NIT6130 Assignment 2: Security in the Internet of Things
VerifiedAdded on 2025/05/03
|28
|5473
|434
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

NIT6130 - ASSIGNMENT 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Abstract......................................................................................................................................3
Introduction................................................................................................................................4
Related Work.............................................................................................................................5
Proposed Research.....................................................................................................................8
Conclusion................................................................................................................................15
References................................................................................................................................16
Appendix A: Literature review................................................................................................18
Abstract......................................................................................................................................3
Introduction................................................................................................................................4
Related Work.............................................................................................................................5
Proposed Research.....................................................................................................................8
Conclusion................................................................................................................................15
References................................................................................................................................16
Appendix A: Literature review................................................................................................18

List of figures
Figure 1: - Architecture............................................................................................................10
Figure 2: Analyses of system security.....................................................................................11
Figure 3: implementation of the approach...............................................................................12
List of table
Table 1: Literature review........................................................................................................18
Table 2: Literature review with abstract..................................................................................19
Table 3: Literature review........................................................................................................21
Table 4: Literature review with abstract..................................................................................22
Table 5: Literature review........................................................................................................24
Table 6: Literature review with abstract..................................................................................25
Figure 1: - Architecture............................................................................................................10
Figure 2: Analyses of system security.....................................................................................11
Figure 3: implementation of the approach...............................................................................12
List of table
Table 1: Literature review........................................................................................................18
Table 2: Literature review with abstract..................................................................................19
Table 3: Literature review........................................................................................................21
Table 4: Literature review with abstract..................................................................................22
Table 5: Literature review........................................................................................................24
Table 6: Literature review with abstract..................................................................................25
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Abstract
The Internet of things (IOT) has been the emphasis of the research. The key issues in the
application of IoT are privacy & security & also confront the challenges. To review the
progress of research of IoT & the security, discuss the technologies that will include
communication security, encryption mechanism, cryptographic algorithm & protecting sensor
data. The principles of the security & the concepts those are applicable for the existing
network that will not directly apply to the network & will involve the devices as a constraint
is involved in IoT. It is the paradigm envisioned technology as the global network of devices
& machines that are capable of interacting among them. It is recognized that it is the most
important part of the future technology & also it is achieving a large number of industries.
The true value will be realized when it will be linked with the devices that are capable of
communicating with each other & integrate with the applications of business intelligence &
business analytics. The privacy of personal data, safety hazards, the risk to human life &
financial investment are the major issues for everyone. The vulnerabilities are getting hacked
by the attackers. This will lead to spending a large amount of cost to mitigate the issues that
will occur because of the security problem. Therefore, the purpose of this paper is to propose
the methodologies that depend on the security framework of engineering that will require the
security to be part of the decision in the life cycle development. The methodology proposed
the measures of the security that will be easily modified at each stage of the development of
software to enhance the entire security & to maintain the system cost.
The Internet of things (IOT) has been the emphasis of the research. The key issues in the
application of IoT are privacy & security & also confront the challenges. To review the
progress of research of IoT & the security, discuss the technologies that will include
communication security, encryption mechanism, cryptographic algorithm & protecting sensor
data. The principles of the security & the concepts those are applicable for the existing
network that will not directly apply to the network & will involve the devices as a constraint
is involved in IoT. It is the paradigm envisioned technology as the global network of devices
& machines that are capable of interacting among them. It is recognized that it is the most
important part of the future technology & also it is achieving a large number of industries.
The true value will be realized when it will be linked with the devices that are capable of
communicating with each other & integrate with the applications of business intelligence &
business analytics. The privacy of personal data, safety hazards, the risk to human life &
financial investment are the major issues for everyone. The vulnerabilities are getting hacked
by the attackers. This will lead to spending a large amount of cost to mitigate the issues that
will occur because of the security problem. Therefore, the purpose of this paper is to propose
the methodologies that depend on the security framework of engineering that will require the
security to be part of the decision in the life cycle development. The methodology proposed
the measures of the security that will be easily modified at each stage of the development of
software to enhance the entire security & to maintain the system cost.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction
Internet of things is the upcoming phenomena with estimated large business & fast growth.
