ITICT202A - Wireless Networks: Single Board Computing Issues
VerifiedAdded on 2023/03/30
|13
|3187
|422
Report
AI Summary
This report examines the challenges and issues associated with using Single Board Computers (SBCs) in wireless networks and Internet of Things (IoT) solutions. It begins by defining SBCs and their increasing use due to their ability to control devices remotely. The report discusses various wireless technologies used in SBCs, including Wireless 802.11, Bluetooth, Zigbee, and Z-wave, highlighting the advantages and disadvantages of each. It also addresses wireless network topology and its importance in effective communication. A significant portion of the report focuses on security issues and challenges, such as authorization issues, DOS and DDOS attacks, data loss, and malware attacks. The report concludes by suggesting prevention techniques and methods, including using authentic networks, proper configuration processes, firewalls, antivirus software, and encryption techniques. This document is available on Desklib, a platform offering a wide range of study resources for students.

WIRELESS NETWORK 0
Single Board Computing
challenges and issues
Single Board Computing
challenges and issues
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

WIRELESS NETWORK 1
Table of Contents
Introduction.............................................................................................................................................................. 2
Single board computing devices....................................................................................................................... 2
Wireless technologies used in the SBCs........................................................................................................ 3
Wireless 802.11.................................................................................................................................................. 4
Bluetooth............................................................................................................................................................... 4
Zigbee...................................................................................................................................................................... 5
Z-wave.................................................................................................................................................................... 5
Wireless network topology............................................................................................................................ 6
Security issues and challenges occurred in SBCs...................................................................................... 6
Authorization issues......................................................................................................................................... 6
DOS and DDOS attack....................................................................................................................................... 7
Data loss................................................................................................................................................................. 7
Malware attack.................................................................................................................................................... 8
Wireless coverage and its issues.................................................................................................................. 8
Prevention techniques and methods.............................................................................................................. 9
Use authentic networks................................................................................................................................... 9
Follow proper configuration process......................................................................................................... 9
Use firewall and antivirus............................................................................................................................... 9
Use encryption technique............................................................................................................................ 10
Conclusion............................................................................................................................................................... 10
Bibliography........................................................................................................................................................... 11
Table of Contents
Introduction.............................................................................................................................................................. 2
Single board computing devices....................................................................................................................... 2
Wireless technologies used in the SBCs........................................................................................................ 3
Wireless 802.11.................................................................................................................................................. 4
Bluetooth............................................................................................................................................................... 4
Zigbee...................................................................................................................................................................... 5
Z-wave.................................................................................................................................................................... 5
Wireless network topology............................................................................................................................ 6
Security issues and challenges occurred in SBCs...................................................................................... 6
Authorization issues......................................................................................................................................... 6
DOS and DDOS attack....................................................................................................................................... 7
Data loss................................................................................................................................................................. 7
Malware attack.................................................................................................................................................... 8
Wireless coverage and its issues.................................................................................................................. 8
Prevention techniques and methods.............................................................................................................. 9
Use authentic networks................................................................................................................................... 9
Follow proper configuration process......................................................................................................... 9
Use firewall and antivirus............................................................................................................................... 9
Use encryption technique............................................................................................................................ 10
Conclusion............................................................................................................................................................... 10
Bibliography........................................................................................................................................................... 11

WIRELESS NETWORK 2
Introduction
The term single board computer is defined as a computer device which is mainly developed
on a single circuit board by using input/output devices, memory and so on. Such kinds of
computer technologies are developed for educational purpose and embedded computer
controllers.1 The use of a single board computer is increasing very fast because of their
ability to control and manage computer devices from any location. The purpose of this
report is to describe the concept of SBCs and evaluate challenges or risks linked with this
technology. It is observed that security of data is a very serious issue on the internet of
thing and various single board computing devices are connected with the IoT devices that
may suffer from privacy issues. Data breach denial of service and so on all these security
threats will be discussed in this report for identifying the risk factors linked with the SBCs
technologies. The outline of this study will include various sections, for example,
background of SBCs, wireless technologies used in SBCs, wireless coverage and its issues,
security issues and threats and prevention techniques.
Single board computing devices
A single board computer is a kind of computer system in which a single circuit process
comprises memory, microprocessors, and all other sensors for performing the controlling
process.2 Moreover, such kind of technology does not rely on expansions for other key
functions due to which it is more effective that can be used for controlling physical devices.
