Discuss about the Security Challenges in Emerging Networks.
The Internet of things or IoT can be defined as the network of various physical devices, home appliances, vehicles and many more, which enables these objects to connect as well as exchange confidential data [3]. Everything could be uniquely recognized with the help of the embedded computing system however has the ability in inter-operating within the Internet infrastructure that previously exists. This IoT or Internet of Things is responsible for allowing various objects that are to be sensed as well as controlled properly in the existing infrastructure of network. This helps to create opportunities for all the direct integration of various physical world with the several computer based systems. This eventually results in improvised accuracy, efficiency as well as economic benefits [11]. Thus, the human intervention is properly reduced and minimized to a greater extent. This Internet of Things could be easily augmented with the several sensors and actuators and hence all the technologies are eventually encompassed.
The following report will be outlining a brief discussion on the concept of Internet of Things or IoT and the various security challenges. The report will be divided into two parts. The first part is the literature review of Internet of Things. This part describes about IoT, Characteristics of IoT compared to the traditional network and three distinct areas of applications for Internet of Things. The second part of the report focuses on the three current or future security issues in IoT and its countermeasures.
Literature review of Internet of Things (IoT)
Introduction to IoT: The Internet of things is the basic system of various interrelated computing devices, digital machines, mechanical machines, people as well as animals, which are given for uniquely identifying anyone and also comprise of the ability for transferring data on the network without the need of human to computer or human to human interactions [8]. This IoT has evolved from the proper convergence of several wireless technologies, Internet, micro services, MEMS or micro electromechanical systems and many more. This convergence is helpful for tearing down all the silo walls within the OT or operational technology as well as IT or information technology. These allow unstructured machine generated data that is to be analyzed for the insights for driving improvements.
Characteristics of IoT compared to the traditional network: There are some of the major benefits or characteristics of Internet of Things over the traditional networks [1]. The first and the foremost difference between the IoT and traditional Internet is the identification of this content creation. There are various other important differences as well. For example, content within the traditional Internet is being consumed as per request [7]. This means the user has to ask any query, send any request or issue any search for the web services for the purpose of consuming the content. On the other hand, within the Internet of Things, this content could be eventually consumed by pushing this technology as the notification of an activity when the situation of interest could be detected. In most of the cases, this consumption refers to the combination of data from the various sources. This particular characteristic also occurs for traditional networks. Within the traditional network, this connection is done with the help of various physical links within the web pages. Within IoT, this amalgamation of data could be needed for detecting any situation. This could be easily manifested with the combination of data within the structure of event patterns that are context-based where all the data has the ability in determining the context as well as the pattern [10]. There is a difference within the consumer value. For the traditional network, this value helps to answer a question, which could be posed by consumer while searching for data or services. For the IoT, this value is the timely notification or action based on the situations that could be detected.
Key Factors |
Traditional Network |
Internet of Things or IoT |
1. Who is creating content? |
Human beings |
Machine |
2. How is this content being consumed? |
As per request |
This is done by pushing information as well as triggering actions [4]. |
3. How is this content being combined? |
By explicitly defined links |
By explicitly defined operators |
4. What is the value? |
By answering questions |
Action as well as timely information. |
Three areas of applications for IoT: The three areas of applications for IoT are Smart home, wearables and smart city.
Smart Home: Smart Home is the most significant application of IoT. This smart home eventually controls climate, appliances and entertainment systems. It is responsible for producing safer house environments [12]. When this is connected to the Internet connectivity, all the home devices become the major part of IoT or Internet of Things. The user interface that is utilized for system control utilizes the wall mounted terminals, desktops or tablets. It is the mobile application that is utilized for safety purposes.
Wearables: Wearable technology or wearables are several smart electronic devices, which are worn over the body as accessories or implants. All the wearable devices like activity trackers are the proper applications of Internet of Things that are extremely popular in today’s world [6]. The sensors effectively enable the objects for exchanging data through Internet and not involving human intervention.
Smart City: Smart city is the urban area, which utilizes various types of electronic sensors that help in collecting data and supplying information. This is utilized for the proper management of resources as well as assets efficiently and effectively [2]. The data is collected from the devices, citizens and finally assets that are being processed or analyzed for monitoring and managing transportation systems and traffic, networks of water supply, information systems, power plants and many more. This is the perfect amalgamation of Internet of Things or IoT and ICT or information and communications technology for optimizing efficiency of the operations or services.