Most of the organization has already started working on the various projects particularly & in
collaboration. If the things are known in the physical world so the data may be gathered that
will help to monitor, count, minimize the waste, actuate, losses & cost. It also gets to know
about the devices that are faulty when they require the replacing & repairing, autonomy,
increase productivity, easy life with the unprecedented convenience & smartness. The IoT
will serve the industries & organization to minimize the cost by improving the efficiency,
productivity & utilization of the resource. By utilizing this most of the task will be performed
remotely & not risk the life of a human or provide the time to travel the real insight, the
decision will be used to make the decision smarter & will help to develop the more
opportunity for the industries & peoples. It is more complex to provide security in the IoT as
compare to network security. There is a lot of the existing solution in the network that does
not depend on nature as there are some exploits that may be attacked. So, the only IoT has not
the issues of security or internet but it with the mobile network, cloud network & sensors
networks. The more & more things will link to the internet it will call for the security check.
For making it better this paper will utilize the methodology of the IoT for utilizing the
framework of security engineering. On each stage, the security check will be carried. The
design of the security will include the algorithm & requirements that are specific to IoT. By
using this methodology the calamities of the security may be avoided.
Internet of things is the upcoming phenomena with estimated large business & fast growth.
Most of the organization has already started working on the various projects particularly & in
collaboration. If the things are known in the physical world so the data may be gathered that
will help to monitor, count, minimize the waste, actuate, losses & cost. It also gets to know
about the devices that are faulty when they require the replacing & repairing, autonomy,
increase productivity, easy life with the unprecedented convenience & smartness. The IoT
will serve the industries & organization to minimize the cost by improving the efficiency,
productivity & utilization of the resource. By utilizing this most of the task will be performed
remotely & not risk the life of a human or provide the time to travel the real insight, the
decision will be used to make the decision smarter & will help to develop the more
opportunity for the industries & peoples. It is more complex to provide security in the IoT as
compare to network security. There is a lot of the existing solution in the network that does
not depend on nature as there are some exploits that may be attacked. So, the only IoT has not
the issues of security or internet but it with the mobile network, cloud network & sensors
networks. The more & more things will link to the internet it will call for the security check.
For making it better this paper will utilize the methodology of the IoT for utilizing the
framework of security engineering. On each stage, the security check will be carried. The
design of the security will include the algorithm & requirements that are specific to IoT. By
using this methodology the calamities of the security may be avoided.

Related Work
The research type is a qualitative method. Most of the researcher has identified the various
challenges in IoT. The work of researchers from the last few years that identify the key areas
of research & the challenges of the IoT those are consolidated & stated. The issues &
challenges in this section were gathered from the extensive searching in the conducted survey
in the field. It will analyze the mechanism that is existing & secures the communication for
protocols in IoT. It will produce the information as to how the security in the IoT for layer
like PHY, MAC, network routing, application layer & routing may be achieved (Granjal,
2015). The research has conducted the study & compare with the existing application of IoT
layer protocol & the protocol that will be utilized to link the things & application of end
users. The work will address the protocol that exists for suitability, reliability, energy aspect
& security of IoT (A Survey on Application Layer Protocols for the Internet of Things IEEE,
2015). Review the present research in IoT application, technologies that are key enabling &
challenges required to identify & the trends. The challenges that are identified are designed to
the architecture of service-oriented, heterogeneity, scalability, data mining, big data,
standardization, privacy & security (Wu & Li, 2015). The main challenges facing in the
middleware of IoT as mobility, scalability, heterogeneity & trust, unknown availability of
data point, bootstrapping security, random topology, privacy, modularity, integration in real
world & conflicts of actuation (Fersi, 2015). It is intended to serve the conceptual framework
& guideline for further research in IoT. They will provide the existing detail of the IoT & will
advise some of the significant direction of research. They address the layer multi-protocol to
support the communication, interoperability, modularity, sustainable models of business,
ownership & security are the challenges in IoT for research (Perera, 2015). It states that the
challenges of the internet of thing are reliability, awareness of context, energy efficiency,
handling the big data & mobility awareness (Kantarci, 2015). The challenges of research like
interoperability, identification, networking autonomic, services that are highly secure for the
human body (ITU Workshop on the Internet of Things - Trend and Challenges in
Standardization”, 2014). The challenges of IoT like naming management to identify
information privacy, data confidentiality, standardization, and encryption, the security of
network & identity address in IoT . The researcher will first categories the system of IoT &
then address the issues & the challenges that are associated to communication & sensing
technology that is ( issue of massive data, noisy data, scalability, & standardization) &
