Overview of Network Security: Security Challenges in Emerging Networks

Verified

Added on  2023/06/11

|7
|2286
|160
Report
AI Summary
This report provides a comprehensive overview of security challenges in emerging networks, particularly focusing on the Internet of Things (IoT). It begins with a literature review of IoT, defining it as a network of interconnected physical devices capable of exchanging data. The report contrasts IoT with traditional networks, highlighting differences in content creation, consumption, and value. It then explores three application areas of IoT: smart homes, wearables, and smart cities. The core of the report identifies and analyzes three critical security issues in IoT: lack of data encryption, lack of data authentication, and security-side-channel attacks. For each issue, the report proposes countermeasures and mitigation techniques, such as using SSL protocols for encryption, implementing firewalls and antivirus software for authorization, and developing robust IoT security strategies. The report concludes by emphasizing the importance of addressing these security challenges to ensure the safe and effective deployment of IoT technologies.
Document Page
Running head: SECURITY CHALLENGES IN EMERGING NETWORKS
Security Challenges in Emerging Networks
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
SECURITY CHALLENGES IN EMERGING NETWORKS
Table of Contents
Introduction...........................................................................................................................................2
Discussion..............................................................................................................................................2
1. Literature review of Internet of Things (IoT)..................................................................................2
2. Three current or future security issues in IoT and its countermeasures........................................4
Conclusion.............................................................................................................................................5
References.............................................................................................................................................6
Document Page
2
SECURITY CHALLENGES IN EMERGING NETWORKS
Introduction
The Internet of things or IoT can be defined as the network of various physical devices, home
appliances, vehicles and many more, which enables these objects to connect as well as
exchange confidential data [3]. Everything could be uniquely recognized with the help of the
embedded computing system however has the ability in inter-operating within
the Internet infrastructure that previously exists. This IoT or Internet of Things is responsible for
allowing various objects that are to be sensed as well as controlled properly in the existing
infrastructure of network. This helps to create opportunities for all the direct integration of various
physical world with the several computer based systems. This eventually results in improvised
accuracy, efficiency as well as economic benefits [11]. Thus, the human intervention is properly
reduced and minimized to a greater extent. This Internet of Things could be easily augmented with
the several sensors and actuators and hence all the technologies are eventually encompassed.
The following report will be outlining a brief discussion on the concept of Internet of Things
or IoT and the various security challenges. The report will be divided into two parts. The first part is
the literature review of Internet of Things. This part describes about IoT, Characteristics of IoT
compared to the traditional network and three distinct areas of applications for Internet of Things.
The second part of the report focuses on the three current or future security issues in IoT and its
countermeasures.
Discussion
1. Literature review of Internet of Things (IoT)
i) Introduction to IoT: The Internet of things is the basic system of various interrelated
computing devices, digital machines, mechanical machines, people as well as animals, which are
given for uniquely identifying anyone and also comprise of the ability for transferring data on the
network without the need of human to computer or human to human interactions [8]. This IoT has
evolved from the proper convergence of several wireless technologies, Internet, micro services,
MEMS or micro electromechanical systems and many more. This convergence is helpful for tearing
down all the silo walls within the OT or operational technology as well as IT or information
technology. These allow unstructured machine generated data that is to be analyzed for the insights
for driving improvements.
ii) Characteristics of IoT compared to the traditional network: There are some of the major
benefits or characteristics of Internet of Things over the traditional networks [1]. The first and the
Document Page
3
SECURITY CHALLENGES IN EMERGING NETWORKS
foremost difference between the IoT and traditional Internet is the identification of this content
creation. There are various other important differences as well. For example, content within the
traditional Internet is being consumed as per request [7]. This means the user has to ask any query,
send any request or issue any search for the web services for the purpose of consuming the content.
On the other hand, within the Internet of Things, this content could be eventually consumed by
pushing this technology as the notification of an activity when the situation of interest could be
detected. In most of the cases, this consumption refers to the combination of data from the various
sources. This particular characteristic also occurs for traditional networks. Within the traditional
network, this connection is done with the help of various physical links within the web pages. Within
IoT, this amalgamation of data could be needed for detecting any situation. This could be easily
manifested with the combination of data within the structure of event patterns that are context-
based where all the data has the ability in determining the context as well as the pattern [10]. There
is a difference within the consumer value. For the traditional network, this value helps to answer a
question, which could be posed by consumer while searching for data or services. For the IoT, this
value is the timely notification or action based on the situations that could be detected.
Key Factors Traditional Network Internet of Things or IoT
1. Who is creating content? Human beings Machine
2. How is this content being
consumed?
As per request This is done by pushing
information as well as
triggering actions [4].
3. How is this content being
combined?
By explicitly defined links By explicitly defined operators
4. What is the value? By answering questions Action as well as timely
information.
iii) Three areas of applications for IoT: The three areas of applications for IoT are Smart
home, wearables and smart city.
Smart Home: Smart Home is the most significant application of IoT. This smart home