Raspberry Pi is one of the advanced SBC technologies that have the capability to monitor
computer devices from any location by using sensors and other peripheral networks.
1 Arshdeep Bahga and Vijay K. Madisetti, ‘Blockchain platform for the industrial internet of
things' (2016) 9(10) Journal of Software Engineering and Applications 533.
2 Paul Chze Loh Ruen and Kan Siew Leong, ‘A secure multi-hop routing for IoT
communication’ (2014) 12(2) IEEE World Forum on the Internet of Things (WF-IoT) 12-
14.
Introduction
The term single board computer is defined as a computer device which is mainly developed
on a single circuit board by using input/output devices, memory and so on. Such kinds of
computer technologies are developed for educational purpose and embedded computer
controllers.1 The use of a single board computer is increasing very fast because of their
ability to control and manage computer devices from any location. The purpose of this
report is to describe the concept of SBCs and evaluate challenges or risks linked with this
technology. It is observed that security of data is a very serious issue on the internet of
thing and various single board computing devices are connected with the IoT devices that
may suffer from privacy issues. Data breach denial of service and so on all these security
threats will be discussed in this report for identifying the risk factors linked with the SBCs
technologies. The outline of this study will include various sections, for example,
background of SBCs, wireless technologies used in SBCs, wireless coverage and its issues,
security issues and threats and prevention techniques.
Single board computing devices
A single board computer is a kind of computer system in which a single circuit process
comprises memory, microprocessors, and all other sensors for performing the controlling
process.2 Moreover, such kind of technology does not rely on expansions for other key
functions due to which it is more effective that can be used for controlling physical devices.
Raspberry Pi is one of the advanced SBC technologies that have the capability to monitor
computer devices from any location by using sensors and other peripheral networks.
1 Arshdeep Bahga and Vijay K. Madisetti, ‘Blockchain platform for the industrial internet of
things' (2016) 9(10) Journal of Software Engineering and Applications 533.
2 Paul Chze Loh Ruen and Kan Siew Leong, ‘A secure multi-hop routing for IoT
communication’ (2014) 12(2) IEEE World Forum on the Internet of Things (WF-IoT) 12-
14.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

WIRELESS NETWORK 3
In order to perform communication between the devices, a single board computing uses
wireless and IoT enabled devices that provide a platform for exchanging data over a
network. In this advanced generation, the use of information technologies is growing very
fast due to which many cities like Sydney and Melbourne are able to provide effective
services to its residents. The major problem link with the single board computing devices is
cost and it is more expensive which can create a problem for small companies and
businesses. The internet of thing is an effective technology which can be used for
controlling and managing more complex situations in companies and cities. By using both
these technologies government and community can monitor demand for health and
education in the cities.
A recent study identified that the internet of thing can play a significant character in solving
and managing challenges faced by consumers and societies. In order to effective perform
the IoT enables devices a single board computing can play a major role where it can reduce
the issues and problems faced by consumers. There are numbers of key features of single
board computing which includes very easy to understand, more effective, improve
performance of devices, required less power to operate and so on.
It is observed that raspberry Pi and IoT devices are mainly used for testing and educational
purpose where consumers can control devices and systems used in the home or offices. In
this modern generation, single board computing is defined as an embedded control system
which can be used for managing a large number of wireless sensors and networks. Mainly,
such kinds of computing devices collect a large amount of data or facts from the IoT devices
and transfer to the cloud based servers in order to analyses the collected information. It is
identified that communication between the single board computing devices and the
Internet of thing cloud produce various kinds of challenges and issues which will be
described in this research report.
Wireless technologies used in the SBCs
Wireless is an advanced computer technology which does not require any connecting wires
for sending or receiving data over a network. Such kind of technologies helps single board
computing for exchanging signals between two or more computer devices. From previous
In order to perform communication between the devices, a single board computing uses
wireless and IoT enabled devices that provide a platform for exchanging data over a
network. In this advanced generation, the use of information technologies is growing very
fast due to which many cities like Sydney and Melbourne are able to provide effective
services to its residents. The major problem link with the single board computing devices is
cost and it is more expensive which can create a problem for small companies and
businesses. The internet of thing is an effective technology which can be used for
controlling and managing more complex situations in companies and cities. By using both
these technologies government and community can monitor demand for health and
education in the cities.