The research type is a qualitative method. Most of the researcher has identified the various
challenges in IoT. The work of researchers from the last few years that identify the key areas
of research & the challenges of the IoT those are consolidated & stated. The issues &
challenges in this section were gathered from the extensive searching in the conducted survey
in the field. It will analyze the mechanism that is existing & secures the communication for
protocols in IoT. It will produce the information as to how the security in the IoT for layer
like PHY, MAC, network routing, application layer & routing may be achieved (Granjal,
2015). The research has conducted the study & compare with the existing application of IoT
layer protocol & the protocol that will be utilized to link the things & application of end
users. The work will address the protocol that exists for suitability, reliability, energy aspect
& security of IoT (A Survey on Application Layer Protocols for the Internet of Things IEEE,
2015). Review the present research in IoT application, technologies that are key enabling &
challenges required to identify & the trends. The challenges that are identified are designed to
the architecture of service-oriented, heterogeneity, scalability, data mining, big data,
standardization, privacy & security (Wu & Li, 2015). The main challenges facing in the
middleware of IoT as mobility, scalability, heterogeneity & trust, unknown availability of
data point, bootstrapping security, random topology, privacy, modularity, integration in real
world & conflicts of actuation (Fersi, 2015). It is intended to serve the conceptual framework
& guideline for further research in IoT. They will provide the existing detail of the IoT & will
advise some of the significant direction of research. They address the layer multi-protocol to
support the communication, interoperability, modularity, sustainable models of business,
ownership & security are the challenges in IoT for research (Perera, 2015). It states that the
challenges of the internet of thing are reliability, awareness of context, energy efficiency,
handling the big data & mobility awareness (Kantarci, 2015). The challenges of research like
interoperability, identification, networking autonomic, services that are highly secure for the
human body (ITU Workshop on the Internet of Things - Trend and Challenges in
Standardization”, 2014). The challenges of IoT like naming management to identify
information privacy, data confidentiality, standardization, and encryption, the security of
network & identity address in IoT . The researcher will first categories the system of IoT &
then address the issues & the challenges that are associated to communication & sensing
technology that is ( issue of massive data, noisy data, scalability, & standardization) &
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

challenges in protocol of communication like (special gateway, issues associated with
6LowPAN & routing), middleware challenges like (scalability, infrastructure, abstraction &
heterogeneity), QoS challenges like ( constraint in resources, scalability, traffic of
heterogeneous & dynamic infrastructure) (Pandya, 2015). Most of the researchers focus on
the attacks that possible on the network of 6LoWPAN & the RRL, measures the method to
overcome the attack & the opportunities of research will present in the layer of network
security (Zhao, 2013). They will communicate the attacks like selective forwarding, sinkhole,
Sybil, hello flooding, wormhole, Denial of service (DoS), authentication, confidentiality &
spoofing. They will discuss the issues that raised the concern of security with the framework
of infrastructure protection, security and the challenges of privacy like integrity, the
confidentiality of data, trustworthiness, privacy data, and management of access control
(Catuogno, & Turchi, 2015). It addressed the various issues of the security like the algorithm
& management, security protocols for routing, a fusion of data, access control &
authentication.
The framework of the security was proposed by the authors for enhancing the security for the
collective software system, the environment of big data, cloud system. The framework of
security is proposed by the that consist of the following:
The phase of engineering for the security requirements.
The phase of engineering for security design
Implementation of security
Security testing
It shows how the framework may be executed in parallel with the SDLC. The subtask contain
the elicitation requirement, analysis of security requirement, prioritization of security
requirement, management of security requirements, mapping the requirements of security
with the services of cryptographic, analysis of security design, constraint of security design,
structuring the security design, decision of security design, implementation of the security &
testing of security.
The problems of the security were represented as the requirements of security. These are the
requirements of high level that provide the specification of collective system properties which
will not apply directly on IoT.
6LowPAN & routing), middleware challenges like (scalability, infrastructure, abstraction &
heterogeneity), QoS challenges like ( constraint in resources, scalability, traffic of
heterogeneous & dynamic infrastructure) (Pandya, 2015). Most of the researchers focus on
the attacks that possible on the network of 6LoWPAN & the RRL, measures the method to
overcome the attack & the opportunities of research will present in the layer of network
security (Zhao, 2013). They will communicate the attacks like selective forwarding, sinkhole,
Sybil, hello flooding, wormhole, Denial of service (DoS), authentication, confidentiality &
spoofing. They will discuss the issues that raised the concern of security with the framework
of infrastructure protection, security and the challenges of privacy like integrity, the
confidentiality of data, trustworthiness, privacy data, and management of access control
(Catuogno, & Turchi, 2015). It addressed the various issues of the security like the algorithm
& management, security protocols for routing, a fusion of data, access control &
authentication.
