Internet of Thing is referred to as an intelligence collaboration of miniaturized sensor that has new challenges in the field of security and end-user privacy. For any technology their users are one of the important assets therefore, data security and maintenance of confidentiality is very crucial. Nowadays, technology is the driving factor and in Internet of things security and protection of data is required (Want & Dustdar, 2015). However, it has been found that lack of data privacy is the biggest challenge in IOT.
IOT is engaged to create smart home, smart city, and smart wear such as smart watch IOT is used as a revolutionary ladder of success. Though the technology is expensive but still the usage of IOT increases the overall system efficiency.
Different tools such as open source prototyping platform, advanced hardware and software are used to develop an IOT based system (Mahmoud et al., 2015). An interactive electronic hardware and a set of IDE software are the useful tools for developing IOT systems.
From the overall analysis various challenges continuously facing by the users will be identified and due to lack of data protection how the users are getting affected in their daily life styles will be found (Grace et al., 2014). In addition to this, different technologies will be highlighted those are helpful to overcome the previously determined issues.
IOT is consists of technologically advanced objects those have the ability to transfer information. It could potentially sense, monitor, react and even control the human behavior. In the field of health and exercise, transportation, home, business and even for managing waste IOT technology is widely used in daily life.
In Internet of Things (IOT), almost all layer of the network architecture are getting affected. Both in OSI and TCP/IP models, the transport layer, network layer and physical layers are attacked by the external attackers during manufacturing, installation and operation period also. Each and every phase of IOT faces major challenges (Singh & Singh, 2015). The challenges of IOT are as follows:
Security concern: Already there are many advanced interconnected devices in the field of IOT in market are even in the upcoming future the amount of usage will increase rapidly. Thus, security policy in IOT cannot be stated as an afterthought. If the interconnected IOT devices are not secured enough then the external attackers will use them as the entry point to harm the devices individually and even the network collectively (Sadeghi, Wachsmann & Waidner, 2015). As a result the confidential data will be lost or explored publically. Due to this the existing trust between the service provider and the users will be affected entirely. If the platform fails to reach the security of the system then the entire process will be a failure.
Trust and privacy: With the usage of remote sensor, monitoring activity has become very much efficient. The case sensitivity is very high for IOT, thus the platform must determine the data ownership. It means that all information is not accessible for everyone. Only the authorized users are capable to access data from the storage region. With the help of third party vendor, recently two high profile security breaches are in the target. Compliances are referred to as major issues in the field of medicine and daily home applications (Alur et al., 2016). If the privacy is interrupted then the trustworthiness between the service providers and the users will also be affected eventually.
Complexity an integration based issue: In case of IOT, multiple number of platforms, protocol and application programming interfaces are used. While integrating all the components together, rapid evolution of API is found to be as a major challenge (Pradeep et al., 2016). The slower adaptation and resource requirement for unanticipated development will influence the general revenue of the enterprises those are using IOT in their daily applications. In order to resolve these issues, additional funding and setup of longer runways are needed.
Evolving architecture and competition: IOT is a completely new technology, thus the design architecture is also very much advanced. The experts involved in the implementation, faces challenges while developing and implementing the designed architecture (Thomas, Paul & Irvine, 2015). If the experts are not familiar with the new technologies then, from planning up to development and implementation the process will be interrupted.
Data challenges: In order to develop an IOT, many data are required in terms of resource. Big data Hadoop tools plays an effective role for making decision. If all required data are not gathered correctly then, the platform will face challenge. Even for providing horizon scalability and flexibility to the user’s affordable and economically supported technology is needed (Sajid, Abbas & Saleem, 2016). If any single data stored in the data storage is destroyed then that data cannot be recovered easily.
Consumer privacy: Not only service but also privacy of the users is another challenge in IOT. The private and confidential information of the users are stored in the data server. Those data are required to be secured enough so that unauthenticated users cannot access and misuse those data (Joshi, Kumari & Srivastava, 2016). The challenges of securing personnel information is a major challenge in IOT. Moreover, in metering equipments and digitized automobiles the consumers are facing major challenges.
Not only in application but also in all the phase of implementation such as initiation, planning, executing and continuous development the technology is facing challenges throughout. The outbreak of IOT is very much interesting because the usage of internet services is increasing widely and rapidly for interconnecting human and devices at the same time. All the devices developed by using the concept of IOT are based on growing computer power. Most of the IOT devices are developed to spy on the consumers (Thomas, Paul & Irvine, 2015). The large corporations are not getting commercial benefit from the smart machines rather the enterprises are gaining benefit from the big data. In all IOT devices sensors are used and these sensors are focused to collect different confidential data of their users and deliver them back to the company for analyzing more details. Thus, it could be said that the privacy of the system is very much critical.
IOT has become very popular nowadays, thus the manufacturing companies are literally manipulating rather forcing the consumers to buy their brand products. The smart devices have simplified the daily work burden and also serve limitless offers to the users (Sadeghi, Wachsmann & Waidner, 2015). Not in a single phase rather in all field such as agriculture, health, business IOT are widely used.