A recent study identified that the internet of thing can play a significant character in solving
and managing challenges faced by consumers and societies. In order to effective perform
the IoT enables devices a single board computing can play a major role where it can reduce
the issues and problems faced by consumers. There are numbers of key features of single
board computing which includes very easy to understand, more effective, improve
performance of devices, required less power to operate and so on.
It is observed that raspberry Pi and IoT devices are mainly used for testing and educational
purpose where consumers can control devices and systems used in the home or offices. In
this modern generation, single board computing is defined as an embedded control system
which can be used for managing a large number of wireless sensors and networks. Mainly,
such kinds of computing devices collect a large amount of data or facts from the IoT devices
and transfer to the cloud based servers in order to analyses the collected information. It is
identified that communication between the single board computing devices and the
Internet of thing cloud produce various kinds of challenges and issues which will be
described in this research report.
Wireless technologies used in the SBCs
Wireless is an advanced computer technology which does not require any connecting wires
for sending or receiving data over a network. Such kind of technologies helps single board
computing for exchanging signals between two or more computer devices. From previous
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

WIRELESS NETWORK 4
studies, it has found that wireless technology has the ability for improving overall
reliability and flexibility of the networks.3 There are various kinds of wireless technologies
used in the area of single board computing which are described below:
Wireless 802.11
It is an evolving family of wireless location area networks which is mainly implemented by
IEEE institute in order to exchange data over a network. It is a very popular wireless
network that allows consumers for sending and receiving signals from long distance. Such
kind of technology is the best option for single board computing because of their several
benefits which include, more reliable, easy to configure, very simple to design and
implement and reduce errors and distortions from the channels.4 Moreover, this type of
wireless technology can be used in the communication channels and companies can easily
control their computer devices. There are various types of 802.11 network used in the SBCs
systems, for example, 802.11a, 802.11b, 802.11g and so on. In terms of speed, the IEEE
802.11 wireless networks are very faster that does not require any connecting wires.
Bluetooth
Such kinds of technologies are mainly used for short distance communication where
consumers can share information between two devices. The major problem of this
technology is that it cannot be used for long distance but it is very easy to connect with the
devices. The range of data rate is very less due to which single board computing cannot use
such kind of wireless networks.
3 Simone Cirani and Marco Picone, ‘Wearable computing for the internet of things’ (2015)
17(5) It Professional 35-41.
4 Andres Gongora and Javier Gonzalez-Jimenez, ‘Enhancement of a commercial multicopter
for research in autonomous navigation’ (2015) 12(4) 23rd Mediterranean Conference on
Control and Automation (MED) 12-18.
studies, it has found that wireless technology has the ability for improving overall
reliability and flexibility of the networks.3 There are various kinds of wireless technologies
used in the area of single board computing which are described below:
Wireless 802.11
It is an evolving family of wireless location area networks which is mainly implemented by
IEEE institute in order to exchange data over a network. It is a very popular wireless
network that allows consumers for sending and receiving signals from long distance. Such
kind of technology is the best option for single board computing because of their several
benefits which include, more reliable, easy to configure, very simple to design and
implement and reduce errors and distortions from the channels.4 Moreover, this type of
wireless technology can be used in the communication channels and companies can easily
control their computer devices. There are various types of 802.11 network used in the SBCs
systems, for example, 802.11a, 802.11b, 802.11g and so on. In terms of speed, the IEEE
802.11 wireless networks are very faster that does not require any connecting wires.
Bluetooth
Such kinds of technologies are mainly used for short distance communication where
consumers can share information between two devices. The major problem of this
technology is that it cannot be used for long distance but it is very easy to connect with the
devices. The range of data rate is very less due to which single board computing cannot use
such kind of wireless networks.
3 Simone Cirani and Marco Picone, ‘Wearable computing for the internet of things’ (2015)
17(5) It Professional 35-41.
4 Andres Gongora and Javier Gonzalez-Jimenez, ‘Enhancement of a commercial multicopter
for research in autonomous navigation’ (2015) 12(4) 23rd Mediterranean Conference on
Control and Automation (MED) 12-18.

WIRELESS NETWORK 5
Zigbee
It is an advanced version of a wireless network that requires very low power for operating
its operations. A recent study identified that such kind of wireless technology is suitable for
home automation where users can control and manager home devices from any location.
