IoT Architecture and Security Challenges
VerifiedAdded on 2020/03/16
|4
|2579
|48
AI Summary
This assignment examines the architecture of the Internet of Things (IoT), referencing key white papers and research articles. It delves into various architectural models, protocols, and benefits while highlighting significant security challenges and vulnerabilities associated with IoT deployments. The analysis draws upon resources from prominent organizations like WSO2, Ericsson, and Cognizant to provide a comprehensive understanding of the current state of IoT architecture and its security implications.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Overview of Network Security
Security Challenges in Emerging Networks
[Authors Name/s per 1st Affiliation (Author)] [Authors Name/s per 2nd Affiliation (Author)]
Abstract— Internet of Things aims to extend the
existing networking infrastructure by facilitating the
connection of all worldwide devices through a
common medium. The internet is therefore
envisioned as the medium of choice because of its
existing worldwide connectivity and availability.
Keywords— IoT, ARPANET, Internet
I. INTRODUCTION
IoT outlines the next big advancement of the internet
where connectivity will be taken to the next level to
include all devices and objects. In essence, IoT will
provide a worldwide connectivity through anonymous
systems that will require minimal human intervention in
their operations, an outcome that essentially will promote
the intelligence of technological devices. In all, unlike the
modern internet infrastructure that is characterized by
electronic devices, IoT will include any object whether
electronic or not [1]. Furthermore, it will collaborate the
elements of smart systems into its structures which will
also facilitate the growth of smart cities. Although the
actual implementation and development are yet to take
their full effect, the foundational elements of the
technology are already in place as exhibited by the
existence of the internet. Now, this report highlight IoT
as a technology and analyses the security
threats/challenges facing it.
II. LITERATURE REVIEW
So, the genesis of IoT can be traced back to the inception
of the internet where the various networking
technologies were designed with a worldwide objective
that would seamless connect all existing devices [2]. At
the time, researchers through the basic technologies that
led to the development of the internet focused on the
establishment of protocols that could support extended
connectivity with limited resources. This requirement
led to the growth of packet-switched technologies such
as ARPANET and later the modern internet.
Nevertheless, today’s systems and technologies seem to
promote this initial objective where the growth of
anonymous systems is widely exhibited. Now, consider
the technologies of today such as smart watches, smart
television and smartphones. In essence, these
devices/technologies have increased the intelligence of
common household devices, an outcome that facilitates
extended connectivity since minimal human intervention
is required in the overall networking objective [3].
IoT defining technologies
For the objectives of IoT to be fulfilled its defining
technologies must facilitate the implementation of smart
systems. To start with, the devices connected to the
wider network of IoT must be able to identify
themselves by sharing information autonomously.
Moreover, the same devices will require a centralized
control system which will improve the overall
management outcomes [4]. Now, identification
requirement outlines the importance of sensors and
actuators in the implementation of IoT. In essence,
sensors will facilitate the mutual identification of
devices in the networks of operation. These sensors will
perform their roles by collaborating the functionalities of
worldwide connections through technologies such as
RFID and barcode identification [5]. However, based on
the prevailing conditions, RFID (radio frequency
Security Challenges in Emerging Networks
[Authors Name/s per 1st Affiliation (Author)] [Authors Name/s per 2nd Affiliation (Author)]
Abstract— Internet of Things aims to extend the
existing networking infrastructure by facilitating the
connection of all worldwide devices through a
common medium. The internet is therefore
envisioned as the medium of choice because of its
existing worldwide connectivity and availability.
Keywords— IoT, ARPANET, Internet
I. INTRODUCTION
IoT outlines the next big advancement of the internet
where connectivity will be taken to the next level to
include all devices and objects. In essence, IoT will
provide a worldwide connectivity through anonymous
systems that will require minimal human intervention in
their operations, an outcome that essentially will promote
the intelligence of technological devices. In all, unlike the
modern internet infrastructure that is characterized by
electronic devices, IoT will include any object whether
electronic or not [1]. Furthermore, it will collaborate the
elements of smart systems into its structures which will
also facilitate the growth of smart cities. Although the
actual implementation and development are yet to take
their full effect, the foundational elements of the
technology are already in place as exhibited by the
existence of the internet. Now, this report highlight IoT
as a technology and analyses the security
threats/challenges facing it.
