Report on Security Challenges in Emerging Networks of IoT Systems
VerifiedAdded on  2019/10/30
|5
|1366
|259
Report
AI Summary
This report provides a comprehensive overview of the security challenges in the Internet of Things (IoT). It begins by defining IoT and its core concept of interconnected physical objects, emphasizing their data collection and transfer capabilities. The report then explores the existing literature on IoT, highlighting the benefits of connectivity, such as improved efficiency and safety, while also acknowledging the increasing volume of data captured. The critical analysis section identifies three key security challenges: the increasing number of connected devices, the issue of device updates, and the protection of data from corporations. The report suggests a possible solution centered on consumer awareness and proactive measures like reviewing terms and conditions and understanding corporate data policies. Finally, the conclusion underscores the differences between IoT and traditional internet networks, particularly the use of low-power networks and the associated security complexities. It emphasizes the need for robust security, privacy, and policy measures to protect consumers in the evolving IoT landscape.

RUNNING HEAD: SECURITY CHALLENGES IN EMERGING NETWORKS 1
SECURITY CHALLENGES IN EMERGING NETWORKS
Student Name
Institute Name
SECURITY CHALLENGES IN EMERGING NETWORKS
Student Name
Institute Name
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

SECURITY CHALLENGES IN EMERGING NETWORKS
2
Contents
Introduction.................................................................................................................................................2
Literature review.........................................................................................................................................2
Critical analysis............................................................................................................................................3
Possible solution..........................................................................................................................................3
Conclusion...................................................................................................................................................3
Reference....................................................................................................................................................4
2
Contents
Introduction.................................................................................................................................................2
Literature review.........................................................................................................................................2
Critical analysis............................................................................................................................................3
Possible solution..........................................................................................................................................3
Conclusion...................................................................................................................................................3
Reference....................................................................................................................................................4

SECURITY CHALLENGES IN EMERGING NETWORKS
3
Introduction
The report will discuss in detail about Internet of things which is also called as IoT. The concept of IoT
can be defined as an ecosystem that can be very well connected with number of physical based objects
that are easily accessible with the help of Internet. The main thing related to IoT can be an individual
who has a heart monitor or may be a vehicle with sensors which mean that different set of objects are
assigned with a different kind of IP address and have the presence that has the power to collect as well
as transfer the data over a network with or without any manual help or interference [1]. There are
number of embedded based technologies which are also part of objects that helps the element to
communicate well with the internal states or external state.
Literature review
Internet of Things can connect number of devices that are properly embedded in so many systems for
the Internet. There are devices or objects that can also show themselves on various digital platforms and
can further be controlled from any place [8]. The overall connectivity also helps in capturing more data
from diverse places and it further makes sure that there are ways to raise the level of efficiency as well
as also improve the safety along with IoT security. The process of IoT is a big change and the force helps
the organizations to improve the level of performance with the help of analytics of IoT as well as IoT
security to provide desired outcomes [2]. The organization when functions with diverse utilities or other
sectors like oil and gas based insurance, production, and infrastructure and retail that further helps in
the reaping the advantages of IoT. It helps in making a more informed and well-calculated decision
which is later aided by different torrents of transactional data at the disposal of people [7].
The platform of IoT can also assist the company in reducing the overall cost with the help of improved
efficiency based process along with utilization of asset and high productivity. There are number of
improved level in tracking the device and usage of sensors as well as connectivity. This is beneficial from
real time-based thought process and analysis [9]. It will help the companies to take better decisions and
the development of data, procedure and varied things on the internet will help in making ideal
connections which are more crucial and significant by developing more options for people, industries
and businesses [4].
Critical analysis
3
Introduction
The report will discuss in detail about Internet of things which is also called as IoT. The concept of IoT
can be defined as an ecosystem that can be very well connected with number of physical based objects
that are easily accessible with the help of Internet. The main thing related to IoT can be an individual
who has a heart monitor or may be a vehicle with sensors which mean that different set of objects are
assigned with a different kind of IP address and have the presence that has the power to collect as well
as transfer the data over a network with or without any manual help or interference [1]. There are
number of embedded based technologies which are also part of objects that helps the element to
communicate well with the internal states or external state.
Literature review
Internet of Things can connect number of devices that are properly embedded in so many systems for
the Internet. There are devices or objects that can also show themselves on various digital platforms and
can further be controlled from any place [8]. The overall connectivity also helps in capturing more data
from diverse places and it further makes sure that there are ways to raise the level of efficiency as well
as also improve the safety along with IoT security. The process of IoT is a big change and the force helps
the organizations to improve the level of performance with the help of analytics of IoT as well as IoT
security to provide desired outcomes [2]. The organization when functions with diverse utilities or other
sectors like oil and gas based insurance, production, and infrastructure and retail that further helps in
the reaping the advantages of IoT. It helps in making a more informed and well-calculated decision
which is later aided by different torrents of transactional data at the disposal of people [7].
The platform of IoT can also assist the company in reducing the overall cost with the help of improved
efficiency based process along with utilization of asset and high productivity. There are number of
improved level in tracking the device and usage of sensors as well as connectivity. This is beneficial from
real time-based thought process and analysis [9]. It will help the companies to take better decisions and
the development of data, procedure and varied things on the internet will help in making ideal
connections which are more crucial and significant by developing more options for people, industries
and businesses [4].
Critical analysis
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