But the overall data rate of Zigbee wireless technology is very less and it also increases the
rate of security issues in the system due to which developers does not use this technology
in SBCs. From previous studies, it is analyzed that zigbee technology enables the mixing of
implementation from various manufacturers and it also supports low data rate and can be
used for the communication purpose.
Z-wave
It is very effective wireless technology which is mainly used on the internet of thing devices
for successfully performing communication between the transmitter and receiver. It is a
very effective network which can be used in home automation and long distance
communication. Mainly, Z-wave wireless technology requires less power and can be
performed on a mesh network. The frequency range of this wireless technology varies from
megahertz to gigahertz.5
Therefore, after analyzing all these wireless networks, it is suggested that IEEE 802.11 is
one of the best wireless technology which can be used for single board computing and their
sensors. It is argued that in terms of performance and effectiveness the 802.11 network is
very sufficient which require very low power and provide secure communication between
the transmitter and receiver. As compared with the other wireless technologies 802.11 is
more secure and reliable which can be used for long distance communication in the
system? There are various issues and problems linked with the other wireless technologies,
for example, less flexibility, more complex, require more time to configure, and less secure.
5 Oliver Hoidn R. and Gerald T. Seidler, ‘Note A disposable x-ray camera based on mass
produced complementary metal-oxide-semiconductor sensors and single-board
computers’ (2015) 86(8) Review of Scientific Instruments 086107.
Zigbee
It is an advanced version of a wireless network that requires very low power for operating
its operations. A recent study identified that such kind of wireless technology is suitable for
home automation where users can control and manager home devices from any location.
But the overall data rate of Zigbee wireless technology is very less and it also increases the
rate of security issues in the system due to which developers does not use this technology
in SBCs. From previous studies, it is analyzed that zigbee technology enables the mixing of
implementation from various manufacturers and it also supports low data rate and can be
used for the communication purpose.
Z-wave
It is very effective wireless technology which is mainly used on the internet of thing devices
for successfully performing communication between the transmitter and receiver. It is a
very effective network which can be used in home automation and long distance
communication. Mainly, Z-wave wireless technology requires less power and can be
performed on a mesh network. The frequency range of this wireless technology varies from
megahertz to gigahertz.5
Therefore, after analyzing all these wireless networks, it is suggested that IEEE 802.11 is
one of the best wireless technology which can be used for single board computing and their
sensors. It is argued that in terms of performance and effectiveness the 802.11 network is
very sufficient which require very low power and provide secure communication between
the transmitter and receiver. As compared with the other wireless technologies 802.11 is
more secure and reliable which can be used for long distance communication in the
system? There are various issues and problems linked with the other wireless technologies,
for example, less flexibility, more complex, require more time to configure, and less secure.
5 Oliver Hoidn R. and Gerald T. Seidler, ‘Note A disposable x-ray camera based on mass
produced complementary metal-oxide-semiconductor sensors and single-board
computers’ (2015) 86(8) Review of Scientific Instruments 086107.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

WIRELESS NETWORK 6
Therefore, for effectively performing SBCs technologies with the internet of thing 802.11
wireless technology can be used and it is the best option as compared with other networks.
Wireless network topology
The wireless network topology is defined as a process which indicates the connection
between computer devices and networks. Such kind of process is now used in single board
computing for identifying how the computer devices are connected with each other
without using any physical connections. It is a very important part of developing and
implementing effective communication between the SBCs and IoT devices. Such kind of
process needs to be deployed in the area of single board computing where it provides
proper configuration between the computer devices and avoids errors and other problems.
Therefore, it is a key part of the wireless technologies that can help consumers for
understanding the concept of wireless technology.
Security issues and challenges occurred in SBCs
There are various kinds of security issues and problems occurred in the single board
computing while using the internet of things which are described below:
Authorization issues
It is a very common privacy issue faced by consumers while using the internet of things in
SBCs networks. A recent study argued that most the consumers use unauthorized networks
while sending or receiving data using SBCs techniques. Due to the utilization of unauthentic
networks companies and users may suffer from the security related problems and it also
impacts on the private details of consumers.6 Mainly, criminals attack the wireless
networks and computing devices by using unauthorized servers that also help them for
obtaining the account details of consumers.
