MN502 - Security Challenges in Emerging Networks: An In-depth Report

Verified

Added on  2023/06/11

|8
|2312
|450
Report
AI Summary
This report provides a comprehensive analysis of security challenges in emerging networks, focusing on the Internet of Things (IoT). It begins with an introduction to IoT and a literature review highlighting its benefits and applications. The report contrasts IoT with traditional methods, emphasizing its advantages in device connectivity and data management. It identifies various devices used in IoT and explores applications such as improved health and safety, media engagement, and smart living. The core of the report addresses critical security issues like side-channel attacks, end-to-end protection, and planning vulnerabilities, further detailing mitigation techniques such as data authentication, recovery strategies, and access right assignments to enhance system security. The report concludes by summarizing the benefits of IoT, its impact on automation and financial improvement, and the importance of addressing security concerns for its continued success, providing a balanced view of its potential and associated risks. Desklib offers a platform for students to access similar solved assignments and study resources.
Document Page
Internet of things
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1 | P a g e
Table of Contents
Introduction...........................................................................................................................................1
Literature review...................................................................................................................................1
Benefits of IOT compared to traditional method...................................................................................1
Devices used in IoT................................................................................................................................2
Applications of Internet of Things.........................................................................................................2
Security issues.......................................................................................................................................2
Mitigation techniques used in IoT.........................................................................................................3
Conclusion.............................................................................................................................................4
Document Page
2 | P a g e
Introduction
Internet of things has improved the working style of business. This report covers the
complete analyses of IoT things. It covers the applications, devices, security risk and their mitigation
strategies. Internet of things has allowed users to access the devices from any location [1]. There are
issues associated related to privacy and confidentiality of data as users enter the system through
side doors. This report covers the security issues and the solution that could be used to remotely the
flaws. Internet of thing is a collection of all the computing devices that provide unique identity to
every device. It also allows data to be transferred from one place to other without the need of
human efforts. Internet of thins is emerged from advancement of wireless technology and also allow
all the machine generated results to be analysed.
Literature review
As per Borgia, Internet of things is another idea which has changed the working
environment. It can be viewed as a system of physical devices which are made to work under same
software. It makes all the devices recognized over the network. Internet of things makes conceivable
that all the devices are controlled remotely by offering more options [2]. Internet of things is used to
enhance the financial advantage of an organisation by decreasing the human endeavours. Internet
of thing makes utilization of innovation which helps them to keep track of all the stock and
furthermore gives control measures. They also help in providing economic benefit to the
organisation by removing the manual work. They keep track of all the devices connected to internet.
The work is made automatically which eliminates the manual work and also helps devices to
communicate to each other. They allow all the devices that are connected over internet to
communicate with easy ther from anywhere.
In the view of Atzori, Luigi, Antonio Iera, and Giacomo IoT allow single devices to access the
information from anywhere. The data can be captured through sensors and then information is
stored over the big data network. They also make use of advanced technology like artificial
intelligence so that could add huge benefits to organisation [3]. Internet of things can be seen as a
network that has all the devices linked up together. The network consists of physical devices as well
as devices that are connected to internet.
In the view of Hossain, internet of thing is an advanced technology that has covered various sectors
and is basically used to store information by providing security. The three factors that are related to
IoT are communication, control and cost saving tactics. It helps the business o keep track of the
information and also monitor them at regular interval [4]. It also adds flexibility in work by providing
quick response.
Benefits of IOT compared to traditional method
IOT has made conceivable that every gadget is associated with each other over a globe. It
has offered different qualities when contrasted with traditional ways. They provide an interface for
all the gadgets and also add up legitimate security control. IoT is where all the devise with different
hardware’s and software’s are associated with each other [5]. The conventional system used to
Document Page
3 | P a g e
associate the gadgets that have same infrastructure. The traditional systems did not allow gadgets to
change their state progressively. Yet, IoT enables different gadgets to be overseen together and
furthermore helps in treatment of data. As far as security Iot is superior to any other traditional
strategies as it undertakes legitimate encryption methods and additionally provides appropriate
access control [6]. It guarantees that no unauthorised client gets the privilege to get to the
important data. It is additionally a cost effective approach and also offers easy adaptability.
The old traditional strategies have been replaced by the innovation of internet of things.
Internet of things is used everywhere from home appliance to business organisation. It allow all the
information to be stored ta single location with high security and also helps in keeping tracking of all
the devices from anywhere [7].
Devices used in IoT
Internet of thing have many devices that include smart speakers, home assistant tool, smart
clock, wearable’s, smart lock, auto completer, home pads, security devices, advanced hardware’s
and software’s or sensors. Apart from that there are various electronic devices that are used in daily
life fall under internet of things [8].
Applications of Internet of Things
There are various applications that internet of things support. The three main advantages have been
discussed.
