MN502 - Security Challenges in Emerging Networks T1 2018
VerifiedAdded on 2023/06/11
|9
|2238
|287
Report
AI Summary
This report explores the security challenges presented by emerging networks, particularly focusing on the Internet of Things (IoT). It highlights the advantages of IoT over traditional networks, including remote accessibility, automation, and enhanced data management. The report delves into specific IoT devices and applications, such as smart living, wearables, and smart cities. A significant portion is dedicated to security issues like data leakage, side-channel attacks, and lack of end-to-end protection, followed by a discussion of mitigation techniques, including authentication, resilience to attacks, and access right management. The report concludes that while IoT offers substantial benefits, addressing its security vulnerabilities is crucial for its continued advancement and secure implementation. Desklib is a platform where students can find similar solved assignments and past papers.

IT Networking Designing
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1 | P a g e
Table of Contents
Introduction...........................................................................................................................................1
Literature Review..................................................................................................................................1
Features that promote IOT rather than old traditional network..............................................................2
IOT devices...........................................................................................................................................2
Applications of Internet of Things.........................................................................................................2
Security issues.......................................................................................................................................3
Mitigation techniques used in IoT.........................................................................................................3
Conclusion.............................................................................................................................................4
Bibliography...........................................................................................................................................5
Table of Contents
Introduction...........................................................................................................................................1
Literature Review..................................................................................................................................1
Features that promote IOT rather than old traditional network..............................................................2
IOT devices...........................................................................................................................................2
Applications of Internet of Things.........................................................................................................2
Security issues.......................................................................................................................................3
Mitigation techniques used in IoT.........................................................................................................3
Conclusion.............................................................................................................................................4
Bibliography...........................................................................................................................................5

2 | P a g e
Introduction
The internet of thing is the technology that is growing with time. Internet of things has
changed the way businesses work. In this report limelight is thrown on all the applications of internet
of things. In this report the advantage of using Internet of thing has been analysed as they eliminate all
eh human efforts and all aces to work from remote location. The benefit of using internet of thing is
providing an advanced environment by allowing data to be used only by authorised user [1]. This
technology has increased the flexibility in business by allowing them to access the information for m
anywhere ta anytime. Internet of thing is also prone to may attack that cause privacy and security
issues on the network. In this report various security issues has been discussed and the solution used
to remove these flaws has been discussed.
Literature Review
In the views of [2], the working environment has changed due to innovation of internet of
things. Internet of things is a collection of the physical devices that are connected through internet. It
provides a unique identity of all the devices connected over the network. Internets of things offer
better opportunities to business by making it possible that all the system is controlled remotely. They
provide economic benefit to an organisation along with enhancing efficiency by eliminating the
manila work. It also helps in tracking the devices along with providing control measures. Internet of
thing binds up all the objects and devices that are connected to internet [3]. This technology helps in
making the work automatic by eliminating the manual efforts. It also helps the devices to
communicate through each other. Internet of thing has made remote access possible as all the devices
are connected through internet.
((
Introduction
The internet of thing is the technology that is growing with time. Internet of things has
changed the way businesses work. In this report limelight is thrown on all the applications of internet
of things. In this report the advantage of using Internet of thing has been analysed as they eliminate all
eh human efforts and all aces to work from remote location. The benefit of using internet of thing is
providing an advanced environment by allowing data to be used only by authorised user [1]. This
technology has increased the flexibility in business by allowing them to access the information for m
anywhere ta anytime. Internet of thing is also prone to may attack that cause privacy and security
issues on the network. In this report various security issues has been discussed and the solution used
to remove these flaws has been discussed.
Literature Review
In the views of [2], the working environment has changed due to innovation of internet of
things. Internet of things is a collection of the physical devices that are connected through internet. It
provides a unique identity of all the devices connected over the network. Internets of things offer
better opportunities to business by making it possible that all the system is controlled remotely. They
provide economic benefit to an organisation along with enhancing efficiency by eliminating the
manila work. It also helps in tracking the devices along with providing control measures. Internet of
thing binds up all the objects and devices that are connected to internet [3]. This technology helps in
making the work automatic by eliminating the manual efforts. It also helps the devices to
communicate through each other. Internet of thing has made remote access possible as all the devices
are connected through internet.
((
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3 | P a g e
(
(Source; https://news.iu.edu/stories/2017/11/iupui/releases/13-industry-lecture-series.html)
In the views of [4], internet of things helps in accessing the devices through a single device. They
capture all the data through sensors and then store the information over the big data network. It also
makes use of artificial intelligence technology to communicate through devices. IOT has turned out to
offer huge benefits to all the business.
