logo

IoT Applications and Services - PDF

8 Pages2649 Words134 Views
   

Added on  2020-02-18

IoT Applications and Services - PDF

   Added on 2020-02-18

ShareRelated Documents
AnnotatedBibliographyInternet of Things
IoT Applications and Services - PDF_1
Annotated BibliographyAbomhara, M., & Koien, G. (2015). Cyber Security and the Internet of Things: Vulnerabilities,Threats, Intruders and Attacks. Retrieved 6 September 2017, fromhttps://www.riverpublishers.com/journal/journal_articles/RP_Journal_2245-1439_414.pdfThe success of IoT applications and services is unquestionable. However, with the expansion ofthese services, there is also an increase in the security threats and attacks that has been witnessed.Abomhara and Koien have explained the vulnerabilities, threats, intruders and attacks inassociation with the IoT applications. They have made use of the research methodology asqualitative research and have made good use of the references comprising of research papers,journal articles and online libraries. Devices, resources, entities and services are the fourcomponents that are primarily involved in an IoT model. There are hardware vulnerabilities thatare present in the IoT applications due to compatibility and interoperatibility of the hardwarecomponents. There are also software vulnerabilities that are present in terms of the operatingsystem and application software due to design flaws, technical issues and likewise. There arestructured and unstructured threats that are associated with the IoT applications. Some of thecommon attacks associated with IoT include physical attacks, reconnaissance attacks, denial ofservice and access attacks along with the attacks on privacy. These attacks can be deliberate oraccidental in nature depending upon the intruder that is involved. It is necessary to attain privacyand security goals by maintaining information properties, such as, confidentiality, integrity,accountability and availability. The authors could have also used tables for explaining the detailsof the threats and their corresponding countermeasures. Barcena, M., & Wueest, C. (2015). Insecurity in the Internet of Things. Retrieved 6 September2017,fromhttps://www.symantec.com/content/dam/symantec/docs/white-papers/insecurity-in-the-internet-of-things-en.pdfInternet of Things (IoT) is a technology that has provided the users with many advantages andcapabilities. However, there are certain challenges that the users face in association with the IoTapplications and one such area is the security of IoT. There are various security challenges thathave emerged with the expansion of IoT. Barcena and Wueest have covered these issues. Theprimary attack agents and surfaces that are used by the attackers for execution include the2
IoT Applications and Services - PDF_2
Annotated Bibliographyphysical access, local access using the networks, cloud infrastructure and malware. The authorshave listed many of the mitigation steps that may be used, such as, use of stronger passwords,installation of security updates, use of separate home networks, analysis of the IoT vendor andlikewise. The IoT technologies that are used shall also be upgraded to their latest versions for theprevention and avoidance of the attacks. The authors have made use of qualitative researchmethodology and have used numerous data sources for information gathering. They could havealso included the references from the real-life case studies for strengthening their work. Buyya, R., & Dastjerdi, A. (2016). Internet of Things: Principles and Paradigms. Retrieved 6September 2017, from http://www.buyya.com/papers/IoT-Book2016-C1.pdfRajkumar Buyya and Amir Vahid Dastjerdi have penned down a book on the principles andparadigms that are associated with IoT. The book is divided in five parts that talk about IoTEcosystem Concepts and Architectures, IoT Enablers and Solutions, IoT Data and KnowledgeManagement, IoT reliability, Security and Privacy and IoT Applications. There are seventeenchapters present in the book with several sections and sub-sections. The authors have attemptedto cover details of every component that is associated with IoT and have made use of actionresearch, grounded theory and observation as their primary methods of research. The use ofdiagrams and graphics could have been enhanced in the book that has been written. Chase, J. (2013). The Evolution of the Internet of Things. Retrieved 6 September 2017, fromhttp://www.ti.com/lit/ml/swrb028/swrb028.pdfIoT is a concept that has expanded itself rapidly and it has allowed the development of a networkof things that can be sensed, controlled and programmed. There is a great use of embeddedtechnology in the IoT applications that has been explained by the author of the white paper, JimChase. There are still several enhancements that can be done in this area that distinguishes theIoT of today from the IoT of tomorrow. There are certain attributes and parameters that arerequired to be paid attention to so that IoT applications can be correctly designed, developed anddeployed. The same have come up as major challenges in association with IoT such asconnectivity issues, security issues, complexity issues, power management, and rapid evolution.The author could have also talked about the compatibility and privacy concerns that areassociated with IoT. 3
IoT Applications and Services - PDF_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Emerging Threats and Counter Measurements
|4
|866
|38

(Doc) Assignment on IT Privacy
|13
|3299
|24

Threats, Attacks and Malware in IT Security - Desklib
|12
|1198
|192

Internet, Mobile, Email and Cloud Security Threats and Strategies
|7
|2434
|409

Internet of Things (IOT) - Assignment
|10
|1770
|76

Internet of Things (IoT) and ICT Assignment
|10
|1778
|230