University Name - Computer and Network Security Report: IoT and MANET

Verified

Added on  2022/08/13

|9
|1436
|26
Report
AI Summary
This report provides an in-depth analysis of computer and network security, specifically focusing on mobile IoT and MANET (Mobile Ad hoc Network). It begins by outlining the basic requirements of mobile IoT, emphasizing the need for connectivity, reliability, real-time data transmission, data security, and cost-effectiveness. The report then delves into the weaknesses of existing routing protocols, including Zigbee, Wi-Fi, and CoAP, highlighting their limitations in terms of range, speed, security, and reliability. Following this, the report details the properties of MANET, such as dynamic topologies, autonomous behavior, and limited security. Finally, the report explores the practical applications of MANET across various sectors, including the military and data networks, concluding with a discussion on the broader implications of IoT and its associated security challenges. The report is well-researched and uses recent publications to support the findings.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: COMPUTER AND NETWORKS SECURITY
COMPUTER AND NETWORKS SECURITY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
Table of Contents
Introduction:...............................................................................................................................2
Discussions.................................................................................................................................2
Basic Requirements of Mobile IoT........................................................................................2
Weaknesses of Existing routing protocols.............................................................................3
MANET Properties................................................................................................................4
Example of Use of MANET..................................................................................................5
Conclusion..................................................................................................................................5
References..................................................................................................................................6
Document Page
2
Introduction:
The internet of things is a structure of devices those are interconnected of computing
those are offered with characteristic identifiers and the ability to transmit data across a
network without needing an interaction between the human and computer. IoT has been an
important technology in this era but it has serious issues in the areas of security and privacy.
The report deals with the mobile IoT, MANET, and the various features of mobile IoT
and MANET.
Discussions
Basic Requirements of Mobile IoT
The Low Power Wide Area Networks also known as IoT mobile are the fastest growing
communication technology of IoT and are an important driver for the global connections of
IoT (Condoluci et al 2018). With the different solutions and vendors of LPWAN available
today, selection of the right technology for the projects of IoT is very complicated. While
deploying the IoT mobile, the basic networking requirements should be kept in mind. The
basic networking requirements are as follows (Oh and Kim 2017):
The capacity to connect a large number of elements those are heterogeneous
Reliability of the network should be high
Transmission of data based on real-time with less delays
The capability to safeguard all the flows of data
The capability to configure various applications
Administering and traffic management at the level of device
Effectiveness of cost for large number of objects those are connected.
Layer Protocols in conventional Protocols in Mobile IoT node
Document Page
3
network
Data link layer Wi-Fi, Ethernet Zigbee, Thread, LoRaWAN
and many more
Adaptation layer NA To encapsulate the datagrams
of IPv6
Network layer IPv4, Ipv6, RIP, OSPF etc IPv6 is selected rather than
IPv4
Transport layer UDP, TCP UDP is used
Presentation layer XML or JSON CBOR
Application layer HTTP Constrained Application
Protocol
Inter-operability NA Applications utilise CoAP
and its functionalities.
Weaknesses of Existing routing protocols
The existing protocols those are used in the mobile IoT include zigbee, Wi-Fi and CoAP.
The Weaknesses of these protocols are as follows:
Zigbee: The zigbee protocol is a protocol that is wireless and it is utilised for wireless
connectivity and networking (ISMAILI et al 2019). There are different weaknesses of
zigbee. The weaknesses are as follows:
1) Zigbee is a short range network protocol
2) It has low speed of data and low complexity
3) The maintenance cost of zigbee is very high and it has slow materialisation
4) It has low stability of network and low transmission
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
5) The replacement with the compliant appliance of Zigbee is expensive
6) Zigbee is not secured as the secured system based on Wi-Fi
