This report discusses the concept of Internet of Things (IoT) and the various security challenges. It includes a literature review of IoT, characteristics of IoT compared to traditional networks, and three areas of applications for IoT. It also focuses on three current or future security issues in IoT and its countermeasures.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SECURITY CHALLENGES IN EMERGING NETWORKS Security Challenges in Emerging Networks Name of the Student Name of the University Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 SECURITY CHALLENGES IN EMERGING NETWORKS Table of Contents Introduction...........................................................................................................................................2 Discussion..............................................................................................................................................2 1. Literature review of Internet of Things (IoT)..................................................................................2 2. Three current or future security issues in IoT and its countermeasures........................................4 Conclusion.............................................................................................................................................5 References.............................................................................................................................................6
2 SECURITY CHALLENGES IN EMERGING NETWORKS Introduction The Internet of things or IoT can be defined as the network of various physical devices, home appliances,vehiclesandmanymore,whichenablestheseobjectstoconnectaswellas exchangeconfidential data [3].Everything could be uniquely recognized with the help of the embeddedcomputingsystemhoweverhastheabilityininter-operatingwithin theInternetinfrastructure that previously exists.This IoT or Internet of Things is responsible for allowing various objects that are to be sensed as well as controlled properly in the existing infrastructure of network. This helps to create opportunities for all the direct integration of various physical world with the several computer based systems. This eventually results in improvised accuracy, efficiency as well as economic benefits [11]. Thus, the human intervention is properly reduced and minimized to a greater extent. This Internet of Things could be easily augmented with the several sensors and actuators and hence all the technologies are eventually encompassed. The following report will be outlining a brief discussion on the concept of Internet of Things or IoT and the various security challenges. The report will be divided into two parts. The first part is the literature review of Internet of Things. This part describes about IoT, Characteristics of IoT compared to the traditional network and three distinct areas of applications for Internet of Things. The second part of the report focuses on the three current or future security issues in IoT and its countermeasures. Discussion 1. Literature review of Internet of Things (IoT) i)Introduction to IoT: The Internet of things is the basic system of various interrelated computing devices, digital machines, mechanical machines, people as well as animals, which are given for uniquely identifying anyone and also comprise of the ability for transferring data on the network without the need of human to computer or human to human interactions [8]. This IoT has evolved from the proper convergence of several wireless technologies, Internet, micro services, MEMS or micro electromechanical systems and many more. This convergence is helpful for tearing down all the silo walls within the OT or operational technology as well as IT or information technology. These allow unstructured machine generated data that is to be analyzed for the insights for driving improvements. ii)Characteristics of IoT compared to the traditional network: There are some of the major benefits or characteristics of Internet of Things over the traditional networks [1]. The first and the
3 SECURITY CHALLENGES IN EMERGING NETWORKS foremost difference between the IoT and traditional Internet is the identification of this content creation. There are various other important differences as well. For example, content within the traditional Internet is being consumed as per request [7]. This means the user has to ask any query, send any request or issue any search for the web services for the purpose of consuming the content. On the other hand, within the Internet of Things, this content could be eventually consumed by pushing this technology as the notification of an activity when the situation of interest could be detected. In most of the cases, this consumption refers to the combination of data from the various sources. This particular characteristic also occurs for traditional networks. Within the traditional network, this connection is done with the help of various physical links within the web pages. Within IoT, this amalgamation of data could be needed for detecting any situation. This could be easily manifested with the combination of data within the structure of event patterns that are context- based where all the data has the ability in determining the context as well as the pattern [10]. There is a difference within the consumer value. For the traditional network, this value helps to answer a question, which could be posed by consumer while searching for data or services. For the IoT, this value is the timely notification or action based on the situations that could be detected. Key FactorsTraditional NetworkInternet of Things or IoT 1. Who is creating content?Human beingsMachine 2. How is this content being consumed? As per requestThisisdonebypushing informationaswellas triggering actions [4]. 3. How is this content being combined? By explicitly defined linksBy explicitly defined operators 4. What is the value?By answering questionsActionaswellastimely information. iii)Three areas of applications for IoT: The three areas of applications for IoT are Smart home, wearables and smart city. Smart Home: Smart Home is the most significant application of IoT. This smart home eventually controls climate, appliances and entertainment systems. It is responsible for producing safer house environments [12]. When this is connected to the Internet connectivity, all the home devices become the major part of IoT or Internet of Things. The user interface that is utilized for system control utilizes the wall mounted terminals, desktops or tablets. It is the mobile application that is utilized for safety purposes.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 SECURITY CHALLENGES IN EMERGING NETWORKS Wearables: Wearable technology or wearables are several smart electronic devices, which are worn over the body as accessories or implants. All the wearable devices like activity trackers are the proper applications of Internet of Things that are extremely popular in today’s world [6]. The sensors effectively enable the objects for exchanging data through Internet and not involving human intervention. Smart City: Smart city is the urban area, which utilizes various types of electronic sensors that help in collecting data and supplying information. This is utilized for the proper management of resources as well as assets efficiently and effectively [2]. The data is collected from the devices, citizens and finally assets that are being processed or analyzed for monitoring and managing transportation systems and traffic, networks of water supply, information systems, power plants and many more. This is the perfect amalgamation of Internet of Things or IoT and ICT or information and communications technology for optimizing efficiency of the operations or services. 2. Three current or future security issues in IoT and its countermeasures i)Explanation and Analysis of Three security Issues in IoT: The three security issues in Internet of Things are as follows: Lack ofData Encryption: The first and the foremost security issue in Internet of things is the lack of data encryption. Due to this lack of data encryption, it often becomes a major issue for the users to secure their data from hackers. LackofDataAuthentication:ThesecondsecurityissueinIoTisthelackofdata authentication [9]. Data often loses its authentication as well as integrity within this technology. Security-Side-channel Attacks: Security-side-channel attacks mainly focus on information as well as the procedure of presentation of that information. Thus, when the information is being checked or accessed on a timely manner, the hacker gets the access of the data and exploits it purposely. ii)Explanation of countermeasures and Mitigation Techniques and Tools for Every Security Issue: The countermeasures for three security measures are given below: Lack ofData Encryption: This particular problem could be resolved by proper encryption strategies. Moreover, SSL or Secure Sockets Layer Protocol can be used when the data is online. SSL protocols help to properly encrypt the data without much hassle or problems [5]. The websites are mainly secured by this.