In the opinion of [5], it is a booming technology that has cover all the sectors including agriculture,
healthcare, storing of information, mining as well as businesses. Organisation has used IOT to store
data as it provides security of information. Internet of things revolve around three factors that is
communication, cost saving and control. It is useful for an organisation as it provides a platform to
communicate with other devices and also monitor all the stored information. It provides flexibility in
the way of communication by provide quick response [6]. It increases the performance by getting
more audience. It is a way through which management of asserts is done.
Features that promote IOT rather than old traditional network
IOT has made possible that all the devices are inter connected to each other over a globe. It
has offered various characteristics as compared to traditional ways. They connect the devices virtually
(
(Source; https://news.iu.edu/stories/2017/11/iupui/releases/13-industry-lecture-series.html)
In the views of [4], internet of things helps in accessing the devices through a single device. They
capture all the data through sensors and then store the information over the big data network. It also
makes use of artificial intelligence technology to communicate through devices. IOT has turned out to
offer huge benefits to all the business.
In the opinion of [5], it is a booming technology that has cover all the sectors including agriculture,
healthcare, storing of information, mining as well as businesses. Organisation has used IOT to store
data as it provides security of information. Internet of things revolve around three factors that is
communication, cost saving and control. It is useful for an organisation as it provides a platform to
communicate with other devices and also monitor all the stored information. It provides flexibility in
the way of communication by provide quick response [6]. It increases the performance by getting
more audience. It is a way through which management of asserts is done.
Features that promote IOT rather than old traditional network
IOT has made possible that all the devices are inter connected to each other over a globe. It
has offered various characteristics as compared to traditional ways. They connect the devices virtually
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4 | P a g e
by providing proper privacy control. IoT is a platform where all the devise with different hardware
platform are connected. The traditional network used to connect the devices that have same
infrastructure. The traditional network did not permit devices to change their state dynamically [6].
But IoT allows multiple devices to be managed altogether and also helps in handling of information.
In terms of security Iot is better than traditional methods as it follows proper encryption techniques as
well as proper access control. It assures that no unauthorised user gets the right to access the sensitive
information. It is also a cost effective approach is greater flexibility.
The traditional methods have been replaced and Iot is used at many places. It is also used in various
home security devices to keep track of all the devices at home. They help in making accurate
decisions as all the information is stored at single location [7]. The main advantage is cost efficiency
along with flexibility. It keeps in tracking the quality and viability of devices so that safety measures
could be undertaken.
IOT devices
The internet of things has various devices that are used to transfer data over a network. IoT
devices can be seen in sensors, hardware, security devices, smart phones as well as communication
technology [8]. There are various devices that form IoT system like smart TVs, cars, speaker and
many more electronic devices. They include various physical devices also hat are used in everyday
life.
Applications of Internet of Things
The three main applications of internet of things have been listed.
Internet of smart living- Iot has offered various ways to live a life in a flexible manner by
innovating remote control appliances. It reduces human efforts which in turn save energy. The
smart appliances have providing flexibility and ease of working as actions are completed
automatically.
Wearable’s- Internet of things has gained its importance mainly in wearable. it provide
benefits to keep track of daily activities so that proper decisions could be made. The
wearable’s can be in form of watches, earplugs, smart glasses, clothing, cameras or any
devices that have access to internet [9].
Implementing smart society- Internet of thing has been beneficial for implementing smart
cities as they keep track of buildings, bridges and roads. It has proven to provide better
analyses of city so that alerts could be raised at emergency conditions [9]. It also offers better
parking facility, better traffic management along with waste management in the city.
by providing proper privacy control. IoT is a platform where all the devise with different hardware
platform are connected. The traditional network used to connect the devices that have same
infrastructure. The traditional network did not permit devices to change their state dynamically [6].
But IoT allows multiple devices to be managed altogether and also helps in handling of information.
In terms of security Iot is better than traditional methods as it follows proper encryption techniques as
well as proper access control. It assures that no unauthorised user gets the right to access the sensitive
information. It is also a cost effective approach is greater flexibility.
The traditional methods have been replaced and Iot is used at many places. It is also used in various
home security devices to keep track of all the devices at home. They help in making accurate
decisions as all the information is stored at single location [7]. The main advantage is cost efficiency
along with flexibility. It keeps in tracking the quality and viability of devices so that safety measures
could be undertaken.
IOT devices
The internet of things has various devices that are used to transfer data over a network. IoT
devices can be seen in sensors, hardware, security devices, smart phones as well as communication
technology [8]. There are various devices that form IoT system like smart TVs, cars, speaker and
many more electronic devices. They include various physical devices also hat are used in everyday
life.
Applications of Internet of Things
The three main applications of internet of things have been listed.
Internet of smart living- Iot has offered various ways to live a life in a flexible manner by
innovating remote control appliances. It reduces human efforts which in turn save energy. The
smart appliances have providing flexibility and ease of working as actions are completed
automatically.