The framework of the security was proposed by the authors for enhancing the security for the
collective software system, the environment of big data, cloud system. The framework of
security is proposed by the that consist of the following:
The phase of engineering for the security requirements.
The phase of engineering for security design
Implementation of security
Security testing
It shows how the framework may be executed in parallel with the SDLC. The subtask contain
the elicitation requirement, analysis of security requirement, prioritization of security
requirement, management of security requirements, mapping the requirements of security
with the services of cryptographic, analysis of security design, constraint of security design,
structuring the security design, decision of security design, implementation of the security &
testing of security.
The problems of the security were represented as the requirements of security. These are the
requirements of high level that provide the specification of collective system properties which
will not apply directly on IoT.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

The studies of the system of IoT will be transverse in the future to examine whether the
methodology may be applied generically in the system of IoT without any alteration. This
will make the requirements of the security with the specification format that will contain the
requirements of the security & the information related to the design just like the software
requirements specification (SRS). The mitigation of runtime & self-detection for the security
attacks utilizing the algorithms of the machine learning that will be considered in the future
(Josyula, & Gupta, 2017).
methodology may be applied generically in the system of IoT without any alteration. This
will make the requirements of the security with the specification format that will contain the
requirements of the security & the information related to the design just like the software
requirements specification (SRS). The mitigation of runtime & self-detection for the security
attacks utilizing the algorithms of the machine learning that will be considered in the future
(Josyula, & Gupta, 2017).

Proposed Research
Problem statement: As there increasing the use of the devices that are somewhere
interconnected with the IoT. There are many devices that are using the IoT to make the
solution simple & effective. This way it is growing very faster & also increase the risk of
security at a high level. There are the principles of the security but will not apply directly on
the IoT as there is some restriction involved.
The IoT will involve data like personal, financial, etc. Most of the challenges confronted are
identification, networking autonomic, interoperability, modularity, security the major cause
& models of the business and issues in protocols of communication, the technology of
sensing, QoS & the middleware in the IoT, that need to be identified in this section.
Aim of the research: The objective of this research is security in IoT as it the area of concern
that safeguarding the devices connected & the network in the IoT. The internet of thing will
involve the connectivity of the internet to the system of the devices of computing that are
interrelated, digital & mechanical. Everything is providing some distant identifier & the
ability to transfer the data automatically over the network (Chang, Kuo, Y &
Ramachandran, 2016).
It will also allow the devices to link with the internet that will open the number of
vulnerabilities if it is not protected. The security of the IoT has become the subject for the
scrutiny after the number of incidents of high profile where the common device of IoT was
utilized to attack & infiltrate the large network. To implement the measures of the security is
critical to make sure the network safety with devices of IoT that is connected.
Outcomes & significance:
The methodology used to overcome the problem is Security framework it will consist of the
following phase:
Security phase for engineering requirements
The requirements of the IoT are applied to the IoT systems that are prioritized,
elicited & analyzed.
Security phase for engineering design
Problem statement: As there increasing the use of the devices that are somewhere
interconnected with the IoT. There are many devices that are using the IoT to make the
solution simple & effective. This way it is growing very faster & also increase the risk of
security at a high level. There are the principles of the security but will not apply directly on
the IoT as there is some restriction involved.
The IoT will involve data like personal, financial, etc. Most of the challenges confronted are
identification, networking autonomic, interoperability, modularity, security the major cause
& models of the business and issues in protocols of communication, the technology of
sensing, QoS & the middleware in the IoT, that need to be identified in this section.
Aim of the research: The objective of this research is security in IoT as it the area of concern
that safeguarding the devices connected & the network in the IoT. The internet of thing will
involve the connectivity of the internet to the system of the devices of computing that are
interrelated, digital & mechanical. Everything is providing some distant identifier & the
ability to transfer the data automatically over the network (Chang, Kuo, Y &
Ramachandran, 2016).
It will also allow the devices to link with the internet that will open the number of
vulnerabilities if it is not protected. The security of the IoT has become the subject for the
scrutiny after the number of incidents of high profile where the common device of IoT was
utilized to attack & infiltrate the large network. To implement the measures of the security is
critical to make sure the network safety with devices of IoT that is connected.