SECURITY CHALLENGES IN EMERGING NETWORKS
4
Following are three security challenges faced by IoT: -
1. Increase in number of devices increase the problem: the basic drawback of IoT is that it raises
the number of devices which goes behind the network firewall. Next ten years, many people had
to just worry about saving the computer. But in the current time organizations must worry
about saving different devices like car, home appliances and many more [3].
2. Updates: the IoT become real when people start worrying about saw the need to save devices.
But even when one start taking the process of security in serious manner, the technology based
organizations will make new devices becomes casual about the risks. Another thing is that
companies do not update the devices at all which can lead to an issue since IoT device was
installed with a motive to safe the device but later it become unsafe from hackers [5]
3. Saving the data from corporations: The hackers are nightmare for the company since they are
very far from just one threat for the IoT. It is obvious that the company may create as well as
distribute many interconnected machines that can also be used as devices to get personal
information specifically incorrect when used as money transfer [3].
Possible solution
In case of any kind of ignorance from the customer’s side, the important question here is that what
corporations will do with the data that they gather through IoT since there is high chance of misusing
the data for personal use. For example, there are companies like RadioShack that have even attempted
to sell the data that the company gathered to another corporation. This obviously raises the challenges
associated with privacy right of a human being [5].
The best way to deal with this problem is when consumers become more cautious and read about all
the terms and conditions of the agreement before signing while receiving a device. It is also important to
find about the policies of the corporations which is in fact regarding keeping the data safe as well as
sharing the data. This can mean that one must refuse to the usage of specific IoT devices and however
said device may not have enough worth to tradeoff it with an individual privacy [6].
Conclusion
In the end, the ultimate distinction between IoT and the standard or traditional internet is the way in
which the network can be deployed. It is important to understand here that IoT utilizes a low-power
4
Following are three security challenges faced by IoT: -
1. Increase in number of devices increase the problem: the basic drawback of IoT is that it raises
the number of devices which goes behind the network firewall. Next ten years, many people had
to just worry about saving the computer. But in the current time organizations must worry
about saving different devices like car, home appliances and many more [3].
2. Updates: the IoT become real when people start worrying about saw the need to save devices.
But even when one start taking the process of security in serious manner, the technology based
organizations will make new devices becomes casual about the risks. Another thing is that
companies do not update the devices at all which can lead to an issue since IoT device was
installed with a motive to safe the device but later it become unsafe from hackers [5]
3. Saving the data from corporations: The hackers are nightmare for the company since they are
very far from just one threat for the IoT. It is obvious that the company may create as well as
distribute many interconnected machines that can also be used as devices to get personal
information specifically incorrect when used as money transfer [3].
Possible solution
In case of any kind of ignorance from the customer’s side, the important question here is that what
corporations will do with the data that they gather through IoT since there is high chance of misusing
the data for personal use. For example, there are companies like RadioShack that have even attempted
to sell the data that the company gathered to another corporation. This obviously raises the challenges
associated with privacy right of a human being [5].
The best way to deal with this problem is when consumers become more cautious and read about all
the terms and conditions of the agreement before signing while receiving a device. It is also important to
find about the policies of the corporations which is in fact regarding keeping the data safe as well as
sharing the data. This can mean that one must refuse to the usage of specific IoT devices and however
said device may not have enough worth to tradeoff it with an individual privacy [6].
Conclusion
In the end, the ultimate distinction between IoT and the standard or traditional internet is the way in
which the network can be deployed. It is important to understand here that IoT utilizes a low-power
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