Improved health and safety- internet of things helps in monitoring, detection and
surveillance of health and safety measures. Sensors are used to collect environmental
conditions so that flaws can be detected and measures could be taken accordingly [9]. There
are various tools that are available to monitor the situations so that instant precautions
could be taken.
Media- media also make use of internet of things as it helps in marketing of products.
Internet of things helps in capturing target audience and enhances customers to interact
more. It also helps in storing data and allow individual to access the information form
anywhere.
Implementing smart living- it has provided a way to live a flexible life by making all the trips
automatically. The applications help in completing the work automatically as all the activities
by offering alerts at time of emergency condition [10].
Security issues
There are various issues associated with internet of things especially confidentiality, integrity and
loss of information [11]. It is important to secure all the data so that no bug hit the network. Thus
discussing three main security issues related to Iot are:
Side channel attack- There is chances that attackers enter the system through side doors
and access the data. In this way unauthorised user gets chances to access the data and read
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4 | P a g e
out all the sensitive data [12]. Thus the data should be encrypted so that even if invalid user
aces the data they cannot understand the actual information.
End to end protection- Internet of things provide protection but still there is no proper
framework that is designed to deal with lack of privacy in the system. Thus policies need to
be designed so that system could be recovered easily at time of failure.
Planning- It capture the data from different location thus it there are chances that data
could be leaked. This enhances a risk of data outflow to unauthorised user which can be
future misused [13]. The planning over Iot network is not secure as the sensitive information
could be leaked.
Mitigation techniques used in IoT
There are different security issues that should be addressed by using internet of thing framework.
Few mitigations measures are embraced to provide a safe system and avoid errors to mitigate in
the system.
Authentication of data- All the association and organizations these days store delicate data
over IoT system [14]. In this manner data stored should be encrypted and appropriate access
control should be given with the goal that only substantial client utilizes the information.
Recovery strategies -The framework ought to be planned in a way that goals are achieved
and all the bugs are overcome. In some cases if bugs hit the framework they ought to recover
from it effectively without making any misfortune an association.
Assigning access rights-There is a probability that data is spilled which may cause loss of
privacy. Along with this appropriate control should be chosen about who is permitted to get the
data and who can read and access the data [14]. There are chances that rights are assigned
regarding to who can read, compose and alter the information at that point there are no chances
that information would get leaked. Only substantial clients should be offered authorization to
peruse and alter the information else it may release the sensitive information.
Document Page
5 | P a g e
Conclusion
From this report it can be concluded that internet of thing has helped in making the working
easy and also helps the devices to be accessed from anywhere. It has made the work automatic by
removing the manual efforts. It also improves the financial conditions of an organisation by
improving the profit revenue. Internet of things makes use of advanced technology that allows
devices to communicate to each other remotely. All the devices that have access to internet
connection can communicate to each other through IOT network. In this report the old traditional
method is compared to the use of internet of thing system. There is various advantages that are
offered by Iot. The iot devices have been used at many places. Internet of things have used at
various places from use at making smart city, wearable’s or at media. It has gained importance in the
current market place. This report also covers various security issues that are associated with using
iot things. Thus the risk associated and their respective mitigation strategies have been analysed.
Document Page
6 | P a g e
Bibliography
[1] F Bonomi, M Rodolfo, N Preethi, and Z Jiang. "Fog computing: A platform for internet of things
and analytics." In Big data and internet of things: A roadmap for smart environments, pp. 169-186.
Springer, Cham, 2014.
[2] Borgia, Eleonora. "The Internet of Things vision: Key features, applications and open
issues." Computer Communications 54, 1-31, 2014.
[3] Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "From" smart objects" to" social objects": The
next evolutionary step of the internet of things." IEEE Communications Magazine 52, no. 1 (2014):
97-105.
[4] Hossain, Md Mahmud, Maziar Fotouhi, and Ragib Hasan. "Towards an analysis of security issues,
challenges, and open problems in the internet of things." In Services (SERVICES), 2015 IEEE World
Congress on, pp. 21-28. IEEE, 2015.
[5] M, Bawa, C, Dagma, S, Ivan and S, Daniela. "Importance of internet of things and big data in
building smart city and what would be its challenges." In Smart City 360°, pp. 605-616. Springer,
Cham, 2016.
[6] Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. "Security of the Internet
of Things: perspectives and challenges." Wireless Networks 20, no. 8 (2014): 2481-2501.
[7] Da Xu, Li, Wu He, and Shancang Li. "Internet of things in industries: A survey." IEEE Transactions
on industrial informatics 10, no. 4 (2014): 2233-2243.
[8] Fleisch, Elgar, Markus Weinberger, and Felix Wortmann. "Business models and the internet of
things." In Interoperability and Open-Source Solutions for the Internet of Things, pp. 6-10. Springer,
Cham, 2015.
[9] Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. "Security,
privacy and trust in Internet of Things: The road ahead." Computer networks 76 (2015): 146-164.
[10] In Lee and Kyoochun Lee. "The Internet of Things (IoT): Applications, investments, and
challenges for enterprises." Business Horizons 58, no. 4 , pp- 431-440, 2014.
[11] M, Georgescu and P, Daniela. "The Importance of Internet of Things Security for Smart Cities."
In Smart Cities Technologies. InTech, 2016.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7 | P a g e
[12] Kamath, H, Srikanth, P, Suyashi, and T, Kar. "Security Issues in Internet of Things." International
Journal of Emerging Research in Management &Technology 6, no. 5, pp-260-264, 2017.
[13] Sadeghi, R, Ahmad, W Christian, and W Michael. "Security and privacy challenges in industrial
internet of things." In Proceedings of the 52nd annual design automation conference, p. 54. ACM,
2015.
[14] Whitmore, Andrew, A, Anurag and Li Da Xu. "The Internet of Things—A survey of topics and
trends." Information Systems Frontiers 17, no. 2 ,pp- 261-274, 2015.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]