6 Lakshmi Sherwin Solomon and Sandhya, ‘IOT and GSM integrated multi purpose Security
system’ (2018) 12(6) Fourth International Conference on Advances in Electrical,
Electronics, Information, Communication and Bio-Informatics (AEEICB) 15-18.
Therefore, for effectively performing SBCs technologies with the internet of thing 802.11
wireless technology can be used and it is the best option as compared with other networks.
Wireless network topology
The wireless network topology is defined as a process which indicates the connection
between computer devices and networks. Such kind of process is now used in single board
computing for identifying how the computer devices are connected with each other
without using any physical connections. It is a very important part of developing and
implementing effective communication between the SBCs and IoT devices. Such kind of
process needs to be deployed in the area of single board computing where it provides
proper configuration between the computer devices and avoids errors and other problems.
Therefore, it is a key part of the wireless technologies that can help consumers for
understanding the concept of wireless technology.
Security issues and challenges occurred in SBCs
There are various kinds of security issues and problems occurred in the single board
computing while using the internet of things which are described below:
Authorization issues
It is a very common privacy issue faced by consumers while using the internet of things in
SBCs networks. A recent study argued that most the consumers use unauthorized networks
while sending or receiving data using SBCs techniques. Due to the utilization of unauthentic
networks companies and users may suffer from the security related problems and it also
impacts on the private details of consumers.6 Mainly, criminals attack the wireless
networks and computing devices by using unauthorized servers that also help them for
obtaining the account details of consumers.
6 Lakshmi Sherwin Solomon and Sandhya, ‘IOT and GSM integrated multi purpose Security
system’ (2018) 12(6) Fourth International Conference on Advances in Electrical,
Electronics, Information, Communication and Bio-Informatics (AEEICB) 15-18.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

WIRELESS NETWORK 7
DOS and DDOS attack
The term DOS is defined as the denial of service which is a part of cyber-attack occurred in
the single board computing. In the last few years, the use of wireless networks is increased
very fast due to which many companies and users are suffering from hacking or cyber-
attacks. DOS is a very common attack that impacts on the overall performance of
computing devices and IoT networks where criminals directly attack the wireless networks
and servers.7 From previous studies, it is analyzed that in the case of DOS attack criminals
transfer a large number of traffic signals to the computer networks that block wireless
networks and impact on the overall performance of single board computing. By
transferring such kinds of signals and servers the hackers can easily access the private
details of users and companies may suffer from data breach related problems.
Data loss
It is a very serious problem associated with wireless networks and single board computing
that increase the rate of hacking and cyber-crimes. In the case of the internet of things, the
users adopt wireless networks and technologies which are less secure that directly impact
on the performance of computing devices. In the case of wireless networks, data may be
lost because consumers use internet connection for exchanging data which is also
associated with the cyber-crimes.8 There are various errors and problems also occur in the
case of wireless networks and single board computing does not require any connecting
cables which also create problems for receivers and consumers. Therefore, it is very
important for consumers for enable security tools and adopt advanced wireless
technologies because the loss of data is a very common issue that may occur in the IoT and
SBCs technologies.
7 Gin Chong Lee Chu Kiong Loo and Letchumanan Chockalingam, ‘An integrated approach
for head gesture based interface’ (2012) 12(3) Applied Soft Computing 1101-1114.
8 Suzanne Matthews Raymond Blaine and Aaron Brantly, ‘Evaluating single board computer
clusters for cyber operations’ (2016) 14(8) International Conference on Cyber Conflict
(CyCon US) 15-18.
DOS and DDOS attack
The term DOS is defined as the denial of service which is a part of cyber-attack occurred in
the single board computing. In the last few years, the use of wireless networks is increased
very fast due to which many companies and users are suffering from hacking or cyber-
attacks. DOS is a very common attack that impacts on the overall performance of
computing devices and IoT networks where criminals directly attack the wireless networks
and servers.7 From previous studies, it is analyzed that in the case of DOS attack criminals
transfer a large number of traffic signals to the computer networks that block wireless
networks and impact on the overall performance of single board computing. By
transferring such kinds of signals and servers the hackers can easily access the private
details of users and companies may suffer from data breach related problems.
