Internet of Things (IoT) Security and Data Management

Verified

Added on  2025/06/23

|15
|4405
|219
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
ITC560 - INTERNET OF THING - IOT
RESEARCH REPORT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Abstract............................................................................................................................................3
Introduction......................................................................................................................................4
Literature Review............................................................................................................................5
IoT Devices and Its uses..............................................................................................................5
Best solution.................................................................................................................................7
Methodology....................................................................................................................................8
Proposed Methodology................................................................................................................8
Selection of the best methodology...............................................................................................9
IoT devices and Next Generation Manufacturing.........................................................................10
Integration of operational technology and information technology...........................................10
Challenges in the adoption of IoT..............................................................................................10
Solutions.....................................................................................................................................11
Conclusion.....................................................................................................................................13
References......................................................................................................................................14
Document Page
Abstract
Internet of Things (IoT) is a technology, based on the internet which uses the network for
transferring information through it. It is a system which is connected through devices called IoT
devices for continues flow of information through it. These devices are smartly programmed
which do not require any human interaction. The devices are used in different organization for
performing smart operations. The process is implemented using different algorithms and sensors
which commonly perform a task to sense the object and transfer the information accordingly.
The information related to the objects is transfer through the network which has continued the
connection. The IoT devices can be improved more and the more usability can be provided to the
complete system. The wireless sensor network is used for providing the wireless connection and
optimized the transferring of the information. The future research can focus on the security
aspect as the devices share sensitive information of the users.
Document Page
Introduction
IoT technology provides a better and optimized service for implementing the main system. There
are many systems which use IoT devices for improving the performance of the complete system.
The device provides the real-time monitoring and detail information of the object for each and
every second. The system transfers the information through the wireless sensor network. The
process of transferring is less secure but can be improved by using different encryption
techniques. The data are important to secure from hackers or fraud people. The IoT device
improves the overall performance of the system. These devices can be implemented in any
system to optimize many works and improve overall work. These devices can provide
monitoring of the object and all required information. The process is converted into the internet-
based system. The IoT system uses the cloud for improving the storage capacity of the complete
system. The device store the data and access using the cloud. There are different cloud which
provides different features based on the requirements. According to Prazeres & Serrano (2016),
the requirement can be based on the different areas covered. The IoT devices are used in
different area like an office, home, and health report, hospital, smart detection, etc. Most of the
use is performed in the sector of the health department. The health department provides
information related to patients. Each and every moment is noticed which provide information
related to the actual problem. For understanding the actual issue can improve the solution for the
problem. The process improve the treatment of the patient. The other areas can use the IoT based
system so that real-time monitoring can improve their security and other operations.
There is an issue with the security on the data stored on the server so the improvement is to be
done in the scrutiny part. The future work will focus on the improvement of the security of the
sensitive data of the data stored in the cloud. The transferring of the data also need improvement
in security which is the most important time for a time as it is very easy to attack by hackers.
There is another issue related to the data i.e. the data stored in the cloud have the risk to be loose.
It there us small issue or problem in the part of the cloud the whole data can be loose in one time.
Storing all data at one place allow the hackers to hack the whole data from one side. So the cloud
has a risk of lose all the data at a single time. For improving the system and resolving the
problems from the system, the encryption algorithm can be used with different other methods.
The solution can be provided for the problems occurred. The proposed research focuses on the
issue related to security and data loss. The data loss can cause serious loss of capitals. There is a
different solution for taking the backup of the whole data. The research revolves around the new
technologies and methods for improving the performance of the particular system based on cloud
services.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Literature Review
IoT Devices and Its uses
The IoT device provides different benefits and method for supporting the implementation of the
smart system. This smart system contains sensors for tracking all the activities. The system based
on the IoT devices provides all the smart feature which is based on the cloud services and uses a
wireless sensor network. The IoT based devices face issue related to its security and data storage.
The security issue of the data stored on the cloud and the data which is transfer thought wireless
sensor network. There is a risk of losing all the stored data in one time as the whole data is stored
in one place.
According to the Verma, Kawamoto, Fadlullah, Nishiyama & Kato (2017), the IoT devices are
very useful and can be used in different areas of business sectors for improving its functionality.