II. LITERATURE REVIEW
So, the genesis of IoT can be traced back to the inception
of the internet where the various networking
technologies were designed with a worldwide objective
that would seamless connect all existing devices [2]. At
the time, researchers through the basic technologies that
led to the development of the internet focused on the
establishment of protocols that could support extended
connectivity with limited resources. This requirement
led to the growth of packet-switched technologies such
as ARPANET and later the modern internet.
Nevertheless, today’s systems and technologies seem to
promote this initial objective where the growth of
anonymous systems is widely exhibited. Now, consider
the technologies of today such as smart watches, smart
television and smartphones. In essence, these
devices/technologies have increased the intelligence of
common household devices, an outcome that facilitates
extended connectivity since minimal human intervention
is required in the overall networking objective [3].
IoT defining technologies
For the objectives of IoT to be fulfilled its defining
technologies must facilitate the implementation of smart
systems. To start with, the devices connected to the
wider network of IoT must be able to identify
themselves by sharing information autonomously.
Moreover, the same devices will require a centralized
control system which will improve the overall
management outcomes [4]. Now, identification
requirement outlines the importance of sensors and
actuators in the implementation of IoT. In essence,
sensors will facilitate the mutual identification of
devices in the networks of operation. These sensors will
perform their roles by collaborating the functionalities of
worldwide connections through technologies such as
RFID and barcode identification [5]. However, based on
the prevailing conditions, RFID (radio frequency
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
identification) presents the best solution for this
application as it's widely integrated with the modern
internet infrastructure more so, the IP. Moreover, its
application requires fewer resources which will
minimize the overall implementation cost [1].
On the other hand, IoT will require other facilitating
technologies to collaborate its functionalities. For one,
the internet will serve as its foundational element owing
to the existing extensive connections. Furthermore, the
defining parameters of the internet such as access model
and protocols will also facilitate the functionalities of
IoT as it will require certain operation standards to
maintain a constant operation outcome. In addition to
this, the existing networking infrastructures will be
transformed into wireless networks to facilitate the rapid
growth of the IoT network because most devices will
exist as mobile systems [6].
IoT architecture
Now, consider the number of devices that will be
connected into the IoT after the defining elements of the
technology have been established. In all, like the existing
internet infrastructure, many devices having a wide
range of standards and technologies will be used.
Therefore, a common defining model will be needed to
standardize operations, a role that will be facilitated by
the following architecture/structure. This structure will
consist of five layers, each having a specific and unique
responsibility in the greater workings of the technology
[7]. These layers are; Application layer, management
layer, networking layer, access layer and the sensory
layer.
Fig: IoT model
a. The sensory layer – the lowest layer the IoT which
among its many responsibilities will host the sensory
devices that will facilitate the identification process of
the devices. Moreover, the same layer will hold system
actuators which will enable end users to control the
devices from centralized locations. Therefore, the layer
will have elements and devices such as detectors,
accelerometers and pulse rate monitors.
b. Access layer – this layer will provide the gateways
for accessing the technology’s connections. These
gateways will, therefore, consist of networking
structures such as localized networks (LANs) which will
collaborate the functionalities of devices by connecting
them to a common local network. These localized
networks will then extend to include other wider
networks such as WANs [8].
c. Networking layer – the basic networking
infrastructures i.e. LAN and WAN will require a
common integrator to support a worldwide connection
[9]. In essence, various networks from different regions
will have to be connected, a role that will be performed
by the network layer. Now, similar to the existing
network layer of the internet, embedded protocols such
as IP and TCP will be used.
d. Management layer – this layer will facilitate the
roles of the end users where management and control
functionalities will be conducted. This layer will manage
the system’s security, objects and analyze the collected
data to facilitate the roles of the IoT devices.
e. Application layer – the uppermost layer in IoT
which will deliver the services and functionalities of the
technologies to the end users. Now, APIs (application
presentation interfaces) will facilitate these roles by
delivering data and system control to the end users
through graphical systems [1].
III. SECURITY VULNERABILITIES
IoT like any other new technology presents many
benefits that will advance the users way of life.
