Explain the major methodologies for secure networks and what threats they address. Identify and report network threats, select and implement appropriate countermeasures for network security.
The interest of internet of things has grown from last years. Internet of things plays an important role as it has changed the living standards of people and has altered the business models. This report consists of the usage of internet of things in different applications which is rising rapidly in the coming years. This report consists of detail description about features of IoT and the applications where they are used. It helps the devices to communicate with each other remotely without any human efforts. The main motive behind IoT is to offer a smart environment and allowing the data to be accessed only by authorised users. Internet of things is a booming technology that allow any business and service to access the data from anywhere at any time[1]. This also leads to various attacks which may violate the privacy of the network, all such cases has been future discussed in this report. This report also highlights the major security issues that arises in the system due to IoT and the count measures used to remove the flaws as also been discussed.
According to [2], Internet of things is a new concept which has changed the working of an environment. It can be seen as a network of physical devices which are embedded along with software’s. It makes all the devices unique by identifying them through the system. Internet of things makes possible that all the system are controlled remotely by offering more opportunities. Internet of things has resulted in improving the efficiency and economic benefit of an organisation by reducing the human efforts. Internet of things makes use of technology which helps in tracking the inventory and also provides control measures. Internet of things covers all the smart devices and objects that are connected to internet. Thus all the devices connected through internet form up a system, and such a system is termed as internet of things. It is a smart feature that helps devices to communicate with each other and complete the work automatically without any human involvement [3]. Every device is connected to each other through internet that allows user to access the devices remotely.
In the views of [4], Internet of things make possible to access all the devices remotely by a single devices. The process covers the connection of devices by capturing all the data through sensors and then stores over big data. It makes use of artificial intelligence to analysis the communication over network. It offers huge benefits to smart applications and stakeholders to get tangible benefits.
According to [5], Internet of things is a popular used technology and has covered almost all the domain like agriculture, healthcare, mining and storing of data in an innovative system. Internet of things can be seen as a secure place to secure the network and improve the efficiency. Internet of things cover three C’s that is communication, control and automation and cost saving. IoT helps in communicating with people and system to keep track of all the information. It also helps business to control the work remotely by possibly delivering all the response to the end users [6]. It also saves the overall cost of the business by improving the overall performance. It also improves the customer’s engagement by attracting more audience and improving their experiences by technology optimization. It improves the way in which management of resources is done by analysing the data in an effective manner.
It offers interconnectivity among all the devices over the globe. Internet of things is better than the old tradition methods as it is capable of providing privacy protection between the devices by making them connected to each other virtually. It covers all the devices that are different in terms of hardware platform. The traditional methods do not allow devices and services to interact through each other over a different network. Internets of things make this possible for all the devices to interact on a platform through different network. The traditional method did not allow any devices to change their state dynamically. The enormous scale of devices is managed altogether with the help of internet of things [7]. It also helps in data handling by interpreting data easily. Internet of things also offers better safety as compare to old traditional method. It secures the end points of the network by enabling accessing over a network. It offers better characteristics as compared to rational method as it is cost effective approach that offers high security and privacy of network.
Internet of things is often used in home security that helps in monitoring and controlling the applications and smart devices. It also helps in making right decisions as more information is stored at a single place. It also saves the overall time by monitoring the devices digitally. It allows machines to interact with each other without human intervention [8]. The biggest advantage of interne of things as compare to traditional method is money.
Internet of things uses many devices that are connected over the network with the ability to transfer data. There are various home applications where IOT devices are used like in hardware’s, sensors, communication technology, network technology, software’s and algorithms, signal processing and various security and privacy technology.
The devices that are connected through a network include smart TVs, speakers and many more smart appliances [9]. The Internet of Things refers to the ever-growing network of all the physical devices that include vehicles, software’s, actuators and other objects that enables the connectivity to exchange the data.
Internet of things has various applications and is used in diverse areas.
Apart from proving carious benefits internet of things offers threats in daily life as well. Security threats are related to the loss of information or service. Internet of things also affects the physical security of network. It is necessary to consider the importance of security in the applications of IoT to protect all the data from the threats [12]. It is important to secure the channels as privacy of information is significant. Some of the security threats that are caused due to internet of things are:
Internet of things has changed the living style in the society. They offer various issues that need to be resolved. So, some mitigation techniques have been discussed to secure the network.
Conclusion
It can be concluded from this report that internet of things has advanced the living standard in the society by offering various services that are automatic and easily access from anywhere. Internet of things can be seen as a technology to improve the flexibility among users.in this report the analyses has been done upon the how internet of things is better than the old traditional methods. Apart from that it has covered devices in very field thus various devices that are used in IOF has been discussed. This report also throws the limelight on the applications that are offered by internet of things. Apart from that they offer various security issues that have discussed and their countermeasures have also been discussed
References
[1] F, Wortmann, and F Kristina. “Internet of things.” Business & Information Systems Engineering 57, no. 3, pp. 221-224, 2015
[2] A, Osseiran, E, Omar, JaeSeung Song, and M Jose. “Internet of Things.” IEEE Communications Standards Magazine 1, no. 2 , pp. 84-84, 2017.
[3] S, Chandrakanth, K. Venkatesh, M, Uma and K. Naganjaneyulu. “Internet of things.” International Journal of Innovations & Advancement in Computer Science 3, no. 8 pp. 16-20, 2014
[4] Da Xu, Li, Wu He, and Shancang Li. “Internet of things in industries: A survey.” IEEE Transactions on industrial informatics 10, no. 4 (2014): 2233-2243.
[5] M, Bawa, C, Dagma, S, Ivan and S, Daniela. “Importance of internet of things and big data in building smart city and what would be its challenges.” In Smart City 360°, pp. 605-616. Springer, Cham, 2016.
[6] M, Georgescu and P, Daniela. “The Importance of Internet of Things Security for Smart Cities.” In Smart Cities Technologies. InTech, 2016.
[7] G, Ho, L,Derek,M, Pratyush ,H, Ashkan , S, Dawn and W, David. “Smart locks: Lessons for securing commodity internet of things devices.” In Proceedings of the 11th ACM on Asia conference on computer and communications security, pp. 461-472. ACM, 2016.
[8] Maheshwari, Ankit, K, Akash and S, Atul. “MANAGING INTERNET OF THINGS (IoT) DEVICES BASED ON ELECTRICAL POWER RELIABILITY.” U.S. Patent Application 15/266,780, filed March 15, 2018.
[9] Kamath, H, Srikanth, P, Suyashi, and T, Kar. “Security Issues in Internet of Things.” International Journal of Emerging Research in Management &Technology 6, no. 5, pp-260-264, 2017.
[10] Whitmore, Andrew, A, Anurag and Li Da Xu. “The Internet of Things—A survey of topics and trends.” Information Systems Frontiers 17, no. 2 ,pp- 261-274, 2015.
[11] S., Sicari, A., Rizzardi, L.A Grieco,. and Coen-Porisini, A., Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, pp.146-164, 201
[12] Sadeghi, Ahmad-Reza, Christian Wachsmann, and Michael Waidner. “Security and privacy challenges in industrial internet of things.” In Proceedings of the 52nd annual design automation conference, p. 54. ACM, 2015.
[13] Conti, Mauro, Ali Dehghantanha, Katrin Franke, and Steve Watson. “Internet of Things security and forensics: Challenges and opportunities.” pp-544-546, 2018.
[14] Sadeghi, R, Ahmad, W Christian, and W Michael. “Security and privacy challenges in industrial internet of things.” In Proceedings of the 52nd annual design automation conference, p. 54. ACM, 201
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download