This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Internet of Things

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Internet of Things

 

 

Abstract

This study includes the look at the work of few recent articles on Internet of Things. The goal of this study is to show how IoT help individuals and organizations to gain an immense amount of benefits. Secondly, the purpose of this study is to show some of the recent security concerns and issues related to IoT. At last, possible solutions for such security issues are also discussed.

 

Contents

Abstract 2

Introduction 4

Internet of Things: Literature review 4

Current/Future security issues 6

Possible solution for threats 7

Solution possible for Unauthorized Access 7

References 8

 

 

 

Introduction

Internet of Things (IoT) is not only a developmental thought that is intended to link the gap between clients and their assorted devices or gadgets. Security of devices is a major factor with regards to an internet of things, this is mostly a direct result of how much information and data is at risk if the IoT is traded off. This study includes a literature review of articles which provide brief and depth knowledge of IoT and describes that IoT depends on the remarkable idea that ordinary gadgets can exchange as well as communicate information with each other. This makes difficult activities considerably more straightforward and also streamlines botheration of managing such a significant number of electronic gadgets. This idea would already take a shape of smart homes, computerization, smart frameworks, and so forth. They all easily deal with different gadgets and tremendous measures of information being shared continually on a few distinct networks. Security issues of IoT are also included in this study such as Privacy Concerns, Updates & Patches, and Unauthorized Access. Finally, some possible solutions for the unauthorized access security issue of IoT are also highlighted such as strong usernames and passwords for IoT devices and they must be updated on regular basis.

Internet of Things: Literature review

According to Daniel Burrus one trendy expression in the era of Information Technology is IoT. What’s to come in upcoming days is IoT, which will alter this present actual object into a smart implicit object or thing. The IoT plans to bring everything together in the real world under a distinctive framework, giving users a power not only to control things around them, as well as keeping everyone informed about the condition of the objects or things. Bekera’s present investigation addresses IoT ideas through a deliberate survey of academic research papers, proficient talks with specialists, business white papers, as well as online databases. In addition, this examination object concentrates on beginnings, definitions, attributes, essential prerequisites, and assumed names of IoT [1]. The principal target of author’s paper is to give an outline of IoT, structures, and crucial innovations and their uses in our day to day life. However, this composition will give great understanding for the new experts or researchers, who need to do investigation in this IoT fields as well as encourage learning aggregation in proficiently. The advancement of IoT is fundamentally determined by requirements of vast organizations that remain to proceeds particularly from the prescience and constancy managed by capacity to absolute all objects with aware chains where objects are installed. The capability to come along with track objects completely enabled organizations or individuals to become plainly more proficient, step up forms, lessen mistake, avoid robbery, and join flexible and adaptable authoritative frameworks through IoT. As indicated by Delgado Internet of Things is a mechanical revolution that speaks very much about eventual fate of communication as well as computing, and its advancement relies upon vibrant specialized development in various imperative fields, from distant sensors to the nanotechnology [8]. IoT is a new change in perspective in IT department. The expression Internet of Things that is additionally in the blink of an eye surely unspoken as IoT is authored from basic two words, the primary word is the Internet and other one Things. The Author said that as everyone is aware that the Internet is global arrangement of consistent PC networks that utilize the standard Internet meeting suite to provide millions of clients all over the entire world. IoT is like a system of networks that comprise immense number of open, private, scholarly, business, as well as government networks, of the neighborhood to a international expansion, that are associated by a broad exhibit of electronics, remote as well as optical systems administration advancements. Nowadays more than two hundred nations are associated into the trades of data or information, news, plus suppositions through the Internet or the web [10]. There is no interesting definition accessible for the IoT that is worthy of the global group of customers. Truth be told, there is a broad range of groups including analysts, academicians, specialists, trend-setters, engineers and corporate persons that characterized the expression, instead of this that IoT’s underlying usage is been credited to Mr.Kevin Ashton, expert of computerized development. The great division of definitions likely has possibility that primary variant of the web or the Internet was about data made by persons, while the subsequent form is about data prepared by things. For effective execution of IoT, there are requirements, for example, dynamic asset request, exponential development of interest, real-time requirements, availability of utilization, as well as data security and client privacy. Primary issues with the Internet of Thing is that IoT is tremendous and such an expansive idea, there is not even single proposed or uniform design is present. For the chance or possibility of internet of things to work, IoT must be comprise with an arrangement of the sensor, system, correspondences and processing advancements, among others. One of the principal issues or concerns with the Internet of Thing is huge as well as expansive idea to propose uniform engineering methodology. Also for the chance or possibility of Internet of Things to work, IoT surely comprise in as grouping of sensors, system, interchanges and processing advances, in the midst of others. Delgado concluded that at a basic level, security of Internet of Things must encompass the absolute system adjoining an IoT gadget or linked product. This incorporates mobile plus web applications, databases plus integration with all other systems as well as servers. Consequently, security experts have cut out their work for them. Individuals and organizations always take care of potential vulnerabilities. Individuals and organizations must look for experts or professionals that can support them to navigate the regular security issues. In this article, author also concludes that investigation of security technologies must include PKI that surely help users to fortify products or things against several different vulnerabilities. Furthermore, most importantly, make sure that security framework is the framework which is built to overcome all issues that occur in users or individuals particular Internet of Thing products, devices as well as services.