However, at the same time, the technology will also
present a wide range of challenges particularly its
security as it will extend the structures of the existing
internet infrastructure which to date still holds many
security vulnerabilities. Furthermore, most of its
functionalities are still untested and thus will lack the
necessary robustness to withstand attacks and intrusions.
In all, IoT holds the following security vulnerabilities
[10].
1. Extensive networks and device autonomy
Let’s consider the internet as a rudimentary version of
the IoT where devices are connected to a worldwide
network thus are able to exchange a wide range of
information. This networking infrastructure cannot
application as it's widely integrated with the modern
internet infrastructure more so, the IP. Moreover, its
application requires fewer resources which will
minimize the overall implementation cost [1].
On the other hand, IoT will require other facilitating
technologies to collaborate its functionalities. For one,
the internet will serve as its foundational element owing
to the existing extensive connections. Furthermore, the
defining parameters of the internet such as access model
and protocols will also facilitate the functionalities of
IoT as it will require certain operation standards to
maintain a constant operation outcome. In addition to
this, the existing networking infrastructures will be
transformed into wireless networks to facilitate the rapid
growth of the IoT network because most devices will
exist as mobile systems [6].
IoT architecture
Now, consider the number of devices that will be
connected into the IoT after the defining elements of the
technology have been established. In all, like the existing
internet infrastructure, many devices having a wide
range of standards and technologies will be used.
Therefore, a common defining model will be needed to
standardize operations, a role that will be facilitated by
the following architecture/structure. This structure will
consist of five layers, each having a specific and unique
responsibility in the greater workings of the technology
[7]. These layers are; Application layer, management
layer, networking layer, access layer and the sensory
layer.
Fig: IoT model
a. The sensory layer – the lowest layer the IoT which
among its many responsibilities will host the sensory
devices that will facilitate the identification process of
the devices. Moreover, the same layer will hold system
actuators which will enable end users to control the
devices from centralized locations. Therefore, the layer
will have elements and devices such as detectors,
accelerometers and pulse rate monitors.
b. Access layer – this layer will provide the gateways
for accessing the technology’s connections. These
gateways will, therefore, consist of networking
structures such as localized networks (LANs) which will
collaborate the functionalities of devices by connecting
them to a common local network. These localized
networks will then extend to include other wider
networks such as WANs [8].
c. Networking layer – the basic networking
infrastructures i.e. LAN and WAN will require a
common integrator to support a worldwide connection
[9]. In essence, various networks from different regions
will have to be connected, a role that will be performed
by the network layer. Now, similar to the existing
network layer of the internet, embedded protocols such
as IP and TCP will be used.
d. Management layer – this layer will facilitate the
roles of the end users where management and control
functionalities will be conducted. This layer will manage
the system’s security, objects and analyze the collected
data to facilitate the roles of the IoT devices.
e. Application layer – the uppermost layer in IoT
which will deliver the services and functionalities of the
technologies to the end users. Now, APIs (application
presentation interfaces) will facilitate these roles by
delivering data and system control to the end users
through graphical systems [1].
III. SECURITY VULNERABILITIES
IoT like any other new technology presents many
benefits that will advance the users way of life.
However, at the same time, the technology will also
present a wide range of challenges particularly its
security as it will extend the structures of the existing
internet infrastructure which to date still holds many
security vulnerabilities. Furthermore, most of its
functionalities are still untested and thus will lack the
necessary robustness to withstand attacks and intrusions.
In all, IoT holds the following security vulnerabilities
[10].
1. Extensive networks and device autonomy
Let’s consider the internet as a rudimentary version of
the IoT where devices are connected to a worldwide
network thus are able to exchange a wide range of
information. This networking infrastructure cannot
adequately identify all the users of its system as many
elements are used. Furthermore, it’s pervasive and
anonymous nature makes it a suitable environment for
promoting sinister actions such as attacks and intrusions.
Now, IoT aims to extend this infrastructure to a higher
level where all devices and objects will be a part of the
overall networking infrastructure [11]. This extensive
network will limit the accountability measures which
will affect the overall security of the system used.
Moreover, the end users will not be able to adequately
track their resources which again may affect the security
of the resources more so, the data.