5 SECURITY CHALLENGES IN EMERGING NETWORKS Lack ofData Authorization: This particular problem could be resolved by involving firewalls and antivirus. The antivirus software is utilized for securing the data properly and thus comprises of the feature for saving the authorization and integrity of the confidential data. Due to the presence of this software, the hackers would not get any access to the confidential data and hence the data could be saved. Moreover, firewalls help to detect any type of malicious activity. Security-Side-channel Attacks:This particular problem could be resolved by involving proper strategies of Internet of Things or IoT [12]. It is extremely vulnerable for the users and their systems. Presence of firewalls is another important step for this. Conclusion Therefore, from the above discussion, it can be concluded that The Internet of Things or IoT refers to aspecific computing concept, which describes the entire idea of regular physical objects that are being connected to the connection of Internet and has the ability for identifying themselves to all other devices. The term of IoT could be closely identified with radio frequency identifiers or RFID as a method for communication. This might also involve the other technologies of sensor, QR codes and the wireless technologies. This Internet of Things is extremely important since any object, which could easily represent them for becoming more active than the object. It is also referred to as ambient intelligence. The above report has outlined a brief discussion on the concept of Internet of Things or IoT and the various security challenges. The report is sub divided into two parts. The first part is the literature review of Internet of Things. This part has described about IoT, Characteristics of IoT compared to the traditional network and three distinct areas of applications for Internet of Things. The second part of the report has also focused on the three current or future security issues in IoT and its countermeasures.
6 SECURITY CHALLENGES IN EMERGING NETWORKS References [1] Wortmann, Felix, and Kristina Flüchter. "Internet of things."Business & Information Systems Engineering57, no. 3 (2015): 221-224. [2] Yang, Shuang-Hua. "Internet of things." InWireless Sensor Networks, pp. 247-261. Springer, London, 2014. [3] Gubbi, Jayavardhana, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. "Internet of Things (IoT): A vision, architectural elements, and future directions."Future generation computer systems29, no. 7 (2013): 1645-1660. [4] Zanella, Andrea, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, and Michele Zorzi. "Internet of things for smart cities."IEEE Internet of Things journal1, no. 1 (2014): 22-32. [5] Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A survey."IEEE Transactions on industrial informatics10, no. 4 (2014): 2233-2243. [6] Perera, Charith, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. "Context aware computing for the internet of things: A survey."IEEE communications surveys & tutorials16, no. 1 (2014): 414-454. [7] Cui, Xiaoyi. "The internet of things." InEthical Ripples of Creativity and Innovation, pp. 61-68. Palgrave Macmillan, London, 2016. [8] Stankovic, John A. "Research directions for the internet of things."IEEE Internet of Things Journal1, no. 1 (2014): 3-9. [9] Al-Fuqaha, Ala, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. "Internetofthings:Asurveyonenablingtechnologies,protocols,andapplications."IEEE Communications Surveys & Tutorials17, no. 4 (2015): 2347-2376. [10] Chandrakanth, S., K. Venkatesh, J. Uma Mahesh, and K. V. Naganjaneyulu. "Internet of things."International Journal of Innovations & Advancement in Computer Science3, no. 8 (2014): 16- 20. [11] Mukhopadhyay, Subhas Chandra, and N. K. Suryadevara. "Internet of things: Challenges and opportunities." InInternet of Things, pp. 1-17. Springer, Cham, 2014. [12] Whitmore, Andrew, Anurag Agarwal, and Li Da Xu. "The Internet of Things—A survey of topics and trends."Information Systems Frontiers17, no. 2 (2015): 261-274.