Analysis of IoT Security Architectures and Frameworks

Verified

Added on  2025/05/03

|11
|1754
|487
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Internet of Things (IoT)
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction.................................................................................................................................................3
Introduction of research papers...................................................................................................................4
1. The Internet of Things: Review and Theoretical Framework:.................................................................4
2. Perception layer security in the Internet of Things:.................................................................................4
Methodologies:............................................................................................................................................5
1. The Internet of Things: Review and Theoretical Framework:.................................................................5
2. Perception layer security in the Internet of Things:.................................................................................5
Comparison of the results reports:...............................................................................................................7
1. The Internet of Things: Review and Theoretical Framework:.................................................................7
2. Perception layer security in the Internet of Things:.................................................................................7
Advantages/disadvantages/superiority of selected research papers.............................................................8
1. The Internet of Things: Review and Theoretical Framework:.................................................................8
2. Perception layer security in the Internet of Things:.................................................................................8
Changes/future-directions for the selected papers to improve them............................................................9
1. The Internet of Things: Review and Theoretical Framework:.................................................................9
2. Perception layer security in the Internet of Things:.................................................................................9
Conclusion.................................................................................................................................................10
References.................................................................................................................................................11
2
Document Page
Introduction
The Internet of Things is growing rapidly and it is the most rising innovation of young
generation which inter-related all computing devices, objects, digital and mechanical system
with different finders by using the internet. IoT is the internet connection which transfers
information and different kind of data with the help of network connectivity without the
involvement of any human and computer object. The co-founder of Internet of Things is Kevin
Ashton in 1999. An Internet of Things includes smart devices which are connected to the
sensors, processors and communication hardware, antenna and microcontroller that is used to
collect the information by using IoT hub and gateway and take action on the acquired
information with user interface and smartphone. IoT helps to control the business process and
improve decision-making ability. It improves customer experience and enhances productivity
and profitability. Life without the Internet of Things (IoT) is indispensable.
3
Document Page
Introduction of research papers
The two research papers of the Internet of Things are collected for making this report. These two
papers are as follows:
1. The Internet of Things: Review and Theoretical Framework:
This research paper contains systematic review and synthesis of IoT and the development of
conceptual models. The literature review gives various applications to increase the use of IoT in
health care, knowledge management. The conceptual model and framework provide information
about the importance of IoT, its challenges and opportunities for further research of the Internet
of Things (Bian et al. 2016).
The keywords of this research paper are the Internet of things, IoT challenges, conceptual model,
and IoT challenges.
2. Perception layer security in the Internet of Things:
Wireless sensor networks (WSN), Radio frequency identification (RFID), Robust secure network
(RSN) all are essential technologies of IoT. This research paper helps to identify the security
problems which occur in the perception layer of IoT. The perception layer is important for data
collection for different sources and transfers it for additional processing. The selected research
paper gives careful consideration about important components of IoT which are essential for
perception layer security. Furthermore, it describes the RFID and sensor network technologies
which are used for perception layer. Moreover, the issues and challenges of perception layer
security and its possible solutions are identified and described (Lin et al. 2017).
The keywords of this research paper are Perception layer, security, wireless sensor networks,
RFID, RSN.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Methodologies:
The methodology is a type of method which is used in research to finding the results. The two
selected research papers used different methodologies to research completion which are as
follows:
1. The Internet of Things: Review and Theoretical Framework:
IoT architecture: nowadays IoT becomes the backbone of the current technology because
it is the most widely used technology. Architecture wise there is not any standard
structure for IoT related devices they are divided into three sections:
Data collection by the help of sensors/ chips
Data processing via related device to process the collected data
And the data will be fetched by the help of internet.
IoT application: it covers a huge area to support the specific notation to develop some
user-specific application. IoT application allows interacting with the device to device and
human to human in a robust and well-defined manner. Nowadays IoT mostly used in four
domains: logistics and transportation, finance, information and information service.
Privacy and security: IoT needs high security to fetch the data from the internet because
