IoT Security Enhancement: Methodologies and Techniques Analysis
VerifiedAdded on 2023/06/11
|6
|1041
|52
Report
AI Summary
This report discusses various methodologies and techniques used to enhance security in Internet of Things (IoT) systems. It highlights the unique security challenges posed by IoT networks, distinguishing them from traditional networks, and emphasizes the limitations of applying conventional security mechanisms. The report explores mobility-based IoT architecture, password-based methods, lightweight cryptography, and hash functions as potential solutions. It details the functionality of Name Certificate and Resolution Service (NCRS) and Global Name Resolution Service in maintaining system security. Furthermore, the report discusses the use of symmetric key algorithms and frameworks like “secIOT” and “smartFW framework” for authentication and integrity. The analysis concludes that while advancements have been made, continuous research and development are necessary to address the evolving security concerns in IoT devices and networks.

Running head: Internet of Things 1
Internet of Things
Name of the Student:
Name of the Institution:
Internet of Things
Name of the Student:
Name of the Institution:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Internet of Things 2
Improving Security in IoT Systems
The primary benefit of internet of things technology and related system is the capability
of extending the human physical world to go beyond the boundaries and limitations of human
imaginations. Internet of things network system have some special feature- only known to them
and that make them very much different from traditional networks. This fact alone means that
there are special security attacks and threats that affect IoT only, and at the same time, traditional
security mechanisms designed to counter cyber-attacks cannot be applied in IoT based systems.
Other security challenges, apart from the design technologies, emanate from integration of IoT
network systems with others- either IoT based or traditional networks. Among the top security
threats that the industry in the internet of things has to deal with amicably are privacy, integrity,
confidentiality, availability and physical attacks to the system.
Going by the fact that traditional network security and privacy methods cannot work for
IoT systems, and given the great business prospective that internet of things brings with them on
the other hand, increasing demand for comprehensive solutions, privacy have been developed in
order to protect both local systems together with the broader IoT network systems’ aspects. The
following are some of the methodologies and techniques used to offer security in the internet of
things world.
Mobility based IoT Architecture.
This technology represents an architectural design whose main aim is to provide solution
to the aforementioned challenges facing IoT. The goals of the design are anchored on mobility
and trustworthy. Such a design works successfully by breaking data receipts, maintaining content
addressability, robustness and evolvability, all which come together to solve a common problem.
Improving Security in IoT Systems
The primary benefit of internet of things technology and related system is the capability
of extending the human physical world to go beyond the boundaries and limitations of human
imaginations. Internet of things network system have some special feature- only known to them
and that make them very much different from traditional networks. This fact alone means that
there are special security attacks and threats that affect IoT only, and at the same time, traditional
security mechanisms designed to counter cyber-attacks cannot be applied in IoT based systems.
Other security challenges, apart from the design technologies, emanate from integration of IoT
network systems with others- either IoT based or traditional networks. Among the top security
threats that the industry in the internet of things has to deal with amicably are privacy, integrity,
confidentiality, availability and physical attacks to the system.
Going by the fact that traditional network security and privacy methods cannot work for
IoT systems, and given the great business prospective that internet of things brings with them on
the other hand, increasing demand for comprehensive solutions, privacy have been developed in
order to protect both local systems together with the broader IoT network systems’ aspects. The
following are some of the methodologies and techniques used to offer security in the internet of
things world.
Mobility based IoT Architecture.
This technology represents an architectural design whose main aim is to provide solution
to the aforementioned challenges facing IoT. The goals of the design are anchored on mobility
and trustworthy. Such a design works successfully by breaking data receipts, maintaining content
addressability, robustness and evolvability, all which come together to solve a common problem.

