Internet of Things is one of the technologies that is using at almost every area to reduce human efforts over performing any of the task. IOT connects people with the things that are further connected with sensors or software. IOT is changing the world and helping in making it digital. Each person can access its services even sitting their homes with the help of strong internet connection as now IOT smoothen the life of each individual. The particular technology is used over different areas as a solution of various problems like- IOT in Smart homes, IOT in Smart Cities, IOT in Healthcare, IOT is smart retailing etc. Along with various benefits, it also consists of some security issues that must be kept into consideration while talking about the use of IOT devices. The following research is made to analyze, detect and prevent cyber-attacks over IOT networks. SDN (Software Defined Networking) based solution is proposed under the research in order to detection and prevents the cyber security issues over IOT networks in order to prevent its users from various security implications (Lee, 2017).
Section 1: Significance of the research
The selected research area is very much important to consider because it consists of large number of users all around the world and any of the security issue in-between IOT device can affect large number of community people. The proposed research is very much significant and interesting because today IOT is using in each home and office in order to reduce human efforts and enhance the rate of productivity so its security is very much important to consider as any of the issue in this can affect the overall working schedule of its users.
Section 2: How original is the approach?
The selected research area is very much important to consider because it consists of large number of users all around the world and any of the security issue in-between IOT device can affect large number of community people. The proposed research is very much significant and interesting because today IOT is using in each home and office in order to reduce human efforts and enhance the rate of productivity so its security is very much important to consider as any of the issue in this can affect the overall working schedule of its users (Joseph Muniz, 2018).
Section 3-4: Literature review in the area what you are working
Internet of Things works as a connector that is responsible for connecting different things with each other with the help of sensors, software and internet connection. IOT is becoming the basic need of every individual and utilized in different areas so its security architecture and requirements needs to be properly formulated in highly efficient manner. A federated architecture approach is introduced under the research to manage and maintain the security of internet of things. It is found that the proposed design architecture is highly able to exchange data and devoted to deploy a federated identity based environment along with dynamic context information. Protocol description and security management is still needs to be consider as per the usage of crypto engines (Martin C. Libicki, 2015).
IOT is deploying in different buildings and homes and its deployment results in high level of comfort ability along with high rate of energy efficiency but along with such positive points it also consists of various cyber-attacks and issues like- network intrusions through linked IOT devices. Traditional software based security systems are not beneficial over here due to low latency and power requirements for securing IOT network. Online sequential learning accelerator is proposed under the research for detecting the intrusion over IOT networks which measure low and fast power NIDS based on the design of software and hardware along with sequential learning to adopt new threats. Some of the future work is still pending like- investigation of detection speed with deeper neural networks and consideration of memory constraints for more energy efficiency and accuracy (C. Analide, 2017).
Internet of Things inter-connects smart homes, buildings and cities along with connecting things with mobile and computer devices. IOT also connects gas, electric grids, automobiles, airplanes and water networks. IOT based security framework is introduced under the research for the smart cyber infrastructures. A general threat model is also proposed under the research that will help in getting proper protection from various cyber-attacks. It is found that ABA-IDS (Anomaly Behavior Analysis- Intrusion Detection System) can help in detecting and classifying wide range of attacks over IOT sensors.
Internet of things can be said as the networking of various physical devices. IOT consists of large number of users all around the world so its various security measurements are important to consider. The research is made on examining the growth rate of IOT based Ransom ware in order to detect and control it by making use of commands and blacklisting technique. Ransom ware attacks statistics are also analyzed under the report to understand the requirements more effectively. The proposed model observes the traffic over TCP/IP (Transmission control protocol / Internet protocol) with the help of Web Proxy server and then extraction is made for the header of TCP/IP (C. Analide, 2017).
Section 5: Research gap
With the increased use of internet of things in regular life of individuals, various security implications are occurring over it. IOT devices are becoming the target of various cyber-attacks and it becomes necessary to overcome all those risks before their occurrence because IOT is using by almost 76% percent users all around the world and any of the issue in it can affect large amount of its users all around the world. SDN (Software Defined Networking) approach is used under the research to data an information that resides and stores under IOT devices that makes use of software, sensors or internet connection (Lee, 2017).