During analysis it has been found that besides IOT there are many technologies that are widely used by the users and even by the big enterprises. The usefulness of the technology implies that it helps to reduce the daily work pressure of the users and also increases the working efficiency. The relevant technologies are as follows:
Big data: Big data is an analytical tool that is used by many large organizations. The term describes a large volume of both structured and unstructured data set. It helps to inundate a business operation on a daily basis. The amount of data is not important, how a business organization is utilizing the data is important (Joshi, Kumari & Srivastava, 2016). This analytical tool provides an effective direction to the businesses for making strategic business moves.
RFID: Radio Frequency identification device is referred to as one the most widely used technologies a substitute of barcode. In previous days barcodes are used to store information about the product and items served by different industries but currently RFID are used that help to store more amount of data in their data storage. It reduces the time also.
Business intelligence: In order to track information about products or items different BI software are used by the organizations. It helps to take effective decisions also.
The industry influencers and other prominent stakeholders believe that big data has become a game changer for the businesses and organizations. The big data tool helps to make effective organization supportive decisions and provides a large set of opportunity to the market leaders (Alur et al., 2016). It also offers new services and products at the same time that will utilize the big data, even the existing service will be developed by using this technology.
The prebuilt BI serves intuitive and role based intelligence to the business organizations from the front line employees to the senior management authority. It also helps to make better decision making approaches and actions at the same time (Joshi, Kumari & Srivastava, 2016). In addition to this, it also helps to design a heterogeneous environment for the users.
Almost in all technical development sections, IOT is used, but in all field of application the usage of IOT is not found to be enough efficient. As IOT serves a connected network of devices thus the government is able to gather more amounts of data from the interconnection. The global infrastructure of information society enables advanced services to the users by interconnecting different devices over the network system (Pradeep et al., 2016). Some existing and evolving interoperable information and communication technology should not utilize IOT for increasing the working efficiency.
Conclusion
From the overall discussion it can be concluded that, IOT act as a technical driver. The design phase of IOT is very much faster but many major challenges are associated to it. IOT uses different information sensing and monitoring devices like executive network and RFID. In combination with the internet services different objects and information of IOT provides collision oriented problems. Different security threats and problems of IOT are elaborated in this report. In addition to this, the background of the usage of internet of things, scope of the IOT engagement, different tools that are used to develop an IOT and its impact in real life application also illustrated in this report.
References
Alur, R., Berger, E., Drobnis, A. W., Fix, L., Fu, K., Hager, G. D., … & Rexford, J. (2016). Systems Computing Challenges in the Internet of Things. arXiv preprint arXiv:1604.02980.
Chen, S., Xu, H., Liu, D., Hu, B., & Wang, H. (2014). A vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet of Things journal, 1(4), 349-359.
Fantacci, R., Pecorella, T., Viti, R., & Carlini, C. (2014). A network architecture solution for efficient IoT WSN backhauling: challenges and opportunities. IEEE Wireless Communications, 21(4), 113-119.
Grace, P., Barbosa, J., Pickering, B., & Surridge, M. (2014, December). Taming the interoperability challenges of complex iot systems. In Proceedings of the 1st ACM Workshop on Middleware for Context-Aware Applications in the IoT (pp. 1-6). ACM.
Hassanalieragh, M., Page, A., Soyata, T., Sharma, G., Aktas, M., Mateos, G., … & Andreescu, S. (2015, June). Health monitoring and management using Internet-of-Things (IoT) sensing with cloud-based processing: Opportunities and challenges. In Services Computing (SCC), 2015 IEEE International Conference on (pp. 285-292). IEEE.
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., & Gabrys, B. (2016, July). The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Evolutionary Computation (CEC), 2016 IEEE Congress on (pp. 1015-1021). IEEE.
Joshi, D., Kumari, C., & Srivastava, A. (2016). Challenges and data mining model for IoT. Int. J. Eng. Appl. Sci. Techn, 1(3), 36-41.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT) security: Current status, challenges and prospective measures. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 336-341). IEEE.
Pradeep, S., Kousalya, T., Suresh, K. A., & Edwin, J. (2016). IoT AND ITS CONNECTIVITY CHALLENGES IN SMART HOME.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in industrial internet of things. In Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE (pp. 1-6). IEEE.
Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4, 1375-1384.
Singh, D., Tripathi, G., & Jara, A. J. (2014, March). A survey of Internet-of-Things: Future vision, architecture, challenges and services. In Internet of things (WF-IoT), 2014 IEEE world forum on (pp. 287-292). IEEE.
Singh, S., & Singh, N. (2015, October). Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce. In Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on (pp. 1577-1581). IEEE.
Thomas, D., Paul, G., & Irvine, J. (2015). Going beyond the user—the challenges of universal connectivity in IoT. In Wireless World Research Forum Meeting 35 (WWRF35).
Want, R., & Dustdar, S. (2015). Activating the Internet of Things [Guest editors’ introduction]. Computer, 48(9), 16-20.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download