Internet of Things 3
In this architecture is a protocol from the traditional network systems called narrow waist,
and which has been given an added functionality of a name based service layer made up of the
Name certificate and Resolution Service (NCRS) and the Global name Resolution Service. These
two new protocol services are anchored on the concept of flat security service and works as an
identifier and public key of the object in question. A local gateway server encompassed in this
architecture helps maintain system security by allowing access only identifiable and addressable
objects access to the system. The global positioning system, a technology that is also used in the
architecture, helps in capturing real time data of events and system logs (Xiruo, Meiyuan,
Sugang, Feixiong, & Wade, 2017).
Password Based Methods.
The lack of secure storage facilities that could be integrated with key management
services in the internet of things technology, and password lengths are among the many
hindrances encountered in the implementations of password-based systems and password
usability respectively. Other bottlenecks to the realization of password-based systems include the
scalability issues thanks to the number of devices that could be under custody of one user, thus
making security realization a far distant dream. Nevertheless, several proposals have been made
aiming at the development of a one-time use password as a way of reducing eavesdropping and
replay attacks. Unfortunately, this method proposal does not represent or offer an ideal solution
to the security issues being experienced at the internet of things industry since password
redefinition requires a shared list and sequential system updating hence rendering the password
based method expensive to adapt and use in both dynamic and decentralized networks.
In this architecture is a protocol from the traditional network systems called narrow waist,
and which has been given an added functionality of a name based service layer made up of the
Name certificate and Resolution Service (NCRS) and the Global name Resolution Service. These
two new protocol services are anchored on the concept of flat security service and works as an
identifier and public key of the object in question. A local gateway server encompassed in this
architecture helps maintain system security by allowing access only identifiable and addressable
objects access to the system. The global positioning system, a technology that is also used in the
architecture, helps in capturing real time data of events and system logs (Xiruo, Meiyuan,
Sugang, Feixiong, & Wade, 2017).
Password Based Methods.
The lack of secure storage facilities that could be integrated with key management
services in the internet of things technology, and password lengths are among the many
hindrances encountered in the implementations of password-based systems and password
usability respectively. Other bottlenecks to the realization of password-based systems include the
scalability issues thanks to the number of devices that could be under custody of one user, thus
making security realization a far distant dream. Nevertheless, several proposals have been made
aiming at the development of a one-time use password as a way of reducing eavesdropping and
replay attacks. Unfortunately, this method proposal does not represent or offer an ideal solution
to the security issues being experienced at the internet of things industry since password
redefinition requires a shared list and sequential system updating hence rendering the password
based method expensive to adapt and use in both dynamic and decentralized networks.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Internet of Things 4
Lightweight cryptography for IoT
The Lightweight Cryptography technology for the Internet of Things is used to help
achieve and manage effectively and efficiently all end-to-end communications ion the network,
and is applied with an aim of lowering device resources. Symmetric key algorithms are used to
achieve security and for the low resource devices, cryptographic operations with limited energy
consumption are used. Among the various mechanisms provided are the “elliptic curve
cryptography” which works on each layer of the network system with the help of cloud and
intelligent computing mechanisms that are enriched with RFID and GPS technology thus
creating a main focus on the security concerns of the IOT devices.
The “secIOT” is another IoT network architectural framework of the IOT which is has
the inbuilt capabilities of reducing risks associated with the IOT devices, and that protects the
authentication and integrity of the network. The unfortunate thing with this framework is that it
does not provide limitations in the proposed frameworks.
Another proposed mechanism is the “smartFW framework”, that is an access, control
mechanism and an authentication mechanism that serves to provide security and privacy to the
internet of things devices are present in almost every field.
Hash Functions.
This cryptographic algorithm was designed by NIST and has attracted quite a good
number of people’s attention thanks to its SHA-3 competitive capability. The algorithm is
designed for use in a general case though will not satisfy requirements of lightweight property
systems. However, research has indicated that the hash function algorithm is too immature as at
now and cannot be accepted or accepted in the industry with much ease. Hash functions can also
Lightweight cryptography for IoT
The Lightweight Cryptography technology for the Internet of Things is used to help
achieve and manage effectively and efficiently all end-to-end communications ion the network,
and is applied with an aim of lowering device resources. Symmetric key algorithms are used to
achieve security and for the low resource devices, cryptographic operations with limited energy
consumption are used. Among the various mechanisms provided are the “elliptic curve
cryptography” which works on each layer of the network system with the help of cloud and
intelligent computing mechanisms that are enriched with RFID and GPS technology thus
creating a main focus on the security concerns of the IOT devices.
The “secIOT” is another IoT network architectural framework of the IOT which is has
the inbuilt capabilities of reducing risks associated with the IOT devices, and that protects the
authentication and integrity of the network. The unfortunate thing with this framework is that it
does not provide limitations in the proposed frameworks.
Another proposed mechanism is the “smartFW framework”, that is an access, control
mechanism and an authentication mechanism that serves to provide security and privacy to the
internet of things devices are present in almost every field.
Hash Functions.
This cryptographic algorithm was designed by NIST and has attracted quite a good
number of people’s attention thanks to its SHA-3 competitive capability. The algorithm is
designed for use in a general case though will not satisfy requirements of lightweight property
systems. However, research has indicated that the hash function algorithm is too immature as at
now and cannot be accepted or accepted in the industry with much ease. Hash functions can also
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Internet of Things 5
be constructed from or based on a structure of a lightweight block of ciphers (Masanobu &
Shiho).
be constructed from or based on a structure of a lightweight block of ciphers (Masanobu &
Shiho).

Internet of Things 6
References
Masanobu, K., & Shiho, M. (n.d.). Lightweight Cryptography for the Internet of Things. Retrieved may
21, 2018, from iab.org: https://iab.org/wp-content/IAB-uploads/2011/03/Kaftan.pdf
Xiruo, L., Meiyuan, Z., Sugang, L., Feixiong, Z., & Wade, T. (2017). A Security Framework for the
Internet of Things in the Future Internet Architecture. future internet.
References
Masanobu, K., & Shiho, M. (n.d.). Lightweight Cryptography for the Internet of Things. Retrieved may
21, 2018, from iab.org: https://iab.org/wp-content/IAB-uploads/2011/03/Kaftan.pdf
Xiruo, L., Meiyuan, Z., Sugang, L., Feixiong, Z., & Wade, T. (2017). A Security Framework for the
Internet of Things in the Future Internet Architecture. future internet.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.