2. Minimal network isolation
Isolation is a critical component of the security of
devices connected to worldwide networks. This isolation
facilitates the accountability of resources where
administrators are able to identify and track resources
based on certain predefined parameters. Moreover, the
same tactic also minimizes the intrusion levels when
attacks do occur. However, with IoT, this isolation
element is lost as the defining protocols of IoT require
extensive connections [12]. Furthermore, different
devices having different standards will be used which
will affect the overall security procedures. For instance,
a network and its corresponding devices will have the
necessary security features only to be compromised by a
rudimentary system having substandard security
measures e.g. a smartwatch.
3. User and manufacturer’s ignorance
According to security experts, the end users are
responsible for the highest number of cyber intrusions
owing to their ignorance and negligence. In essence,
they will apply substandard security features in an
attempt to save their overall expenditures [13]. A similar
outcome is experienced by system developers and
manufacturers who will implement substandard security
structures in an attempt to increase the overall revenues.
IV. SOLUTION
In the first vulnerability, IoT’s extensive networks will
facilitate the growth of the security problems facing the
modern networking infrastructures. Therefore, it will be
difficult to track and manage resources online. As a
solution, the technology must implement extensive
security features in the form of encryption and
authentication. These security measures will maintain
the integrity of the resources used more so, the data
which as per the existing infrastructure will be difficult
to manage while in transit. Now, these security features
should thoroughly protect the channels of
communication by providing end to end encryption and
user authentication based on verified access policies
[14].
V. CONCLUSION
IoT is not a new technology but an advancement of the
existing networking infrastructure which aims to
increase the intelligence of the participating devices.
This objective will promote the growth of networking
infrastructure which will increase information
availability and access. However, at the same time, the
extended access will facilitate several limitations and
vulnerabilities because the resource will be difficult to
track. Nevertheless, a wide range of security features can
and will be used to minimize these limitations, among
them being adequate authentication and encryption
standards.
VI. REFERENCES
[1
]
S. Madakam, "Internet of Things: Smart Things,"
International Journal of Future Computer and
Communication, pp. Available:
http://www.ijfcc.org/vol4/395-ICNT2014-2-203.pdf.,
2015.
[2
]
E. Alsaadi and A. Tubaishat, "Internet of Things: Features,
Challenges, and Vulnerabilities," International Journal of
Advanced Computer Science and Information Technology
(IJACSIT), p. Available: , 2015.
[3
]
F. Mattern and C. Floerkemeier, "Fro m the Internet of
Computers to the Internet of Things," Distributed Systems
Group, Institute for Pervasive Computing, ETH Zurich, pp.
Available: http://www.vs.inf.ethz.ch/publ/papers/Internet-
of-things.pdf., 2012.
[4
]
V. Vatsa and G. Singh, "A Literature Review on Internet of
Things (IoT)," International Journal of Computer
Systems , p. Available:
http://www.academia.edu/19560667/A_Literature_Review
_on_Internet_of_Things_IoT_, 2015.
[5
]
J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami,
"Internet of Things (IoT): A Vision, Architectural
Elements, and Future Directions," pp. Available:
http://www.cloudbus.org/papers/Internet-of-Things-
Vision-Future2012.pdf., 2012.
[6
]
S. Madakam, E. Ramaswamy and S. Tripathi, "Internet of
Things (IoT): A Literature review," Journal of Computer
and Communications, p. Available:
https://file.scirp.org/pdf/JCC_2015052516013923.pdf,
2015.
[7
]
K. Rose, S. Eldridge and L. Eldridge, "The Internet of
Things: An Overview," Understanding the Issues and
Challenges of a More Connected World, pp. Available:
https://www.internetsociety.org/sites/default/files/ISOC-
IoT-Overview-20151014_0.pdf., 2015.
elements are used. Furthermore, it’s pervasive and
anonymous nature makes it a suitable environment for
promoting sinister actions such as attacks and intrusions.
Now, IoT aims to extend this infrastructure to a higher
level where all devices and objects will be a part of the
overall networking infrastructure [11]. This extensive
network will limit the accountability measures which
will affect the overall security of the system used.
Moreover, the end users will not be able to adequately
track their resources which again may affect the security
of the resources more so, the data.