The use of the devices is increasing day by day. More devices are connecting with the cloud and
multiple users are increasing with the time. Real time analytics provide a better and optimized
network. In this methodology, the user gets access for the information as soon information is
available on the cloud. The aim of the research is to implement Network-based methodologies
which can improve information transmission over the cloud. The future work will focus on the
delay in the network. The work can be done on efficiency and fault tolerance.
As per the Lyu, Zheng, Liu, Gao, Chen & Liu (2019), the house can be converted into a smart
house using IoT devices. The devices allow the user to control the different functions of the
home by IoT devices using the internet. Sever faces many issues related to security and privacy.
The author proposed the idea related to the authentication technique for reducing security risk.
The anti-tracking authentication scheme provides control over the access over the server or
personal data. The smart model is presented but this system has an issue with the optimization of
the functionalities and other tasks.
As per the Song et. al. (2017), the Internet of Things increases its functionality in the different
sectors in recent time. The smart home and smart office are the main functionality in the market.
The devices transfer information over the wireless sensor network. The system provides a secure
protocol for securing the personal information which is transfer over the network. The privacy of
the user is preserved using these protocols. There is details analysis of security which includes
data integrity and authentication of these data. The future wok can be implemented for the
improvement of the implementation of the IoT devices for reducing communication overhead.
The IoT devices are used in multiple industries for reducing the work complexity. All intelligent
operations can be performed by IoT devices. The intelligent monitoring process is implemented
in many factories and other offices. The monitoring process involves real time monitoring which
senses the objects and their movements. These devices are connected to the internet and contain
sensors which are of four types such as humidity sensors, 3D sensors, thermometer sensor and
accelerometer sensors (Han, Kang & Son, 2017).
Document Page
According to Araujo, Mitra, Saguna & Åhlund (2019), the IoT devices are very useful as this
device provide a high level of connectivity and transmission of the information form one node to
node. The IoT technology provides a platform with connected IoT devices for the city and
provides smart functionality to the city. The different area of the city is developed for smart
operations, the areas include hospitals, transportation, etc. The research provides support for the
evaluation of FIWARE. The research also shows the benefits of a cloud-based IoT platform. The
future work is based on the security of the cloud and other things.
The IoT based system is proposed by Woo, Lee & Park (2018), for improving health care
services. The system provides a reliable system which provides real-time health care devices
which provide real-time information related to patients. The continue information help to
monitor the health condition of the patients. The oneM2M-based IoT system is used for
improving the personal health care of the patients.
Alharby, Weddell, Reeve & Harris (2018) says about the IoT devices can be embedded with the
security layer so that the transmission can be secure. The author proposed cost-effective research
for improving the security of IoT devices. The proposed system help in the optimized and secure
transmission of the data over a wireless sensor network. This Embedded device uses the
technology of Link-Layer Security for improving security but the throughput of the system
decreases up to 44%. The energy consumption is also increased by around 200%. Future work
can be done based on these issues.
According to Yildirim & Ali-Eldin (2018), IoT technology is used widely for tracking and
monitoring different activities. The use of wearable IoT devices is increased with time. The
wearable device provides information about the person who wears the device like blood
circulation, blood pressure, heartbeats, steps counts, etc. The use of these device increases as the
user want the tracking of their health. This device has an issue related to accuracy and the
security issue is also a big concern. Many time the data which is shared with the other notes or
system is not correct. If the further decision is taken on the basis of this data then the serious
issue can occur or complete failure of the system. With the time these issues need to be resolved
as there are billions of users using Wearable Devices.
As per the Bajpai, Sood & Enbody (2018), the mapping of the IoT device is an important task for
IoT server implementation. The devices are connected through the internet and this server must
be traffic-free. The mapping process enables the system to reduce the traffic and optimizing the
overall process. The mapping also protects the transmission and data from hackers to attack. The
issue of hacking on the data stored in the cloud need to be resolved otherwise the loss of all data
can fail the whole system. The proposed system provides a solution to the issues related to data
security. The support is provided to the administrator so that the challenges faced by a hacker
can be removed.
According to Kang & Choo (2018), the IoT gateway can be used for implementing the IoT
devices in a more efficient way and to increase the compatibility of the IoT devices with the
Document Page
existing device. The device is connected with the network using the IP address-based network.
The IoT device provided automation in the business domain. The work is improved with the
reducing in the time for performing a complex task. The issue is related to security which can be
resolved in the future.