7) Zigbee does not have end devices those are available
Wifi: It is a local area technology that is wireless. It permits electronic devices to transmit
data or connect to the networks utilising the radio bands of ISM (Popov and Shevchenko
2019). The weaknesses of Wifi are as follows:
1) The security of Wifi is not very good and it utilises encryption methods those are not
strong
2) The range of Wifi is very long and it is of the order of tens of meters
3) Reliability is poor as it is subjected to various interference
4) The speed of Wifi is 1-54 Mbps and it is very slow than the slowest wired networks
CoAP: The full form of CoAP is constrained application protocol and it is a specialized
internet application protocol for the devices those are constrained (van der Westhuizen
and Hancke 2018). The weaknesses of CoAP are as follows:
1) Unreliability of messages and it does not guarantee delivery of datagrams
2) The standards of CoAP are still maturing
3) CoAP has several issues of Networking Address Translation and they can have several
issues communicating with the devices behind a NAT
4) Security is not good as CoAP is encrypted
MANET Properties
The full form of MANET is Mobile ad hoc Network and they have a networking
environment those routable on top of the Link Layer ad hoc Network (Pathan 2016). The
properties of MANET are as follows:
Dynamic Topologies: MANET has dynamic topologies that are bi-directional and
unidirectional links (Nigar and Azim 2018).
Document Page
5
Autonomous behaviour: Every node can act as a router and a host that shows autonomous
behaviour
Limited Security: the networks those are wireless have very limited security and firewall
is absent.
Less human intervention: they need less intervention of humans in order to configure the
network and they are autonomous in nature
Constrained bandwidth, variable capacity links: the links those are wireless have less
stability, reliability and capacity hen differentiated to the networks those are wired (Er
and Er 2017). The throughput of the communications those are wireless is less than the
maximum rate of transmission of radio after they deal with the drawbacks like
interference of noise, more than one access and many more.
Example of Use of MANET
There are various applications of MANET and it is used in various fields. The
applications include (Rath and Pattanayak 2017):
Military sector: the equipments of military consist of equipments of computer. The
networking of ad hoc would permit the military to take advantage of MANET
Data Networks: the commercial applications for the MANET consist of computing that is
ubiquitous. By permitting the computers to forward the data for others, the networks of
data can be extended beyond the reach of infrastructure that is installed
Conclusion
The report concludes with the Internet of things and the various types of Internet of
Things. The basic networking requirements are very important for the internet of things. The
various communications protocols are used in the mobile IoT and the report discusses about
Document Page
6
the weakness of the communication protocols those are used in the mobile IoT. MANET has
various applications and the properties are discussed in the report.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
References
Condoluci, M., Lema, M.A., Mahmoodi, T. and Dohler, M., 2018. 5g IoT industry verticals
and network requirements. In Powering the Internet of Things With 5G Networks (pp. 148-
175). IGI Global.
Er, J.K. and Er, G.S., 2017. Review study on MANET routing protocols: challenges and
applications. International Journal of Advanced Research in Computer Science, 8(4).
ISMAILI, I.A., Azyat, A., Raissouni, N., Achhab, N.B., Chahboun, A. and Lahraoua, M.,
2019. Comparative study of ZigBee and 6LoWPAN protocols. In Third International
Conference on Computing and Wireless Communication Systems, ICCWCS 2019. European
Alliance for Innovation (EAI).
Nigar, N. and Azim, M.A., 2018. Fairness Comparison of TCP Variants over Proactive and
Reactive Routing Protocol in MANET. International Journal of Electrical and Computer
Engineering, 8(4), p.2199.
Oh, S.R. and Kim, Y.G., 2017, February. Security requirements analysis for the IoT. In 2017
International Conference on Platform Technology and Service (PlatCon) (pp. 1-6). IEEE.
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press.
Popov, V. and Shevchenko, A., 2019, September. Electromagnetic Compatibility of WiFi
Networks on Rolling Stocks in the Railway Transport. In Workshop on ICTE in
Transportation and Logistics (pp. 279-286). Springer, Cham.
Rath, M. and Pattanayak, B.K., 2017, March. Monitoring of QoS in MANET based real time
applications. In International Conference on Information and Communication Technology for
Intelligent Systems (pp. 579-586). Springer, Cham.
Document Page
8
van der Westhuizen, H.W. and Hancke, G.P., 2018, June. Comparison between COAP and
MQTT-Server to Business System level. In 2018 Wireless Advanced (WiAd) (pp. 1-5). IEEE.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]