Section 6: Aim of your research
The aim of overall research is to analyze the number of cyber security attacks over IOT networks in order to detect them to prevent the users of IOT from its various security issues. The objective is to make the technology more secure for its users all around the world as there are 75% of users which are utilizing the benefits of IOT in different areas and in different modes (Nik Bessis, 2012).
This research seeks to establish answers and solutions to the challenge of cyber-attacks over IOT networks. In order to meets its objectives, the research thus seeks to establish a system that can be used to prevent cyber-attacks on internet of things network systems. Following the nature of this research, qualitative research approach will be deployed in finding and meting the aims and objectives of the research question. The nature of this research is such that it needs to explore into depth cyber-attack problems in internet of things network systems. An extensive comprehension of the nature of the attacks and thereby making proposals on the probable solutions is thus deemed fit and most accurate way of going about this research.
Secondary data would be appropriate for this research. Secondary data is data that was collected and organized by another individual other than the user. Sources of secondary data include information from books, peer reviewed journals and publications. There is a lot of information, guidelines and proposals made by preceding scholars and experts in the field of information technology that if are properly reviewed would prove useful in establishing the solutions to cyber-attacks on internet of things systems. A benefit that comes with secondary data is the availability of a lot of preliminary work done and the data is normally in very organized forms for example printed or electronic formats making it easy to extract the required information. Accessibility of this data is as well less of a challenge as the data be availed to the public knowledge through the use of the various forms of the media.
As a result of the exposure of information from secondary sources to the public, it attracts higher legitimacy levels and can be used to verify primary data. Through the unlimited range of information available from the various sources of secondary data, making comparison is highly enhanced. It will thus be possible for the researcher to compare information and perspectives of the various experts. In so doing, a solid and concrete solution to the research question will be established. While extracting data from the secondary sources, it will be of essence to ensure that the most relevant and up to date information considered. In as much as there might be a lot of information available from various scholars and researchers that would be helpful in answering the research question, the most up to date data tend to be more useful as they address the issues that exist in the contemporary society.
Following are the deliverables of proposed research proposal that needs to be put under the lights-
Following figure consists of work breakdown structure that is designed to complete the project within the specified timescale. It’s like a project plan that needs to be followed properly in order to get the resultant outcome at the end of the research.
Task Name |
Duration |
Start |
Finish |
Predecessors |
Cyber-attacks detection and prevention systems for IOT networks |
Mon 2/26/18 |
Wed 5/30/18 |
||
Information collection |
13 days |
Thu 2/26/18 |
Fri 3/9/18 |
|
Gather required info |
5 days |
Mon 2/26/18 |
Fri 3/2/18 |
|
Gather facts |
4 days |
Fri 3/2/18 |
Tue 3/6/18 |
3 |
Prepare Research question |
4 days |
Tue 3/6/18 |
Fri 3/9/18 |
4 |
Information gathered |
0 days |
Fri 3/9/18 |
Fri 3/9/18 |
5 |
Journals |
14 days |
Fri 3/9/18 |
Thur 3/29/18 |
|
Gather appropriate journals |
5 days |
Mon 3/9/18 |
Fri 3/16/18 |
6 |
Analyze journals |
4 days |
Fri 3/16/18 |
Thur 3/22/18 |
8 |
Finalize journal |
5 days |
Thur 3/22/18 |
Thur 3/29/18 |
9 |
Journals analyzed |
0 days |
Thur 3/29/18 |
Thur 3/29/18 |
10 |
Select Qualitative technique |
44 days |
Thur 3/29/18 |
Wed 5/30/18 |
|
Analyze other related journals |
6 days |
Thur 3/29/18 |
Fri 4/6/18 |
11 |
Define aim |
5 days |
Fri 4/6/18 |
Fri 4/13/18 |
12 |
Define objective |
6 days |
Fri 4/13/18 |
Mon 4/23/18 |
12 |
Select Qualitative approach |
4 days |
Mon 4/23/18 |
Fri 4/27/18 |
12 |
Create SDN clusters |
6 days |
Fri 4/27/18 |
Mon 5/7/18 |
13 |
Connect IOT devices |
6 days |
Mon 5/7/18 |
Wed 5/16/18 |
17 |
Use propose solution to analyze traffic behavior |
5 days |
Wed 5/16/18 |
Wed 5/23/18 |
18 |
Gather expected outcomes |
2 days |
Wed 5/23/18 |
Mon 5/27/18 |
19 |
Results gathered |
0 days |
Mon 5/27/18 |
Mon 5/27/18 |
20 |
Define Future work |
3 days |
Mon 5/27/18 |
Thur 5/30/18 |
21 |
Present research results |
0 days |
Thur 5/30/18 |
Thur 5/30/18 |
22 |
The overall project will get completed within the specified time duration of 77 days and ensures the quality of the research. The overall research is started on (22/03/2018) and will get completed on (07/06/2018).