Explanation and Analysis of Three security Issues in IoT: The three security issues in Internet of Things are as follows
Lack of Data Encryption: The first and the foremost security issue in Internet of things is the lack of data encryption. Due to this lack of data encryption, it often becomes a major issue for the users to secure their data from hackers.
Lack of Data Authentication: The second security issue in IoT is the lack of data authentication [9]. Data often loses its authentication as well as integrity within this technology.
Security-Side-channel Attacks: Security-side-channel attacks mainly focus on information as well as the procedure of presentation of that information. Thus, when the information is being checked or accessed on a timely manner, the hacker gets the access of the data and exploits it purposely.
Explanation of countermeasures and Mitigation Techniques and Tools for Every Security Issue: The countermeasures for three security measures are given below:
Lack of Data Encryption: This particular problem could be resolved by proper encryption strategies. Moreover, SSL or Secure Sockets Layer Protocol can be used when the data is online. SSL protocols help to properly encrypt the data without much hassle or problems [5]. The websites are mainly secured by this.
Lack of Data Authorization: This particular problem could be resolved by involving firewalls and antivirus. The antivirus software is utilized for securing the data properly and thus comprises of the feature for saving the authorization and integrity of the confidential data. Due to the presence of this software, the hackers would not get any access to the confidential data and hence the data could be saved. Moreover, firewalls help to detect any type of malicious activity.
Security-Side-channel Attacks: This particular problem could be resolved by involving proper strategies of Internet of Things or IoT [12]. It is extremely vulnerable for the users and their systems. Presence of firewalls is another important step for this.
Conclusion
Therefore, from the above discussion, it can be concluded that The Internet of Things or IoT refers to a specific computing concept, which describes the entire idea of regular physical objects that are being connected to the connection of Internet and has the ability for identifying themselves to all other devices. The term of IoT could be closely identified with radio frequency identifiers or RFID as a method for communication. This might also involve the other technologies of sensor, QR codes and the wireless technologies. This Internet of Things is extremely important since any object, which could easily represent them for becoming more active than the object. It is also referred to as ambient intelligence. The above report has outlined a brief discussion on the concept of Internet of Things or IoT and the various security challenges. The report is sub divided into two parts. The first part is the literature review of Internet of Things. This part has described about IoT, Characteristics of IoT compared to the traditional network and three distinct areas of applications for Internet of Things. The second part of the report has also focused on the three current or future security issues in IoT and its countermeasures.
References
[1] Wortmann, Felix, and Kristina Flüchter. “Internet of things.” Business & Information Systems Engineering 57, no. 3 (2015): 221-224.
[2] Yang, Shuang-Hua. “Internet of things.” In Wireless Sensor Networks, pp. 247-261. Springer, London, 2014.
[3] Gubbi, Jayavardhana, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. “Internet of Things (IoT): A vision, architectural elements, and future directions.” Future generation computer systems 29, no. 7 (2013): 1645-1660.
[4] Zanella, Andrea, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, and Michele Zorzi. “Internet of things for smart cities.” IEEE Internet of Things journal 1, no. 1 (2014): 22-32.
[5] Da Xu, Li, Wu He, and Shancang Li. “Internet of things in industries: A survey.” IEEE Transactions on industrial informatics 10, no. 4 (2014): 2233-2243.
[6] Perera, Charith, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. “Context aware computing for the internet of things: A survey.” IEEE communications surveys & tutorials 16, no. 1 (2014): 414-454.
[7] Cui, Xiaoyi. “The internet of things.” In Ethical Ripples of Creativity and Innovation, pp. 61-68. Palgrave Macmillan, London, 2016.
[8] Stankovic, John A. “Research directions for the internet of things.” IEEE Internet of Things Journal 1, no. 1 (2014): 3-9.
[9] Al-Fuqaha, Ala, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. “Internet of things: A survey on enabling technologies, protocols, and applications.” IEEE Communications Surveys & Tutorials 17, no. 4 (2015): 2347-2376.
[10] Chandrakanth, S., K. Venkatesh, J. Uma Mahesh, and K. V. Naganjaneyulu. “Internet of things.” International Journal of Innovations & Advancement in Computer Science 3, no. 8 (2014): 16-20.
[11] Mukhopadhyay, Subhas Chandra, and N. K. Suryadevara. “Internet of things: Challenges and opportunities.” In Internet of Things, pp. 1-17. Springer, Cham, 2014.
[12] Whitmore, Andrew, Anurag Agarwal, and Li Da Xu. “The Internet of Things—A survey of topics and trends.” Information Systems Frontiers 17, no. 2 (2015): 261-274.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download