IoT Applications and Services - PDF

Added on -2020-02-18

| 8 pages| 2649 words| 134 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 3 of 8 pages

AnnotatedBibliographyInternet of Things
Annotated BibliographyAbomhara, M., & Koien, G. (2015). Cyber Security and the Internet of Things: Vulnerabilities,Threats, Intruders and Attacks. Retrieved 6 September 2017, fromhttps://www.riverpublishers.com/journal/journal_articles/RP_Journal_2245-1439_414.pdfThe success of IoT applications and services is unquestionable. However, with the expansion ofthese services, there is also an increase in the security threats and attacks that has been witnessed.Abomhara and Koien have explained the vulnerabilities, threats, intruders and attacks inassociation with the IoT applications. They have made use of the research methodology asqualitative research and have made good use of the references comprising of research papers,journal articles and online libraries. Devices, resources, entities and services are the fourcomponents that are primarily involved in an IoT model. There are hardware vulnerabilities thatare present in the IoT applications due to compatibility and interoperatibility of the hardwarecomponents. There are also software vulnerabilities that are present in terms of the operatingsystem and application software due to design flaws, technical issues and likewise. There arestructured and unstructured threats that are associated with the IoT applications. Some of thecommon attacks associated with IoT include physical attacks, reconnaissance attacks, denial ofservice and access attacks along with the attacks on privacy. These attacks can be deliberate oraccidental in nature depending upon the intruder that is involved. It is necessary to attain privacyand security goals by maintaining information properties, such as, confidentiality, integrity,accountability and availability. The authors could have also used tables for explaining the detailsof the threats and their corresponding countermeasures. Barcena, M., & Wueest, C. (2015). Insecurity in the Internet of Things. Retrieved 6 September2017,fromhttps://www.symantec.com/content/dam/symantec/docs/white-papers/insecurity-in-the-internet-of-things-en.pdfInternet of Things (IoT) is a technology that has provided the users with many advantages andcapabilities. However, there are certain challenges that the users face in association with the IoTapplications and one such area is the security of IoT. There are various security challenges thathave emerged with the expansion of IoT. Barcena and Wueest have covered these issues. Theprimary attack agents and surfaces that are used by the attackers for execution include the2
Annotated Bibliographyphysical access, local access using the networks, cloud infrastructure and malware. The authorshave listed many of the mitigation steps that may be used, such as, use of stronger passwords,installation of security updates, use of separate home networks, analysis of the IoT vendor andlikewise. The IoT technologies that are used shall also be upgraded to their latest versions for theprevention and avoidance of the attacks. The authors have made use of qualitative researchmethodology and have used numerous data sources for information gathering. They could havealso included the references from the real-life case studies for strengthening their work. Buyya, R., & Dastjerdi, A. (2016). Internet of Things: Principles and Paradigms. Retrieved 6September 2017, from http://www.buyya.com/papers/IoT-Book2016-C1.pdfRajkumar Buyya and Amir Vahid Dastjerdi have penned down a book on the principles andparadigms that are associated with IoT. The book is divided in five parts that talk about IoTEcosystem Concepts and Architectures, IoT Enablers and Solutions, IoT Data and KnowledgeManagement, IoT reliability, Security and Privacy and IoT Applications. There are seventeenchapters present in the book with several sections and sub-sections. The authors have attemptedto cover details of every component that is associated with IoT and have made use of actionresearch, grounded theory and observation as their primary methods of research. The use ofdiagrams and graphics could have been enhanced in the book that has been written. Chase, J. (2013). The Evolution of the Internet of Things. Retrieved 6 September 2017, fromhttp://www.ti.com/lit/ml/swrb028/swrb028.pdfIoT is a concept that has expanded itself rapidly and it has allowed the development of a networkof things that can be sensed, controlled and programmed. There is a great use of embeddedtechnology in the IoT applications that has been explained by the author of the white paper, JimChase. There are still several enhancements that can be done in this area that distinguishes theIoT of today from the IoT of tomorrow. There are certain attributes and parameters that arerequired to be paid attention to so that IoT applications can be correctly designed, developed anddeployed. The same have come up as major challenges in association with IoT such asconnectivity issues, security issues, complexity issues, power management, and rapid evolution.The author could have also talked about the compatibility and privacy concerns that areassociated with IoT. 3

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this