Best solution
There are a number of researches for implementing the IoT based system which works on Cloud-
based service. Every research faces the common issue related to data security. The data need to
be secure in both conditions while transferring over the wireless network and while storing data
on the cloud. The data is secured using encryption technique and secure network protocol.
Verma, Kawamoto, Fadlullah, Nishiyama & Kato (2017) implemented Network-based
methodologies for developing a system based on real-time analytics. This system provides a
capability for increasing the overall system performance by optimizing the transmission between
the nodes and IoT devices. The transmission over the wireless sensor network is improved using
the encryption technique. The proposed system and the methodology used to provide advanced
functionality for IoT based system. This system gives support to the business sectors. The system
resolves all the issue and also don’t have any issue related to high energy consumption. This
system support for the best solution for the issues arises in the IoT based system.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Methodology
Proposed Methodology
The proposed system is based on the Analytics Network Methodology. This methodology
provided the capability to optimize the transmission of the data over the internet. The network is
set up with more suitable techniques and tools so that the final out must support all the
functionality. This methodology provides help for improving the data transmission between the
IoT devices and other nodes such as system. The IoT devices are very sensitive so hackers can
easily attack the nodes. These devices need to be protected. For protecting these devices, the
cloud uses Real-time analytics. The Real-time analytic is a method for sharing the information as
soon as the information is available on the server or cloud. This information is transferred over
the internet and provides real-time experience to the user. The proposed methodology provides
many benefits for improving the system and optimizes the transmission. The sensors sense the
information and send this information over the internet. The internet carries this information and
transfers to the final node. The output of the proposed methodology helps in getting the
information in a more secure way. The Analytics Network Methodology uses Real-time analytics
for allowing users to access or perform an operation on the information. This process is rapid and
the system can easily handle the issues. The IoT devices are also used for tracking different
feature like temperature, blood circulation, Blood Pressure, heartbeat, etc.
Data analysis and requirement analysis:
The proposed system is provided with the multiple IoT devices which enable all nodes to
connect with these devices and perform all the required actions. The requirement is analyzed for
development. There are different issues related to cloud-based IoT devices. The data related to
the problems is analyzed on the basis of the resource available.
Data collection:
The data collection is a process where the facts and information is gathered from different
sources and make it possible for a system to be implemented. There are two ways of collecting
data
Primary: The primary source for collecting the data are direct research, questionnaires’, reviews,
etc. the primary source provide the data which is directly available. These type of data based on
different people’s thoughts. The information is collected and on the basis of the best suitable and
common answer, the decision is made. This type of data collection type help in getting
information Related to the IoT based devices and explain their working over the cloud.
Secondary: The secondary resource provides the data from a secondary source like journals,
papers, articles, book or other work. This type of data collection method uses the data which is
already analyzed by others such as research work. This type of data collection helps in gathering
the data which is experienced by other people who researches the particular topic. The accuracy
of the research is more as this includes the research in particular work.
Document Page
Design creation and selection:
The design for the complete system is implemented and the best solution is selected. For
developing IoT based system, there should be a design which has the capability to survive all the
issues and problems which can occur in the system. The selection of the best design can reduce
the risk for failure of the project.
Implantation:
The implementation process includes design implementation. In this step, the network based on
the analytics is implemented for optimizing the complete process of transferring information
over the internet. The transmission of the data over the internet must be fast and the user can
access the real-time interface by accessing the information as soon as it is available on the cloud.
Testing and deploying the system:
All the tasks are tested according to the requirements. If the system does not fulfill all the
expectation then the system must be failed. For this, risk analysis is involved in the project. The
testing of the network is performed by deploying it for use.
Selection of the best methodology
There are different methodology available for IoT devices and cloud-based network. The best
methodology is Real-time analytic which is based on Analytics Network Methodology for
optimizing the process of data transmission. The data is available for access as soon as the data is
uploaded on the cloud. The security of the system is also increased by the proposed
methodology. This methodology provides the benefits for the IoT devices as the fast and secure
Network enable them to exchange the data accurately. This methodology does not have complex
processing as this system is provided withal the possible features. The wireless sensor network
provided with the security using encryption technology. The final output of the research will
provide the solution which fulfills all the requirements.