Wearable’s- Internet of things has gained its importance mainly in wearable. it provide
benefits to keep track of daily activities so that proper decisions could be made. The
wearable’s can be in form of watches, earplugs, smart glasses, clothing, cameras or any
devices that have access to internet [9].
Implementing smart society- Internet of thing has been beneficial for implementing smart
cities as they keep track of buildings, bridges and roads. It has proven to provide better
analyses of city so that alerts could be raised at emergency conditions [9]. It also offers better
parking facility, better traffic management along with waste management in the city.

5 | P a g e
Security issues
Internet of this has various issues associated with it like loss of data or service. It might also
affect the security of a network. Thus various measures need to be undertaken to secure the data from
all the attacks. The three main security issues related to Iot are:
Planning- Internet of things capture data from multiple sources that is shared over a network
between multiple devices. This adds a risk of data leakage to unauthorised user which can be
future misused [10]. The planning over Iot network is not secure as the sensitive information
could be leaked.
Attacks due to side channel- The information is kept in an encrypted but still there are
chances that data could be accessed through side channels. There are ways through which
unauthorised user get access to information. This raises the issue of trust between the user and
business.
End to end protection- the protection of devices through internet of thing is very less. There
is no proper framework that is designed to manage the data and its privacy. There are no
realistic policies designed that could be used at time of failure [11].
Mitigation techniques used in IoT
There are various security issues that need to be resolved in internet of thing system. Some of the
count measures that are undertaken to provide a secure network have been listed below.
Authentication of information- All the organisation and businesses nowadays store sensitive
information over IoT network. Thus information should be encrypted or proper access
control should be provided so that only valid user uses the information[12].
Resilience to attack- The system should be designed in a way so that they could overcome
from all the bugs[13]. In case if some error hit they system they should recover from it easily
without causing any loss to an organisation.
Assigning access rights- There is a possibility that information is leaked which cause loss of
confidentiality. Thus proper control needs to be decided about who sis allowed to access the
information and who can read and access the information [14]. If rights are assigned
regarding who can read, write and modify the data then there are no chances of misuse of
data. Only valid users need to be given permission to read and modify the data otherwise it
might leak the sensitive data.
Security issues
Internet of this has various issues associated with it like loss of data or service. It might also
affect the security of a network. Thus various measures need to be undertaken to secure the data from
all the attacks. The three main security issues related to Iot are:
Planning- Internet of things capture data from multiple sources that is shared over a network
between multiple devices. This adds a risk of data leakage to unauthorised user which can be
future misused [10]. The planning over Iot network is not secure as the sensitive information
could be leaked.
Attacks due to side channel- The information is kept in an encrypted but still there are
chances that data could be accessed through side channels. There are ways through which
unauthorised user get access to information. This raises the issue of trust between the user and
business.
End to end protection- the protection of devices through internet of thing is very less. There
is no proper framework that is designed to manage the data and its privacy. There are no
realistic policies designed that could be used at time of failure [11].
Mitigation techniques used in IoT
There are various security issues that need to be resolved in internet of thing system. Some of the
count measures that are undertaken to provide a secure network have been listed below.
Authentication of information- All the organisation and businesses nowadays store sensitive
information over IoT network. Thus information should be encrypted or proper access
control should be provided so that only valid user uses the information[12].
Resilience to attack- The system should be designed in a way so that they could overcome
from all the bugs[13]. In case if some error hit they system they should recover from it easily
without causing any loss to an organisation.
Assigning access rights- There is a possibility that information is leaked which cause loss of
confidentiality. Thus proper control needs to be decided about who sis allowed to access the
information and who can read and access the information [14]. If rights are assigned
regarding who can read, write and modify the data then there are no chances of misuse of
data. Only valid users need to be given permission to read and modify the data otherwise it
might leak the sensitive data.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6 | P a g e
Conclusion
It can be stated from the study of this report that internet of things has changed the
entire working environment along with that it has advanced the living standard of human
by offering them various services. It has transformed the way of living by making things
automatic and has replaced the manual work by offering ease of accessibility from
anywhere. Internet of thing has captured every sector by improving the flexibility. This
report covers the major features that promote the use of Iot devices. Apart from that there
rae various applications that use of IOT devices to improve the efficiency of work.
Internet of things offers various benefits but it also certain security issues that are
necessary to be resolved so that security is not violated.
Conclusion
It can be stated from the study of this report that internet of things has changed the
entire working environment along with that it has advanced the living standard of human
by offering them various services. It has transformed the way of living by making things
automatic and has replaced the manual work by offering ease of accessibility from
anywhere. Internet of thing has captured every sector by improving the flexibility. This
report covers the major features that promote the use of Iot devices. Apart from that there
rae various applications that use of IOT devices to improve the efficiency of work.