Data loss
It is a very serious problem associated with wireless networks and single board computing
that increase the rate of hacking and cyber-crimes. In the case of the internet of things, the
users adopt wireless networks and technologies which are less secure that directly impact
on the performance of computing devices. In the case of wireless networks, data may be
lost because consumers use internet connection for exchanging data which is also
associated with the cyber-crimes.8 There are various errors and problems also occur in the
case of wireless networks and single board computing does not require any connecting
cables which also create problems for receivers and consumers. Therefore, it is very
important for consumers for enable security tools and adopt advanced wireless
technologies because the loss of data is a very common issue that may occur in the IoT and
SBCs technologies.
7 Gin Chong Lee Chu Kiong Loo and Letchumanan Chockalingam, ‘An integrated approach
for head gesture based interface’ (2012) 12(3) Applied Soft Computing 1101-1114.
8 Suzanne Matthews Raymond Blaine and Aaron Brantly, ‘Evaluating single board computer
clusters for cyber operations’ (2016) 14(8) International Conference on Cyber Conflict
(CyCon US) 15-18.

WIRELESS NETWORK 8
Malware attack
It is one of the serious cyber-attack that occurred in the area of single board computing
while utilizing the internet of things. The term malware refers to the hacking software
which is mainly used by criminals from the perspective of a data breach and it is a very
advance algorithm that can reduce the security of devices. From previous studies, it is
evaluated that the rate of malware attack has increased by 56% in last five years and many
companies which are using SBCs and IoT technology are suffering from such kinds of
security issues. It is argued that in the case of malware attack hackers produce a huge
amount of viruses and signals with the help of malicious software and transfer to the user’s
networks for blocking their servers. By using such kinds of process attackers can easily
obtain the personal data and facts of consumers without their permission.
Wireless coverage and its issues
The term wireless coverage is defined as a network architecture where nodes within the
network are not interconnected by any connecting cables and data links. In which data is
transferred from one source to another with the help of radio signals which are operating
between 2.4GHz and 5GHz frequency.9 It provides a platform to connect the transmitter
and receiver without using any connecting wires and provide effective communication
between two computer devices. Therefore, it is very important for consumers to focus on
the privacy of data while developing and implementing wireless coverage in single board
computing.
It is identified that developing and performing wireless network converge can produce
various kinds of issues and problems in the system. These issues include data breach, loss
of data; receive information with noise, security risks and other cyber-attacks.10 Mainly,
wireless coverage is used for long distance communication and it connects two or more
9 Merchant and Ahire, ‘Industrial Automation using IoT with Raspberry Pi’ (2017) 168(1)
International Journal of Computer Applications 5-8.
10 Suneha Patil Ashok and Vishwakarma Pinki, ‘Home Automation Using Single Board
Computing as an Internet of Things Application’ (2017) 15(8) Proceedings of International
Conference on Communication and Networks 4-8.
Malware attack
It is one of the serious cyber-attack that occurred in the area of single board computing
while utilizing the internet of things. The term malware refers to the hacking software
which is mainly used by criminals from the perspective of a data breach and it is a very
advance algorithm that can reduce the security of devices. From previous studies, it is
evaluated that the rate of malware attack has increased by 56% in last five years and many
companies which are using SBCs and IoT technology are suffering from such kinds of
security issues. It is argued that in the case of malware attack hackers produce a huge
amount of viruses and signals with the help of malicious software and transfer to the user’s
networks for blocking their servers. By using such kinds of process attackers can easily
obtain the personal data and facts of consumers without their permission.
Wireless coverage and its issues
The term wireless coverage is defined as a network architecture where nodes within the
network are not interconnected by any connecting cables and data links. In which data is
transferred from one source to another with the help of radio signals which are operating
between 2.4GHz and 5GHz frequency.9 It provides a platform to connect the transmitter
and receiver without using any connecting wires and provide effective communication
between two computer devices. Therefore, it is very important for consumers to focus on
the privacy of data while developing and implementing wireless coverage in single board
computing.
It is identified that developing and performing wireless network converge can produce
various kinds of issues and problems in the system. These issues include data breach, loss
of data; receive information with noise, security risks and other cyber-attacks.10 Mainly,
wireless coverage is used for long distance communication and it connects two or more
9 Merchant and Ahire, ‘Industrial Automation using IoT with Raspberry Pi’ (2017) 168(1)
International Journal of Computer Applications 5-8.