Document Page
IoT devices and Next Generation Manufacturing
Since, the revolution of the industry, manufacturing has developed significantly and with
technologies from the IoT, it continues to progress today. The traditional manufacturing process
is completely transformed by smart manufacturing with the integration and infusion of IoT based
PLCs and sensors. Various manufacturers carry out the proofs of using IoT technologies to
obtain benefits. This improves the communication between the devices without human
intervention. Also, it has been observed by the manufactures that these IoT based devices stay
disconnected with the networks and has many challenges like:
Standard models of data
Security threats
Insecure and improper remote access to data
Connectivity issues
Complex process
Integration of operational technology and information technology
It needs to use the operation technology and internet technology in a combined manner. IoT in
manufacturing refers to the collection of machines that are integrated with the actuators and
sensors. These are further connected with the internet and intranet for sharing the information in
a secure manner. The IoT sensors, software, gauges and camera attached with the machines to
analyze the collected data. These smart manufacturing devices are also able to generate and send
an alert on security-related issues like machine failure and changes in the behavior of equipment.
This feature offers maintenance on right time and ensures minimal downtime of the services. The
integration of OT and IT technology enables users and organizations to save a lot of time and
money (Stergiou, Psannis, Kim & Gupta, 2018). This allows for making better decisions and
produces more revenue. The integration of OT and IT improves the visibility of the data and
resources. In the past, the comparison of product quality and efficiency was challenging. IoT
allows the manufactures to analyze and collect data from different facilities. IoT infrastructure
consists of machines that communicate and share information with each other without the
interference of human. This improves the consistency and quality of the products.
Challenges in the adoption of IoT
Security is a major issue in the implementation and management of IoT in manufacturing.
Although, devices are secured with the encryption and network and physical security devices
within OT don’t have the same security infrastructure level. It is required to implement the
authentication mechanisms and identity systems to ensure security and avoid threats like the
breakdown of the machinery that is caused by the malware attack or insecure remote access.
Both OT system and IT system have different sets of data. To build the models, the analytical
system requires an understanding of the various types of data sets. To make the correct and
accurate decisions, analytical software should have appropriate methods.
IoT enabled devices connected to the internet, and because of this vast attack surface area, it has
various concerns. For example, in the year 2016, there was an IoT attack named Mirai has
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
occurred. It was a botnet that compromised the DNS server and took down multiple websites and
causes one of the biggest Denials of service attack. This attack happens as the attackers get
successful to gain the network access by exploiting IoT Devices. Because in IoT infrastructure
all the devices are interconnected with each other, a single vulnerability of a system can allow
the attacker to compromise the whole system. Also, mostly IoT based manufacturing devices ask
the user to enter the credentials and other personal information that can be misused by the
attackers. Not only the attackers, but privacy is also a major point of concern for the IoT based
system. Apart from the leaking of personal data, IoT includes critical infrastructure risk. There
may be vulnerable devices in the IoT infrastructure and allow the attacker to expose the stored
content or take control of the device. Unauthorized production of the device can decrease the
revenue by causing security threats (Quick & Choo, 2018).
Solutions
Use of encryption to power up the future of IoT
Because of the poor protocols for data protection, many companies are facing significant security
issues. The data of the user is stored on the server and exclusivity and privacy of data should be
ensured. Thus, encryption technologies should be used for the protection of the data. The most
common encryption methods that can be used in IoT systems are RSA, DES, AES, and triple-
DES, etc.
Securing the protocols
There are a huge number of protocols that have been used in the IoT infrastructure. In order to
protect the data and avoid the threat, these protocols should be used with their secure versions
like HTTPS, EPC, DNS-SD, OMA-DM, SSL, and TLS, etc.
Incorporate security at the designing phase
IoT security methods depend on the IoT application and IoT ecosystem. Manufacturers should
consider security at the very beginning point of development. It is suggested to use recent and
update version of the operating systems along with the secure hardware (Ammar, Russello &
Crispo, 2018).
API security
To protect data integrity, it is essential to secure APIs. This ensures that only the authorized apps
and devices are able to communicate with the APIs.
Identity management:
It is necessary to have a unique identifier that differentiates the device from the other devices.
Also, user identity management is required to avoid unauthorized access to the system.
Multifactor authentication can be used to ensure the confidentiality and integrity of the data.
Network security:
Document Page
This includes the security of the port, disable the port forwarding, and use IPS and IDS along
with the firewalls and blocking of unauthorized systems in order to secure the network and IoT
infrastructure (Xiao, Wan, Lu, Zhang & Wu, 2018).
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]