logo

The Internet of Thin Films: Research Limitation, Future Scope and Conclusion

   

Added on  2023-04-24

42 Pages10071 Words480 Views
Project Dissertation

Contents
Chapter 1: Introduction:.............................................................................................................2
Research purpose:...................................................................................................................2
Research Aim:........................................................................................................................3
Research Objectives:..............................................................................................................3
Research Questions:...............................................................................................................3
Research Strategy:..................................................................................................................3
Significance of Study:............................................................................................................3
Thesis Structure......................................................................................................................4
Chapter 2: Literature Review.....................................................................................................5
Chapter 3: Research Methodology...........................................................................................13
Chapter 4: Research Analysis and approach............................................................................17
Chapter 5: Proposed Solution...................................................................................................23
Chapter 6: Result and Findings................................................................................................31
Chapter 7: Research Limitation, Future Scope and Conclusion..............................................36
References:...............................................................................................................................38

Chapter 1: Introduction:
The internet of things is the most promising and emerging technology which requires high
parameters of security to get accuracy in completing the flow of work done. The IOT
framework is plug-in with the various security challenges such as security associated with the
constrained devices, authorization and authentication of the system, managing updating
features to the devices, ensuring privacy and data integration, mobility of the cloud
applications, ensuring high availability of data and information, detecting cyber securities
attack, identifying and managing vulnerabilities, and prediction of the security issues (Gondi,
and et.al., 2016). The focus should be given on identifying the attacks associated with the
transport layer and socket layer so that the vulnerabilities can be handled at an early stage and
the proactive action plan can be prepared against the vulnerabilities. The transport layer
security requires the privacy between the two communicating devices and applications. The
security protocol should be developed for managing the transfer of files, virtual private
network connections, sending of instant messages to the communicating devices, and
managing the voice over Internet protocol. The handshaking protocol is used for
acknowledging the retrieval of secured information and data packets in the sequence sent by
the server (Hezam, Konstantas, Mahyoub, 2018). The message authentication codes are
added to the messages so that the sensitivity and confidentiality of the information can be
secured and failure of IOT communication can be minimized. Data integration helps in
providing security to the web applications by managing transfer of files by developing virtual
private network connections. The instant messaging system can be accelerated by developing
the two layer communication. TLS is made up of two protocols which are named as
Handshake protocol and record protocol (Siddiqui, and Badr, 2018). The authorization and
authentication is managed with the help of these protocols between the sender and receiver.
The TLS security architecture is composed of implementation obscure. The focus should be
given on developing the strong security protocol for the transport layer so that the accuracy in
the information flow can be managed for the effective working of the IOT infrastructure.
Research purpose:
The purpose of this paper is to develop a research program on identifying the problems and
issues which exist in the transport layer security and to propose a solution which is effective
for managing the TLS security in the IOT environment.

Research Aim:
The aim of the research is to identify the different types of cyber-attacks which negatively
affect the transport layer security and functioning of the IOT architecture and propose a
solution which helps in securing and maintaining accuracy of the IOT working environment.
Research Objectives:
The objectives of the research are highlighted below:
Identify the different types of cyber-attacks which negatively affect the transport layer
security
Identify the impact of TLS attack on the IOT architecture
Study of the literature for getting details of TLS attacks
Proposing a solution which helps in securing and maintaining accuracy of the IOT
working environment
Research Questions:
What type of TLS attacks occur which negatively affect the IOT architecture? How the TLS
attacks can be minimized for developing highly secured architecture to preserve the accuracy
of the IOT environment?
Research Strategy:
The focus should be given on constructing the research questions for giving particular
direction to the research study. The study of literature is carried out to identify the problems
and research gaps so that effective solution can be proposed according to the requirement of
the TLS security in IOT environment. The solution should be proposed for managing the
security in the transport layer of the IOT infrastructure against the vulnerabilities. The
conclusion should be drawn from the research to identify the major challenges in the IOT
environment and efficacy of the proposed model.
Significance of Study:
The research study helps in evaluating the impact and the major challenges which the IOT
architecture has to be faced due to the cyber-attacks on the transport layer. The efficiency of
the Transport layer security can be measured with respect to the negative impact seen on the
IOT working environment (Mendez, and et.al., 2015). During the study, it has been identified
that the smart sensor environment is cope up with various challenges such as ineffective
security parameters associated with the smart devices, giving authority and authentication to