10 Suneha Patil Ashok and Vishwakarma Pinki, ‘Home Automation Using Single Board
Computing as an Internet of Things Application’ (2017) 15(8) Proceedings of International
Conference on Communication and Networks 4-8.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

WIRELESS NETWORK 9
devices with each other which increase the data breach and data loss related problems in
the computer networks. Moreover, malware, phishing, dos and other cybercrimes also
occur in the wireless network coverage.
Prevention techniques and methods
There are various steps and techniques which can be used in order to reduce DOS and
other security issues in single board computing which are described below:
Use authentic networks
It is one of the best stages for controlling and managing security risks linked with single
board computing technologies. Mainly, consumers use third party applications and
unauthentic networks while transferring data using the internet of things which impact on
the private details.11 So, it is very important for companies and users to adopt only
authentic networks and servers while using single board computing.
Follow proper configuration process
It is identified that security issues also increase due to lack of proper configuration and
process. So, consumers should follow proper configuration while developing and
implementing SBCs and wireless networks in the system.
Use firewall and antivirus
It is observed that the use of firewall and antivirus in computer devices can reduce the rate
of cyber-attacks and improve the overall security of IoT devices used in the SBCs networks.
A firewall is the best tool which detects and blocks the unwanted signals from networks
and computer devices.12
11 Eric Olson and Narasimha Shashidhar, ‘Low Budget Forensic Drive Imaging Using Arm
Based Single Board Computers’ (2016) 11(1) Journal of Digital Forensics, Security and Law
3.
12 Eric Olson and Narasimha Shashidhar, ‘Low Budget Forensic Drive Imaging Using Arm
Based Single Board Computers’ (2016) 11(1) Journal of Digital Forensics, Security and Law
devices with each other which increase the data breach and data loss related problems in
the computer networks. Moreover, malware, phishing, dos and other cybercrimes also
occur in the wireless network coverage.
Prevention techniques and methods
There are various steps and techniques which can be used in order to reduce DOS and
other security issues in single board computing which are described below:
Use authentic networks
It is one of the best stages for controlling and managing security risks linked with single
board computing technologies. Mainly, consumers use third party applications and
unauthentic networks while transferring data using the internet of things which impact on
the private details.11 So, it is very important for companies and users to adopt only
authentic networks and servers while using single board computing.
Follow proper configuration process
It is identified that security issues also increase due to lack of proper configuration and
process. So, consumers should follow proper configuration while developing and
implementing SBCs and wireless networks in the system.
Use firewall and antivirus
It is observed that the use of firewall and antivirus in computer devices can reduce the rate
of cyber-attacks and improve the overall security of IoT devices used in the SBCs networks.
A firewall is the best tool which detects and blocks the unwanted signals from networks
and computer devices.12
11 Eric Olson and Narasimha Shashidhar, ‘Low Budget Forensic Drive Imaging Using Arm
Based Single Board Computers’ (2016) 11(1) Journal of Digital Forensics, Security and Law
3.
12 Eric Olson and Narasimha Shashidhar, ‘Low Budget Forensic Drive Imaging Using Arm
Based Single Board Computers’ (2016) 11(1) Journal of Digital Forensics, Security and Law
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

WIRELESS NETWORK 10
Use encryption technique
It is a very effective approach for controlling and monitoring security issues in the
communication system. In the case of encryption technique users can security send and
receive data from one device to another in an effective manner. Moreover, the converted
signal cannot be tracked by hackers without using the private key produced by the sender.
So, by using such kinds of methods and techniques overall security of SBCs and IoT devices
can be increased and it also helps for reducing the issue of DOS attack from the system.
Conclusion
From the above discussion, it is concluded that single board computing is an effective
technology which can be used for controlling and managing computer networks and
devices. This report focused on security issues and problems linked with SBCs while using
the internet of things. It is identified that security is the biggest problem faced by
consumers and it occurred due to lack of proper authorization in the computer devices.
This study critically reviewed the features of SBCs technology and identified the best
wireless technology for performing communication between computer devices. Therefore,
it is recommended that consumers should adopt firewall, antivirus, encryption and
authentic networks while using IoT devices in single board computing.
3.
Use encryption technique
It is a very effective approach for controlling and monitoring security issues in the
communication system. In the case of encryption technique users can security send and
receive data from one device to another in an effective manner. Moreover, the converted
signal cannot be tracked by hackers without using the private key produced by the sender.
So, by using such kinds of methods and techniques overall security of SBCs and IoT devices
can be increased and it also helps for reducing the issue of DOS attack from the system.
