent the other security threats outlined. In essence, the solution to the security issues of massive system deployment is proper design practices. How is this so? While worldwide connection and integration are needed, thereshouldbecriticaltrade-offsbetweenthe technologiesusedandthesecuritymeasures implemented.ThedesignanddevelopmentofIoT devicesshouldbedonebasedonspecificindustry standards that would see all manufacturers conform to certainsecurityregulations.Moreover,thesame standardswouldoutlinethedesignpracticesor framework of deploying all IoT systems. Now, this design practices would include security features such as cryptography where system authentication, authorization and encryption would be done. Furthermore, the same practices would encapsulate the requirements of system upgrades, particularly in the field setting [11]. V.CONCLUSION IoT defines the next evolution of information technology where the internet will be extended to support all devices andobjects.Now,throughthisextension,IoTwill integrateallaspectsoflifefrombusinesstohome activities. Furthermore, through this technology devices willbecomeautonomouswhichwillimprovetheir intelligence hence increase their efficiency. However, the implementation process should also cater for the security issues outlined as they may derail and interfere with the objectives of the technology. VI.REFERENCES [1]S. Madakam, E. Ramaswamy and S. Tripathi, "Internet of Things (IoT): A Literature review," Journal ofComputerandCommunications,p.Available: https://file.scirp.org/pdf/JCC_2015052516013923.pdf, 2015. [2]S.Madakam,"InternetofThings:Smart Things," International Journal of Future Computer and Communication,pp.Available: http://www.ijfcc.org/vol4/395-ICNT2014-2-203.pdf., 2015. [3]E.AlsaadiandA.Tubaishat,"Internetof Things:Features,Challenges,andVulnerabilities," International Journal of Advanced Computer Science and Information Technology (IJACSIT), p. Available: , 2015. [4]F. Mattern and C. Floerkemeier, "Fro m the InternetofComputerstotheInternetofThings," DistributedSystemsGroup,InstituteforPervasive Computing,ETHZurich,pp.Available: http://www.vs.inf.ethz.ch/publ/papers/Internet-of- things.pdf., 2012. [5]V. Vatsa and G. Singh, "A Literature Review on InternetofThings(IoT),"InternationalJournalof ComputerSystems,p.Available: http://www.academia.edu/19560667/A_Literature_Revie w_on_Internet_of_Things_IoT_, 2015.
[6]J.Gubbi,R.Buyya,S.MarusicandM. Palaniswami,"InternetofThings(IoT):AVision, ArchitecturalElements,andFutureDirections,"pp. Available:http://www.cloudbus.org/papers/Internet-of- Things-Vision-Future2012.pdf., 2012. [7]K.Rose, S.Eldridge and L. Eldridge,"The Internet of Things: An Overview," Understanding the Issues and Challenges of a More Connected World, pp. Available: https://www.internetsociety.org/sites/default/files/ISOC- IoT-Overview-20151014_0.pdf., 2015. [8]P.FREMANTLE,"AREFERENCE ARCHITECTUREFORTHEINTERNETOF THINGS,"WSO2,pp.Available: http://wso2.com/wso2_resources/wso2_whitepaper_a- reference-architecture-for-the-internet-of-things.pdf., 2015. [9]A. Castellani, N. Bui, P. Casari, M. Rossi, Z. Shelby and M. Zorzi, "Architecture and Protocols for the InternetofThings:ACaseStudy,"p.Available: https://webofthings.org/wot/2010/pdfs/144.pdf., 2010. [10]C. Reports, "Reaping the Benefits of the Internet ofThings,"CognizantReports,pp.Available: https://www.cognizant.com/InsightsWhitepapers/Reapin g-the-Benefits-of-the-Internet-of-Things.pdf., 2014. [11]I. society, "The internet of things: overview," Understandingtheissuesandchallengesofamore connectedworld,pp.Available: https://www.internetsociety.org/doc/iot-overview, 2015. [12]Ericsson,"IoTSECURITY,"ericssonWhite paper,pp.Available: https://www.ericsson.com/assets/local/publications/whit e-papers/wp-iot-security-february-2017.pdf., 2017.