Outcomes & significance:
The methodology used to overcome the problem is Security framework it will consist of the
following phase:
Security phase for engineering requirements
The requirements of the IoT are applied to the IoT systems that are prioritized,
elicited & analyzed.
Security phase for engineering design
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

It is done by taking the different design feasibility & constraint of the consistent
mechanism of security & will base on the decision result.
Security implementation
This phase, the decision of the design that will take in the previous are implemented.
According to the decision, all the operation is implemented that associated with the
security that is involved in the design phase. The documentation that related is done.
The integration of the consistent system is part of the phase.
Security testing
It is the phase where the testing of the implemented software where the requirements
of the security are meets. At the time of testing the vulnerabilities of security that are
assessed again & the attacks are possibly tested & the result of this assessment is
taken & will consider for the future action. The overall assessment of the security &
verification of the system is accomplished. If needed depending on the result of test &
more features will be added for enhancing the security. At last audit & review the
security.
Benefits:
The great advantage of the framework of security is training the employees for the
Threats & the attacks & how it will serve the organization to fix them.
It will help them to calculate & monitor the progress of execution & performance.
It will make sure the standards of high quality & procedures are customized to get
regulatory compliance.
It will serve to check whether an organization processes the regulation of industry &
standard or not.
It will lead to being more transparent & will account the operation of the business.
It will motivate the top managers to go for a scientific system of governance in the
associated departments.
Institutional & effective governance the security & organizational procedures.
The professionally monitor the framework that serves to develop a more effective &
efficient environment of IT in an organization (Sharmila, Amritha, , & Mary, 2017).
mechanism of security & will base on the decision result.
Security implementation
This phase, the decision of the design that will take in the previous are implemented.
According to the decision, all the operation is implemented that associated with the
security that is involved in the design phase. The documentation that related is done.
The integration of the consistent system is part of the phase.
Security testing
It is the phase where the testing of the implemented software where the requirements
of the security are meets. At the time of testing the vulnerabilities of security that are
assessed again & the attacks are possibly tested & the result of this assessment is
taken & will consider for the future action. The overall assessment of the security &
verification of the system is accomplished. If needed depending on the result of test &
more features will be added for enhancing the security. At last audit & review the
security.
Benefits:
The great advantage of the framework of security is training the employees for the
Threats & the attacks & how it will serve the organization to fix them.
It will help them to calculate & monitor the progress of execution & performance.
It will make sure the standards of high quality & procedures are customized to get
regulatory compliance.
It will serve to check whether an organization processes the regulation of industry &
standard or not.
It will lead to being more transparent & will account the operation of the business.
It will motivate the top managers to go for a scientific system of governance in the
associated departments.
Institutional & effective governance the security & organizational procedures.
The professionally monitor the framework that serves to develop a more effective &
efficient environment of IT in an organization (Sharmila, Amritha, , & Mary, 2017).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Architecture of methodology
Figure 1: - Architecture
Figure 1: - Architecture

Figure 2: Analyses of system security
The framework of the engineering security describes three parts in the system of engineering
security activities that are conducted. Those are problem, solution & trustworthiness context.
It establish the 3 context that serve to make sure the system of engineering that is driven by
the proper understanding of the issues & problems that articulated in the security of
stakeholder objective to reflect the protection requirement & concern for security instead of
the solution of security that brought the forth that consider the space of problem & its related
constraint. There is more emphasis on the explicit & the activities set to depict the solution
worthiness in producing the proper security in competing & the conflicting constraints.
The context of the system of engineering security will share the common base to analyze
system security. The analyses of system security will provide the data to support stakeholders
& engineering decision making. Some of the analyses are distant from the application in the
The framework of the engineering security describes three parts in the system of engineering
security activities that are conducted. Those are problem, solution & trustworthiness context.
It establish the 3 context that serve to make sure the system of engineering that is driven by
the proper understanding of the issues & problems that articulated in the security of
stakeholder objective to reflect the protection requirement & concern for security instead of
the solution of security that brought the forth that consider the space of problem & its related
constraint. There is more emphasis on the explicit & the activities set to depict the solution
worthiness in producing the proper security in competing & the conflicting constraints.
The context of the system of engineering security will share the common base to analyze
system security. The analyses of system security will provide the data to support stakeholders
& engineering decision making. Some of the analyses are distant from the application in the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 28
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.