Internet of things offers various benefits but it also certain security issues that are
necessary to be resolved so that security is not violated.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7 | P a g e
Bibliography
[1] In Lee and Kyoochun Lee. "The Internet of Things (IoT): Applications, investments, and
challenges for enterprises." Business Horizons 58, no. 4 , pp- 431-440, 2014.
[2] F Bonomi, M Rodolfo, N Preethi, and Z Jiang. "Fog computing: A platform for internet of
things and analytics." In Big data and internet of things: A roadmap for smart environments,
pp. 169-186. Springer, Cham, 2014.
[3] Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A survey." IEEE
Transactions on industrial informatics 10, no. 4 (2014): 2233-2243.
[4] Manyika, James, C Michael,B Peter, W Jonathan, D Richard, B Jacques and A Dan.
"Unlocking the Potential of the Internet of Things." McKinsey Global Institute, 2015.
[5] M Keerthana, and P Ashika. "INTERNET OF THINGS." International Journal of
Advanced Research Methodology in Engineering and Technology 1, no. 2 ,2017.
[6] Borgia, Eleonora. "The Internet of Things vision: Key features, applications and open
issues." Computer Communications 54, 1-31, 2014.
[7] Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. "Security of
the Internet of Things: perspectives and challenges." Wireless Networks 20, no. 8 pp- 2481-
2501, 2014.
[8] Fleisch, Elgar, Markus Weinberger, and Felix Wortmann. "Business models and the
internet of things." In Interoperability and Open-Source Solutions for the Internet of Things,
pp. 6-10. Springer, Cham, 2015.
[9] Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "From" smart objects" to" social
objects": The next evolutionary step of the internet of things." IEEE Communications
Magazine 52, no. 1 (2014): 97-105.
[10] Hossain, Md Mahmud, Maziar Fotouhi, and Ragib Hasan. "Towards an analysis of
security issues, challenges, and open problems in the internet of things." In Services
(SERVICES), 2015 IEEE World Congress on, pp. 21-28. IEEE, 2015.
Bibliography
[1] In Lee and Kyoochun Lee. "The Internet of Things (IoT): Applications, investments, and
challenges for enterprises." Business Horizons 58, no. 4 , pp- 431-440, 2014.
[2] F Bonomi, M Rodolfo, N Preethi, and Z Jiang. "Fog computing: A platform for internet of
things and analytics." In Big data and internet of things: A roadmap for smart environments,
pp. 169-186. Springer, Cham, 2014.
[3] Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A survey." IEEE
Transactions on industrial informatics 10, no. 4 (2014): 2233-2243.
[4] Manyika, James, C Michael,B Peter, W Jonathan, D Richard, B Jacques and A Dan.
"Unlocking the Potential of the Internet of Things." McKinsey Global Institute, 2015.
[5] M Keerthana, and P Ashika. "INTERNET OF THINGS." International Journal of
Advanced Research Methodology in Engineering and Technology 1, no. 2 ,2017.
[6] Borgia, Eleonora. "The Internet of Things vision: Key features, applications and open
issues." Computer Communications 54, 1-31, 2014.
[7] Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. "Security of
the Internet of Things: perspectives and challenges." Wireless Networks 20, no. 8 pp- 2481-
2501, 2014.
[8] Fleisch, Elgar, Markus Weinberger, and Felix Wortmann. "Business models and the
internet of things." In Interoperability and Open-Source Solutions for the Internet of Things,
pp. 6-10. Springer, Cham, 2015.
[9] Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "From" smart objects" to" social
objects": The next evolutionary step of the internet of things." IEEE Communications
Magazine 52, no. 1 (2014): 97-105.
[10] Hossain, Md Mahmud, Maziar Fotouhi, and Ragib Hasan. "Towards an analysis of
security issues, challenges, and open problems in the internet of things." In Services
(SERVICES), 2015 IEEE World Congress on, pp. 21-28. IEEE, 2015.

8 | P a g e
[11] Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. "Security of
the Internet of Things: perspectives and challenges." Wireless Networks 20, no. 8 (2014):
2481-2501.
[12] Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini.
"Security, privacy and trust in Internet of Things: The road ahead." Computer networks 76
(2015): 146-164.
[13] M, Bawa, C, Dagma, S, Ivan and S, Daniela. "Importance of internet of things and big
data in building smart city and what would be its challenges." In Smart City 360°, pp. 605-
616. Springer, Cham, 2016.
[11] Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. "Security of
the Internet of Things: perspectives and challenges." Wireless Networks 20, no. 8 (2014):
2481-2501.
[12] Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini.
"Security, privacy and trust in Internet of Things: The road ahead." Computer networks 76
(2015): 146-164.
[13] M, Bawa, C, Dagma, S, Ivan and S, Daniela. "Importance of internet of things and big
data in building smart city and what would be its challenges." In Smart City 360°, pp. 605-
616. Springer, Cham, 2016.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.