2. Minimal network isolation
Isolation is a critical component of the security of
devices connected to worldwide networks. This isolation
facilitates the accountability of resources where
administrators are able to identify and track resources
based on certain predefined parameters. Moreover, the
same tactic also minimizes the intrusion levels when
attacks do occur. However, with IoT, this isolation
element is lost as the defining protocols of IoT require
extensive connections [12]. Furthermore, different
devices having different standards will be used which
will affect the overall security procedures. For instance,
a network and its corresponding devices will have the
necessary security features only to be compromised by a
rudimentary system having substandard security
measures e.g. a smartwatch.
3. User and manufacturer’s ignorance
According to security experts, the end users are
responsible for the highest number of cyber intrusions
owing to their ignorance and negligence. In essence,
they will apply substandard security features in an
attempt to save their overall expenditures [13]. A similar
outcome is experienced by system developers and
manufacturers who will implement substandard security
structures in an attempt to increase the overall revenues.
IV. SOLUTION
In the first vulnerability, IoT’s extensive networks will
facilitate the growth of the security problems facing the
modern networking infrastructures. Therefore, it will be
difficult to track and manage resources online. As a
solution, the technology must implement extensive
security features in the form of encryption and
authentication. These security measures will maintain
the integrity of the resources used more so, the data
which as per the existing infrastructure will be difficult
to manage while in transit. Now, these security features
should thoroughly protect the channels of
communication by providing end to end encryption and
user authentication based on verified access policies
[14].
V. CONCLUSION
IoT is not a new technology but an advancement of the
existing networking infrastructure which aims to
increase the intelligence of the participating devices.
This objective will promote the growth of networking
infrastructure which will increase information
availability and access. However, at the same time, the
extended access will facilitate several limitations and
vulnerabilities because the resource will be difficult to
track. Nevertheless, a wide range of security features can
and will be used to minimize these limitations, among
them being adequate authentication and encryption
standards.
VI. REFERENCES
[1
]
S. Madakam, "Internet of Things: Smart Things,"
International Journal of Future Computer and
Communication, pp. Available:
http://www.ijfcc.org/vol4/395-ICNT2014-2-203.pdf.,
2015.
[2
]
E. Alsaadi and A. Tubaishat, "Internet of Things: Features,
Challenges, and Vulnerabilities," International Journal of
Advanced Computer Science and Information Technology
(IJACSIT), p. Available: , 2015.
[3
]
F. Mattern and C. Floerkemeier, "Fro m the Internet of
Computers to the Internet of Things," Distributed Systems
Group, Institute for Pervasive Computing, ETH Zurich, pp.
Available: http://www.vs.inf.ethz.ch/publ/papers/Internet-
of-things.pdf., 2012.
[4
]
V. Vatsa and G. Singh, "A Literature Review on Internet of
Things (IoT)," International Journal of Computer
Systems , p. Available:
http://www.academia.edu/19560667/A_Literature_Review
_on_Internet_of_Things_IoT_, 2015.
[5
]
J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami,
"Internet of Things (IoT): A Vision, Architectural
Elements, and Future Directions," pp. Available:
http://www.cloudbus.org/papers/Internet-of-Things-
Vision-Future2012.pdf., 2012.
[6
]
S. Madakam, E. Ramaswamy and S. Tripathi, "Internet of
Things (IoT): A Literature review," Journal of Computer
and Communications, p. Available:
https://file.scirp.org/pdf/JCC_2015052516013923.pdf,
2015.
[7
]
K. Rose, S. Eldridge and L. Eldridge, "The Internet of
Things: An Overview," Understanding the Issues and
Challenges of a More Connected World, pp. Available:
https://www.internetsociety.org/sites/default/files/ISOC-
IoT-Overview-20151014_0.pdf., 2015.
[8
]
P. FREMANTLE, "A REFERENCE ARCHITECTURE
FOR THE INTERNET OF THINGS," WSO2, pp.
Available:
http://wso2.com/wso2_resources/wso2_whitepaper_a-
reference-architecture-for-the-internet-of-things.pdf., 2015.
[9
]
A. Castellani, N. Bui, P. Casari, M. Rossi, Z. Shelby and
M. Zorzi, "Architecture and Protocols for the Internet of
Things: A Case Study," p. Available:
https://webofthings.org/wot/2010/pdfs/144.pdf., 2010.