Conclusion
From the above discussion, it is concluded that single board computing is an effective
technology which can be used for controlling and managing computer networks and
devices. This report focused on security issues and problems linked with SBCs while using
the internet of things. It is identified that security is the biggest problem faced by
consumers and it occurred due to lack of proper authorization in the computer devices.
This study critically reviewed the features of SBCs technology and identified the best
wireless technology for performing communication between computer devices. Therefore,
it is recommended that consumers should adopt firewall, antivirus, encryption and
authentic networks while using IoT devices in single board computing.
3.

WIRELESS NETWORK 11
Bibliography
Bahga A and Madisetti VK, ‘Blockchain platform for the industrial internet of things' (2016)
9(10) Journal of Software Engineering and Applications 533
Ruen PCL and Leong KS, ‘A secure multi-hop routing for IoT communication’ (2014) 12(2)
IEEE World Forum on the Internet of Things (WF-IoT) 12-14
Cirani S and Picone M, ‘Wearable computing for the internet of things’ (2015) 17(5) It
Professional 35-41
Gongora A and Jimenez JG, ‘Enhancement of a commercial multicopter for research in
autonomous navigation’ (2015) 12(4) 23rd Mediterranean Conference on Control and
Automation (MED) 12-18
Hoidn OR and Seidler GT, ‘Note: A disposable x-ray camera based on mass produced
complementary metal-oxide-semiconductor sensors and single-board computers’ (2015)
86(8) Review of Scientific Instruments 086107
Solomon LS and Sandhya J, ‘IOT and GSM integrated multi purpose Security system’ (2018)
12(6) Fourth International Conference on Advances in Electrical, Electronics, Information,
Communication and Bio-Informatics (AEEICB) 15-18.
Kiong GC and Chockalingam L, ‘An integrated approach for head gesture based interface’
(2012) 12(3) Applied Soft Computing 1101-1114
Matthews S, Blaine R, and Brantly A, ‘Evaluating single board computer clusters for cyber
operations’ (2016) 14(8) International Conference on Cyber Conflict (CyCon US) 15-18
Merchant A and Ahire J, ‘Industrial Automation using IoT with Raspberry Pi’ (2017) 168(1)
International Journal of Computer Applications 5-8
Olson E and Shashidhar N, ‘Low Budget Forensic Drive Imaging Using Arm Based Single
Board Computers’ (2016) 11(1) Journal of Digital Forensics, Security and Law 3
Bibliography
Bahga A and Madisetti VK, ‘Blockchain platform for the industrial internet of things' (2016)
9(10) Journal of Software Engineering and Applications 533
Ruen PCL and Leong KS, ‘A secure multi-hop routing for IoT communication’ (2014) 12(2)
IEEE World Forum on the Internet of Things (WF-IoT) 12-14
Cirani S and Picone M, ‘Wearable computing for the internet of things’ (2015) 17(5) It
Professional 35-41
Gongora A and Jimenez JG, ‘Enhancement of a commercial multicopter for research in
autonomous navigation’ (2015) 12(4) 23rd Mediterranean Conference on Control and
Automation (MED) 12-18
Hoidn OR and Seidler GT, ‘Note: A disposable x-ray camera based on mass produced
complementary metal-oxide-semiconductor sensors and single-board computers’ (2015)
86(8) Review of Scientific Instruments 086107
Solomon LS and Sandhya J, ‘IOT and GSM integrated multi purpose Security system’ (2018)
12(6) Fourth International Conference on Advances in Electrical, Electronics, Information,
Communication and Bio-Informatics (AEEICB) 15-18.
Kiong GC and Chockalingam L, ‘An integrated approach for head gesture based interface’
(2012) 12(3) Applied Soft Computing 1101-1114
Matthews S, Blaine R, and Brantly A, ‘Evaluating single board computer clusters for cyber
operations’ (2016) 14(8) International Conference on Cyber Conflict (CyCon US) 15-18
Merchant A and Ahire J, ‘Industrial Automation using IoT with Raspberry Pi’ (2017) 168(1)
International Journal of Computer Applications 5-8
Olson E and Shashidhar N, ‘Low Budget Forensic Drive Imaging Using Arm Based Single
Board Computers’ (2016) 11(1) Journal of Digital Forensics, Security and Law 3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