the network devices for message transfers, updating the devices according to the security
requirement, not secured communication and information flow between the sender and the
receiver, unavailability of the devices, ineffective detection of the vulnerabilities, no
proactive program for detecting the presence of intruder, and many more. The analysis of the
cyber-attacks and their impact of the IOT working program help in developing an effective
solution for securing the flow of information between the smart devices.
Thesis Structure
The first chapter focuses on the introduction to the transport layer security and IOT
infrastructure. The second chapter reviews the literature in the direction of transport layer
security with respect to the IOT infrastructure. The chapter 3 gives the details of research
methodology which should be undertaken to identify the cyber-attack on the TLS. The
discussion of the research analysis is carried out in the chapter 4. The proposed solution
should be provided to resolve the vulnerabilities associated with the TLS in chapter 6. The
result and future scope of the research program should be brief in chapter 7. The conclusion
of the research program is given in the last chapter 8 of the research study.
Chapter 2: Literature Review
The security is the major concern for managing communication between the sensor devices in
the IOT network because the whole system works on accuracy and flow of data packets
within the fraction of seconds. Industry 4.0 is the new revolution in the IOT framework
which is also called as fourth industrial revolution for building communication links in the

IOT infrastructure. Cyber physical system can be developed with the use of IOT for
controlling the intelligence and integrating it with the physical world (Corser, 2017). The
diagram below shows the connection between the physical and virtual world through the IOT
infrastructure:
The IOT services are used for developing the communication protocols to build interaction of
the machines with the human (Iqbal, Olaleye, and Bayoumi, 2016). The diagram below
shows the IOT service implementation in Industry 4.0

In IOT infrastructure, the physical objects are known as smart objects because they are placed
with the sensor devices for having intelligence. It helps in managing the real time
communication and creating the virtual environment for the physical devices. The automation
and intelligence in the physical devices brings the industrial revolution which is called as
industry 4.0. The cyber-physical system (CPS) can be developed with the integration between
the smart devices which relatively helps in developing the smart factory. The presence of
vulnerabilities is the major concern for the CPS environment. The sensor devices are used for
developing connection between the physical world and virtual world. The deep security
credentials should be used for overcoming the problems of cyber-attack and failure of the
IOT environment. Transport layer security is the main area of implementing security
parameter because the handling of the applications is done through the TLS layer.
Transport layer Security TLS:
The designing of the transport layer protocol depends on the secure socket layer protocol
used in preserving the data and information stored in the application. The POODLE attack is
the major attack which affects the functioning of the Secure socket layer (SSL)/TLS in the
IOT environment. The POODLE attack is equipped with the cipher block chaining

encryption methodology which can affect the accuracy of the data and information stored in
the SSL layer. The working of the TLS layer is comprised of three steps which are named as
deployment of the key exchange algorithm, managing cipher text, and developing
authentication code for the message. The POODLE attack results in disturbing the managing
the interoperations and compatibility. The block padding results in defining the handshaking
protocol. The man-in-the middle attack occurred in defining the vulnerability in sending the
connection between the sender and destination. The data is transferred between the layers in
the encrypted format. Public private key pair is created for the exchange of information for
encrypting the data (Alfaqih, and Muhtadi, 2016). The TLS_Method are used for managing
the connections between the devices. Unencrypted socket are created for loading the private
key to manage the call for certification. Communication channels are the major concern area
for the attack surface. The access control policies should be developed for managing the
vulnerabilities at the IOT attack surface. The data should be detected at high risks. The
authorization and authentication protocol should be checked for minimizing the data
leakages. The defence mechanism should be developed as follows:
Development of the administrative interface: The attack vectors are analysed with
respect to the malicious activities. The network server helps in managing the web
interface for the transfer of file from client to destination.
Interface of the devices: Managing vulnerabilities to develop the interface for the
credential management of the devices
Web interface for the cloud devices: The transport encryption policies should be
developed by applying the two factor authentication algorithm. The ineffective
encryption policies will result in the entrance of the vulnerabilities and cyber-attacks.
Development of the mobile applications: The low cyber securities parameters may be
broken down by the denial of service attacks and other cyber-attacks which can
directly affect the application program (Gomez, Moret, Crowcroft, 2015).
Network facilities and services: The service management program should be
developed for managing the denial of service attack, man in the middle attack, buffer
overflow, malfunctioning of the computer program, and others.
TLS Vulnerabilities and attacks:
The transport layer security of the IOT infrastructure is comprised of various vulnerabilities
which should be integrated in a specified format. The information of the IOT infrastructure is

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Securing IOT and Cyber-Physical Environment
|7
|1570
|298

Internet of Things: Privacy Issues and Contents
|9
|1402
|116

IoT Threats to Database Security
|5
|1145
|364

Ethical Hacking in IoT Enabled Protocols
|6
|908
|90

SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427

Internet of Things (IoT) Security
|10
|873
|56