SECURITY CHALLENGES IN EMERGING NETWORKS
5
based network which raises complex issues in security by adding extra constraints as well as energy.
There is number of protocols like ROLL which aims to save the lower layer from different attacks as well
as also saving the resources [7]. The concept of IoT is set to transform the world in future but issues of
security, privacy and policy must keep up to save the consumers.
Reference
[1.] Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
pp.1645-1660.
[2.] Miorandi, D., Sicari, S., De Pellegrini, F. and Chlamtac, I., 2012. Internet of things: Vision,
applications and research challenges. Ad Hoc Networks, 10(7), pp.1497-1516.
[3.] Xia, F., Yang, L.T., Wang, L. and Vinel, A., 2012. Internet of things. International Journal of
Communication Systems, 25(9), p.1101.
[4.] Kopetz, H., 2011. Internet of things. In Real-time systems (pp. 307-323). Springer US.
[5.] Lee, G.M., Crespi, N., Choi, J.K. and Boussard, M., 2013. Internet of things. In Evolution of
Telecommunication Services (pp. 257-282). Springer Berlin Heidelberg.
[6.] Zanella, A., Bui, N., Castellani, A., Vangelista, L. and Zorzi, M., 2014. Internet of things for smart
cities. IEEE Internet of Things journal, 1(1), pp.22-32.
[7.] Da Xu, L., He, W. and Li, S., 2014. Internet of things in industries: A survey. IEEE Transactions on
industrial informatics, 10(4), pp.2233-2243.
[8.] Cui, X., 2016. The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-68).
Palgrave Macmillan, London.
[9.] Bonomi, F., Milito, R., Zhu, J. and Addepalli, S., 2012, August. Fog computing and its role in the
internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud
computing (pp. 13-16). ACM.
5
based network which raises complex issues in security by adding extra constraints as well as energy.
There is number of protocols like ROLL which aims to save the lower layer from different attacks as well
as also saving the resources [7]. The concept of IoT is set to transform the world in future but issues of
security, privacy and policy must keep up to save the consumers.
Reference
[1.] Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision,
architectural elements, and future directions. Future generation computer systems, 29(7),
pp.1645-1660.
[2.] Miorandi, D., Sicari, S., De Pellegrini, F. and Chlamtac, I., 2012. Internet of things: Vision,
applications and research challenges. Ad Hoc Networks, 10(7), pp.1497-1516.
[3.] Xia, F., Yang, L.T., Wang, L. and Vinel, A., 2012. Internet of things. International Journal of
Communication Systems, 25(9), p.1101.
[4.] Kopetz, H., 2011. Internet of things. In Real-time systems (pp. 307-323). Springer US.
[5.] Lee, G.M., Crespi, N., Choi, J.K. and Boussard, M., 2013. Internet of things. In Evolution of
Telecommunication Services (pp. 257-282). Springer Berlin Heidelberg.
[6.] Zanella, A., Bui, N., Castellani, A., Vangelista, L. and Zorzi, M., 2014. Internet of things for smart
cities. IEEE Internet of Things journal, 1(1), pp.22-32.
[7.] Da Xu, L., He, W. and Li, S., 2014. Internet of things in industries: A survey. IEEE Transactions on
industrial informatics, 10(4), pp.2233-2243.
[8.] Cui, X., 2016. The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-68).
Palgrave Macmillan, London.
[9.] Bonomi, F., Milito, R., Zhu, J. and Addepalli, S., 2012, August. Fog computing and its role in the
internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud
computing (pp. 13-16). ACM.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.