eventually controls climate, appliances and entertainment systems. It is responsible for producing
safer house environments [12]. When this is connected to the Internet connectivity, all the home
devices become the major part of IoT or Internet of Things. The user interface that is utilized for
system control utilizes the wall mounted terminals, desktops or tablets. It is the mobile application
that is utilized for safety purposes.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
SECURITY CHALLENGES IN EMERGING NETWORKS
Wearables: Wearable technology or wearables are several smart electronic devices, which
are worn over the body as accessories or implants. All the wearable devices like activity trackers are
the proper applications of Internet of Things that are extremely popular in today’s world [6]. The
sensors effectively enable the objects for exchanging data through Internet and not involving human
intervention.
Smart City: Smart city is the urban area, which utilizes various types of electronic sensors
that help in collecting data and supplying information. This is utilized for the proper management of
resources as well as assets efficiently and effectively [2]. The data is collected from the devices,
citizens and finally assets that are being processed or analyzed for monitoring and managing
transportation systems and traffic, networks of water supply, information systems, power plants and
many more. This is the perfect amalgamation of Internet of Things or IoT and ICT or information and
communications technology for optimizing efficiency of the operations or services.
2. Three current or future security issues in IoT and its countermeasures
i) Explanation and Analysis of Three security Issues in IoT: The three security issues in
Internet of Things are as follows:
Lack of Data Encryption: The first and the foremost security issue in Internet of things is the
lack of data encryption. Due to this lack of data encryption, it often becomes a major issue for the
users to secure their data from hackers.
Lack of Data Authentication: The second security issue in IoT is the lack of data
authentication [9]. Data often loses its authentication as well as integrity within this technology.
Security-Side-channel Attacks: Security-side-channel attacks mainly focus on information as
well as the procedure of presentation of that information. Thus, when the information is being
checked or accessed on a timely manner, the hacker gets the access of the data and exploits it
purposely.
ii) Explanation of countermeasures and Mitigation Techniques and Tools for Every Security
Issue: The countermeasures for three security measures are given below:
Lack of Data Encryption: This particular problem could be resolved by proper encryption
strategies. Moreover, SSL or Secure Sockets Layer Protocol can be used when the data is online. SSL
protocols help to properly encrypt the data without much hassle or problems [5]. The websites are
mainly secured by this.
Document Page
5
SECURITY CHALLENGES IN EMERGING NETWORKS
Lack of Data Authorization: This particular problem could be resolved by involving firewalls
and antivirus. The antivirus software is utilized for securing the data properly and thus comprises of
the feature for saving the authorization and integrity of the confidential data. Due to the presence of
this software, the hackers would not get any access to the confidential data and hence the data
could be saved. Moreover, firewalls help to detect any type of malicious activity.
Security-Side-channel Attacks: This particular problem could be resolved by involving proper
strategies of Internet of Things or IoT [12]. It is extremely vulnerable for the users and their systems.
Presence of firewalls is another important step for this.
Conclusion
Therefore, from the above discussion, it can be concluded that The Internet of Things or IoT
refers to a specific computing concept, which describes the entire idea of regular physical objects
that are being connected to the connection of Internet and has the ability for identifying themselves
to all other devices. The term of IoT could be closely identified with radio frequency identifiers or
RFID as a method for communication. This might also involve the other technologies of sensor, QR
codes and the wireless technologies. This Internet of Things is extremely important since any object,
which could easily represent them for becoming more active than the object. It is also referred to as
ambient intelligence. The above report has outlined a brief discussion on the concept of Internet of
Things or IoT and the various security challenges. The report is sub divided into two parts. The first
part is the literature review of Internet of Things. This part has described about IoT, Characteristics
of IoT compared to the traditional network and three distinct areas of applications for Internet of
Things. The second part of the report has also focused on the three current or future security issues
in IoT and its countermeasures.
Document Page
6
SECURITY CHALLENGES IN EMERGING NETWORKS
References
[1] Wortmann, Felix, and Kristina Flüchter. "Internet of things." Business & Information Systems
Engineering 57, no. 3 (2015): 221-224.
[2] Yang, Shuang-Hua. "Internet of things." In Wireless Sensor Networks, pp. 247-261. Springer,
London, 2014.
[3] Gubbi, Jayavardhana, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. "Internet of
Things (IoT): A vision, architectural elements, and future directions." Future generation computer
systems 29, no. 7 (2013): 1645-1660.
[4] Zanella, Andrea, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, and Michele Zorzi. "Internet of
things for smart cities." IEEE Internet of Things journal 1, no. 1 (2014): 22-32.
[5] Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A survey." IEEE Transactions
on industrial informatics 10, no. 4 (2014): 2233-2243.
[6] Perera, Charith, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. "Context aware
computing for the internet of things: A survey." IEEE communications surveys & tutorials 16, no. 1
(2014): 414-454.
[7] Cui, Xiaoyi. "The internet of things." In Ethical Ripples of Creativity and Innovation, pp. 61-68.
Palgrave Macmillan, London, 2016.
[8] Stankovic, John A. "Research directions for the internet of things." IEEE Internet of Things
Journal 1, no. 1 (2014): 3-9.
[9] Al-Fuqaha, Ala, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash.
"Internet of things: A survey on enabling technologies, protocols, and applications." IEEE
Communications Surveys & Tutorials 17, no. 4 (2015): 2347-2376.
[10] Chandrakanth, S., K. Venkatesh, J. Uma Mahesh, and K. V. Naganjaneyulu. "Internet of
things." International Journal of Innovations & Advancement in Computer Science 3, no. 8 (2014): 16-
20.
[11] Mukhopadhyay, Subhas Chandra, and N. K. Suryadevara. "Internet of things: Challenges and
opportunities." In Internet of Things, pp. 1-17. Springer, Cham, 2014.
[12] Whitmore, Andrew, Anurag Agarwal, and Li Da Xu. "The Internet of Things—A survey of topics
and trends." Information Systems Frontiers 17, no. 2 (2015): 261-274.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]