Following Gantt chart is the graphical representation of above mentioned work break down structure which will help the research team to carry out their research in most effective manner.
The expected outcome of the research is that the cyber-attacks will be detected and prevented by making use of tracking of anonymous behavior of the users over the network of IOT. The research will be beneficial for 75% of those users who are utilizing the benefits of IOT and can affect with various security issues over IOT networks (Babak Akhgar, 2016).
Week |
Task |
1. |
Collect required information and facts about the use of internet of things. |
2. |
Preparation of research question i.e. detection and prevention systems for cyber-attacks in IOT networks. |
3. |
Appropriate journal papers will be examined form the Google Scholar or IEEE explore. |
4. |
Qualitative technique is utilized to carry on the research in well effective manner. |
5. |
Five journal papers are examined properly in order to understand their findings and research gap. |
6. |
Aim and objective of the research will found and documented properly so that the resultant outcomes can be as per the decided ones. |
7. |
Qualitative approach will be used to carry forward the research in most efficient manner. |
8. |
SDN clusters will be made in order to proceed the proposed solution (Martin C. Libicki, 2015). |
9. |
The SDN clusters will be directed by the Master SDN cluster as Master SDN Cluster will be responsible for the overall working of the proposed solution. |
10. |
The IOT devices will be connect with SDN switches of each of the cluster. |
11. |
Then anonymous traffic behavior will be detected with the help of proposed solution. |
12. |
Then expected outcomes, future work and overall result of the research will be documented properly. |
Conclusion
The above research is made to propose a technique, method of system that can help in detecting and protecting the cyber-security issues over IOT networks for the people who are utilizing IOT in their daily life for getting essence in their day-to-day work. SDN based solution is provided under the research to detect the anonymous traffic over the network so that it can be reported and blocked instantly (Benny Mandler, 2016)
References
Arun Kumar Sangaiah, A. T. (2017). Cognitive Computing for Big Data Systems Over IoT: Frameworks, Tools and Applications. Sydney: Springer.
Ayala, L. (2016). Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention. Alhambra: Apress.
Babak Akhgar, B. B. (2016). Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities. London: Springer.
Benny Mandler, J. M.-B.-L. (2016). Internet of Things. IoT Infrastructures: Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part 1. London: Springer.
Brian Russell, D. V. (2016). Practical Internet of Things Security. New York: Packt Publishing.
Brooks, T. T. (2017). Cyber-Assurance for the Internet of Thing. New York: John Wiley & Sons.
Analide, P. K. (2017). Intelligent Environments 2017: Workshop Proceedings of the 13th International Conference on Intelligent Environments.London: IOS Press.
Daimi, K. (2017). Computer and Network Security Essentials. London: Springer.
Isafiade, O. E. (2016). Data Mining Trends and Applications in Criminal Science and Investigations. Colorado: IGI Global.
Joseph Muniz, A. L. (2018). Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer. New York: Pearson Education.
Lee. (2017). The Internet of Things in the Modern Business Environment. New York: IGI Global.
Li, S. (2017). Securing the Internet of Things. Beijing: Elsevier Science.
limited, A. C. (2013). ECCWS 2017 16th European Conference on Cyber Warfare and Security. Oslo: Academic Conferences and publishing limited.
Martin C. Libicki, L. A. (2015). The Defender’s Dilemma: Charting a Course Toward Cybersecurity. California: Rand Corporation.
Nathalie Mitton, H. C. (2017). Interoperability, Safety and Security in IoT: Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers. Chicago: Springer.
Nik Bessis, F. X. (2012). Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence. London: Springer.
Sabina Jeschke, C. B. (2016). Industrial Internet of Things: Cybermanufacturing Systems. Oxford: Springer.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download