Question:
Discuss About The Research Directions For Internet Of Things?
It has been always made a point to technology freaks to undergo the faults and flaws of the upcoming and brand new technologies first, rather than only focusing on the valuable benefits of the service or product that has been provided. Internet of Thing (IoT) gets huge promotions over the scope of implementation. From past few years the platform of IoT has claimed to be one of the most collaborative enterprise segments in IT sector (Aazam et al., 2014). Though there are still some doubts over the inactive development and poor growth on IoT security aspects. Several time the loop holes and flaws has been proved by various sectors of media and experts in the connection of internet to various devices and servers. There are security challenges of Internet of Things and are need to be addressed soon. Thought it has been proven that emerging technologies faces fair share of disadvantages and criticism and thus technologies like IoT should not be discouraged from being developed and should have the approval of people. IoT applications security and examining framework are in the development, plays a vital role. Some of the journals and articles have explained the most important security concerns for creating more secure and attack proof IoT devices and applications.
The Internet of Things (IoT) is a progressive correspondence worldview that intends to deliver an imperceptible and inventive system to interface a plenty of advanced gadgets with the Internet. In this way, it plans to make the Internet more immersive also, unavoidable. The developing IoT showcase is continuously picking up energy as administrators, merchants, producers, and undertakings start to perceive the open doors it offers. Concurring to the most recent IDC forecast, the overall IoT market will achieve US $1.7 trillion out of 2020 up from US$655.8 billion out of 2014 with a compound yearly development rate of 16.9 percent. The gadgets alone are relied upon to speak to 31.8 percent of the adding up to overall IoT advertise in 2020. This more prominent level of the income in 2020 is normal through building IoT stages, application virtual products, furthermore, benefit related offerings.
Let us revise the basics of IoT. What is IoT: IoT refers to the terminology of Internet of Things that generally explains the scenarios of capabilities of the computer extended to objective, sensors and other daily items which are normally not to be considered as computers but electronic and digitalized device that can exchange, generate and consume data by decreasing the involvement of human activity (Botta et al., 2016). This up growing technology within any system helps the users to achieve much intense automation, analysis and integration. There has been an improvement in these area and hence in their accuracy. Utilization of present and upcoming technologies for networking, sensing and robotics is available in IoT.
It is always in requirement of high degree of trust for the usage of internet, application and the devices related to it. The technologies have to make sure the kind of activities that are required to perform online on the support of risk tolerance related to than activities. The Internet of Things is the same in such manner, and security in IoT is for the most part associated with the limit of customers to place stock in their condition. If people don’t believe their related contraptions and their information are sensibly secure from manhandle or naughtiness, the resulting crumbling of trust influences an aversion to use the Internet. Falling flat or failing gadgets additionally can make security vulnerabilities. Challenges in LoT devices for technical constraints and competitive costs to the manufacturing of adequate designing of security features and implementing those in these devices, hence potentially creating the security and longer maintenance vulnerability aspects than traditional computer counterpart. The opportunities of attack have increased with the rapid increase of the number and characteristics of devices because of the deficiency of potential security design. At the point when combined with the exceptionally interconnected nature of IoT gadgets, each inadequately secured gadget that is associated online conceivably influences the security and strength of the Internet all around, but not just by local interface. This has overall results to electronic exchange, specific progression, free talk, and in every practical sense each other piece of online activities. Definitely, ensuring security in IoT things and organizations should be seen as a best requirement for the territories. Insufficiently secured IoT contraptions could fill in as section centers for digital assault by allowing harmful individuals to re-program a device or make it glitch. Deficiently arranged contraptions can reveal customer data to thievery by leaving data streams inadequately secured. It is becoming hard day by day to purchase the devices because some of the vendors only make connected products rather than non-internet connected things. There is a requirement to secure the devices by keeping in mind that it is certainly not possible to make each and every device absolutely secure. The interaction will also increase with the increase number of internet services and devices along with the pathway for unauthorized people to gain the access of the devices.
These are the security reasons of IoT administrations as well as gadgets are noteworthy exchange point and ought to be viewed as a primary issue. We logically depend upon these devices for essential organizations, and their direct may have overall reach and impact.
There are several other aspects of IoT applications like the smart homes, connection cars, IoT in agriculture, energy engagement, IoT in Poultry and Farming and many more, for the betterment of people’s daily life.
As per the survey feedback received one asks “Will IoT actually work over the internet or will it have its own dedicated wide side network?” while someone other people have explained “Networking standards is still an issues and something that forums and standards bodies are trying to address. The IoT is a whole myriad of different ways of connecting things, it could be fixed Wi-Fi NFC, cellular, ultra-narrow band or even Zigbee.”
As far the knowledge gathered by the DNS DDoS attacks evidenced by the Dyn’s managed by the DNS server where IoT is already been working with the existing Internet. There are problems regarding the Interoperability of network and various wireless standards. While unsecured gadgets on the Internet being transformed into assault zombies are clearly an issue, there is no basis for setting up a different wide zone arrange for things. Indeed, even with the advantage of knowledge of the past, there’s very little opportunity to get better in the fundamental Internet convention suite (TCP/IP).
Similarly, on the second discussion, we can conclude that Wireless sensors, cellular etc. are found to be IoT applications, since IoT is the network of physically controlled objects and are monitored over the internet. The single most concerning issue with the first Internet Protocol Version 4 (IPv4) is that it accommodated a limited number of machine tends to utilizing a 32 bit number, IP locations will gradually change over to IPv6 after it was invented.
Hence, we can conclude that security and privacy aspect re critical to the IoT and thus needed to be taken care at every level since there is much more than dealing only with the transaction that can be handled by penalties in data breaching cases. Security is an empowering agent for a business to be led in a safe way which is straightforward and works in the background. It is an answer that gives a sensible affirmation to the business that the end client’s and their interests are protected from potential dangers by IoT. Subsequently, the IoT might utilize all around characterized norms for security which converse with security norms taking into account different enterprises and empowers organizations to think furthermore, act even-mindedly.
References
Aazam, M., Khan, I., Alsaffar, A. A., & Huh, E. N. (2014, January). Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. In Applied Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on (pp. 414-419). IEEE.
Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues. Computer Communications, 54, 1-31.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on industrial informatics, 10(4), 2233-2243.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294-1312.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Li, S., & Da Xu, L. (2017). Securing the Internet of Things. Syngress.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266-2279.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things Journal, 1(1), 3-9.
Tsai, C. W., Lai, C. F., & Vasilakos, A. V. (2014). Future Internet of Things: open issues and challenges. Wireless Networks, 20(8), 2201-2217.
Whitmore, A., Agarwal, A. and Da Xu, L., 2015. The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), pp.261-274.
Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120-134.
Zhao, K., & Ge, L. (2013, December). A survey on the internet of things security. In Computational Intelligence and Security (CIS), 2013 9th International Conference on (pp. 663-667). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download