[1
0]
C. Reports, "Reaping the Benefits of the Internet of
Things," Cognizant Reports, pp. Available:
https://www.cognizant.com/InsightsWhitepapers/Reaping-
the-Benefits-of-the-Internet-of-Things.pdf., 2014.
[1
1]
I. society, "The internet of things: overview,"
Understanding the issues and challenges of a more
connected world, pp. Available:
https://www.internetsociety.org/doc/iot-overview, 2015.
[1
2]
Ericsson, "IoT SECURITY," ericsson White paper, pp.
Available:
https://www.ericsson.com/assets/local/publications/white-
papers/wp-iot-security-february-2017.pdf., 2017.
[1
3]
M. Rimavicius, "Literature Review of the Internet of
Things: Anticipating Tomorrow’s Challenges for Privacy
and Security," pp. Available:
https://sever.wustl.edu/degreeprograms/cyber-security-
management/SiteAssets/Lit%20Review%20of%20IoT
%20for%20Privacy%20and%20Security.pdf., 2015.
[1
4]
V. Sharma and R. Tiwari, "A review paper on “IOT” &
It‟s Smart Applications," International Journal of Science,
Engineering and Technology Research (IJSETR), pp.
Available:
http://ijsetr.org/wp-content/uploads/2016/02/IJSETR-
VOL-5-ISSUE-2-472-476.pdf., 2016.
[1
5]
F. Chen, P. Deng, J. Z. D. Wan, A. Vasilakos and X. Rong,
"Data Mining for the Internet of Things: Literature Review
and Challenges," International Journal of Distributed
Sensor Networks, p. Available:
http://downloads.hindawi.com/journals/ijdsn/2015/431047.
pdf., 2015.
[1
6]
MIT, "The Internet of Things," MIT technology review, pp.
Available: https://www.technologyreview.com/business-
report/the-internet-of-things/. , 2017.
]
P. FREMANTLE, "A REFERENCE ARCHITECTURE
FOR THE INTERNET OF THINGS," WSO2, pp.
Available:
http://wso2.com/wso2_resources/wso2_whitepaper_a-
reference-architecture-for-the-internet-of-things.pdf., 2015.
[9
]
A. Castellani, N. Bui, P. Casari, M. Rossi, Z. Shelby and
M. Zorzi, "Architecture and Protocols for the Internet of
Things: A Case Study," p. Available:
https://webofthings.org/wot/2010/pdfs/144.pdf., 2010.
[1
0]
C. Reports, "Reaping the Benefits of the Internet of
Things," Cognizant Reports, pp. Available:
https://www.cognizant.com/InsightsWhitepapers/Reaping-
the-Benefits-of-the-Internet-of-Things.pdf., 2014.
[1
1]
I. society, "The internet of things: overview,"
Understanding the issues and challenges of a more
connected world, pp. Available:
https://www.internetsociety.org/doc/iot-overview, 2015.
[1
2]
Ericsson, "IoT SECURITY," ericsson White paper, pp.
Available:
https://www.ericsson.com/assets/local/publications/white-
papers/wp-iot-security-february-2017.pdf., 2017.
[1
3]
M. Rimavicius, "Literature Review of the Internet of
Things: Anticipating Tomorrow’s Challenges for Privacy
and Security," pp. Available:
https://sever.wustl.edu/degreeprograms/cyber-security-
management/SiteAssets/Lit%20Review%20of%20IoT
%20for%20Privacy%20and%20Security.pdf., 2015.
[1
4]
V. Sharma and R. Tiwari, "A review paper on “IOT” &
It‟s Smart Applications," International Journal of Science,
Engineering and Technology Research (IJSETR), pp.
Available:
http://ijsetr.org/wp-content/uploads/2016/02/IJSETR-
VOL-5-ISSUE-2-472-476.pdf., 2016.
[1
5]
F. Chen, P. Deng, J. Z. D. Wan, A. Vasilakos and X. Rong,
"Data Mining for the Internet of Things: Literature Review
and Challenges," International Journal of Distributed
Sensor Networks, p. Available:
http://downloads.hindawi.com/journals/ijdsn/2015/431047.
pdf., 2015.
[1
6]
MIT, "The Internet of Things," MIT technology review, pp.
Available: https://www.technologyreview.com/business-
report/the-internet-of-things/. , 2017.
1 out of 4
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.