the data or information could be sensitive or confidential. Hence to protect the data from
such cipher attacks to reduce the data leak and data theft (Ben-Daya et al. 2017).
2. Perception layer security in the Internet of Things:
Identification method: The Ubiquitous codes and EPC is the main identification methods
for the Internet of Things. This method is used to give a different identity to all the
objects inside networks. Different types of EPC like RFID tags are used to identify the
object, it is also used for location tracking and monitoring.
Authentication method: An authentication method is used to authenticate the things and
objects; this method is used because authentication is difficult in the Internet of Things
due to its diverse things. Authentication helps to identify fake id and password with the
help of sensors, and networks.
Conceivable method: The system and transport layer security may be affected by attacks
by using RFID tags, network protocol etc. The conceivable methods are used to reduce
5
Document Page
the effect of these attacks. These attacks are classified in the active and passive category,
an example of attacks: message corruption, monitor traffic analysis, false-nodes etc.
(Ahmed et al. 2016).
6
Document Page
Comparison of the results reports:
1. The Internet of Things: Review and Theoretical Framework:
In the first paper some conceptual model and theoretical model has been proposed to understand
the internet of things along with it helps to gain knowledge about the healthcare sector and to
provide some management framework
2. Perception layer security in the Internet of Things:
In second paper some new emerging technology have been shown such as Wireless sensor
networks (WSN), Radio frequency identification (RFID), Robust secure network (RSN) to track
the subjected with their real-time monitoring, along with it is used for the enhancements of the
security to protect the data from cipher attacks and data loss. Along with it helps to resolve all
type of wireless issues.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Advantages/disadvantages/superiority of selected research papers
1. The Internet of Things: Review and Theoretical Framework:
The advantages and superiority of this paper are:
The conceptual model is helping to support security analysis.
The theoretical framework provides guidance in the complete research process.
The framework helps to predict an assumption.
Conceptual framework increases reliability.
The disadvantages of a selected research paper are:
Establishment of a framework should be difficult.
The framework may be effective for one aspect of the research.
It is time-consuming and complex in nature.
The design of a conceptual model and framework is inflexible and rigid in nature.
2. Perception layer security in the Internet of Things:
In the words of Ahmed et al. (2016), the merits of perception layer security in IoT are:
RFID helps in real-time monitoring, identifying and scanning the security issues and
resolve them.
The robust secure network helps in tracking the object.
Wireless sensor networks are flexible in nature and easily adopt new changes.
WSN save time, easy to use and cheaper as compare to other networks.
Demerits of this paper are:
Security protection in RFID is not good due to its limited resources and expensive costs.
Range of communication is limited in wireless sensor networks because these sensors are
cheap so; their size, storage capacity, power consumption is limited.
The security mechanism in WSN is not strong because of its power limitations and it is
not able to defend from security attacks.
Memory power is not high in wireless sensor networks.
8
Document Page
Changes/future-directions for the selected papers to improve them
1. The Internet of Things: Review and Theoretical Framework:
According to the words of Baldini et al. (2018), the future direction of this research is IoT
initiatives in the business and IoT adoption for practitioners which provide directions for future
research. Furthermore, IoT will be a part of all type of industry such as healthcare, transportation
and business industry etc. Research on security and privacy issues is the future aspect of this
paper.
2. Perception layer security in the Internet of Things:
In the words of Qiu et al. (2017), the future work of this paper is to improve the security level of
RFID tags and use them into IoT. It improves the security and privacy attacks related to tracking
the object. Moreover, increase the communication bandwidth of the wireless sensor networks.
Improvement in the security mechanism of the wireless sensor network will be the future
direction of this research paper.
9
Document Page
Conclusion
1. The Internet of Things: Review and Theoretical Framework:
The aim of this research is to make a conceptual model and theoretical framework for the
explanation of the Internet of Things which includes architecture, effects of IoT. The priority and
challenges of IoT were identified and the conceptual model and theoretical framework were
developed.
2. Perception layer security in the Internet of Things:
The purpose of this research is to identify the security and privacy issues of IoT with the help of
wireless sensor networks, radio frequency identification and robust secure network. The
perception layer security issues for the adoption of the Internet of Things were identified. This
research paper gives complete details about the perception layer security, its challenges, issues
and IoT based infrastructure.
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2018). Ethical design in the internet
of things. Science and engineering ethics, 1-21.
Ben-Daya, M., Hassini, E., & Bahroun, Z. (2017). Internet of things and supply chain
management: a literature review. International Journal of Production Research, 1-24.
Bian, J., Yoshigoe, K., Hicks, A., Yuan, J., He, Z., Xie, M., & Modave, F. (2016). Mining twitter
to Assess the public perception of the “Internet of Things”. PloS one, 11(7), e0158450.
Qiu, T., Chen, N., Li, K., Qiao, D., & Fu, Z. (2017). Heterogeneous ad hoc networks:
Architectures, advances and challenges. Ad Hoc Networks, 55, 143-152.
Ahmed, E., Yaqoob, I., Gani, A., Imran, M., & Guizani, M. (2016). Internet-of-things-based
smart environments: state of the art, taxonomy, and open research challenges. IEEE Wireless
Communications, 23(5), 10-16.
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of
things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet
of Things Journal, 4(5), 1125-1142.
11
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]