Current/Future security issues

Privacy Concern vulnerability: I believe that numerous clients of the Internet of Thing have raised worries about security issues, and this is, for the most part, a direct result of the tremendous measure of data that is handed-off through the Internet of Things [6]. It is totally justifiable that individuals may be suspicious about worries for data privacy, particularly when there are already high concerns raised about the protection or security of Internet of Things generally. IoT gadgets gather a tremendous measure of information on their clients, therefore, privacy issues arise because IoT is a large source which stores a tremendous amount of data privacy issues surely arises

Updates and Patches: According to me, associated gadgets should be refreshed all the time with a specific end goal to stay invulnerable in any event to greatly unsophisticated digital threats. The danger of digital assaults increments in case patches are never refreshed regularly. Notwithstanding this reality, it is demonstrated that close to forty-eight percent of organizations provide remote or isolated updates for smart devices or things. Several IoT items are worked from economical chips and different materials, a reality which is, it never boosts producers to give security or protection patches to them. Other shortcomings within the sight of unpatched vulnerabilities are that they might be ordered by particular web search tools [7]. Also, when clients are aware or know about the presence of vulnerabilities, clients or users will be unable to get or access seller’s updates because of equipment confinements and technologies.

Unauthorized Access: A standout amongst the most difficult security issues with smart gadgets is flexibility against introduction to physical assaults. Internet of Things objects are regularly left unattended therefore they are simply available for any type of malevolent actor who can easily catch them and after that concentrate cryptography insider facts, interfere with or change their programming, or supplant these gadgets with pre-misused individuals under their control [9]. Another real vulnerability of Internet of Things needs to manage originates from the absence of legitimate confirmation as well as authorization between gadgets on a system or a network. In case no satisfactory approval techniques are set up, it is moderately simple for unapproved clients to misuse a gadget and they easily make their way to get access to IoT network.

Possible solution for threats

Solution possible for Unauthorized Access

With a specific end goal to security issues from Internet of Things, it is essential to guarantee that passwords and usernames are regularly updated and changed. Additionally, it is likewise the best option to set up protocols to secure IoT devices, these protocols will prevent IoT devices from any type of unauthorized parties or from hackers. Pre-boot authentication technology and data encryption technology, both are best and appropriate technologies to secure IoT devices from unauthorized access. Latest methods to secure IoT devices are to just check the flow of authentication as well authorization methods or strategies to regularly protect the IoT devices by strict two-factor or end-to-end encryption protocols. Also, users should make ensure that diverse levels of verification are set up to diminish the possibility of anybody harming the network. This should be possible by asking for verification of IoT devices at the application level, at the server level as well as the gadget itself. To guarantee that the IoT never make privacy of user’s information an obligation, it is vital to consider the sort of settings that users give and provide to their particular IoT gadgets.

 

 

References

[1]L. Krause, “Data encryption in ISO, the International Organization for Standardization”, Computers and Standards, vol. 3, no. 3-4, pp. 195-198, 2012.

[2]K. Lin, D. Wang, F. Xia and H. Ge, “Device Clustering Algorithm Based on Multimodal Data Correlation in Cognitive Internet of Things”, IEEE Internet of Things Journal, pp. 1-1, 2017.

[3]N. Singh and J. Bhatt, “A survey on IoT and Security issues of RFID”, International Journal Of Engineering And Computer Science, 2017.

[4]C. Bekara, “Security Issues and Challenges for the IoT-based Smart Grid”, Procedia Computer Science, vol. 34, pp. 532-537, 2014.

[5]E. Rekleitis, P. Rizomiliotis and S. Gritzalis, “How to protect security and privacy in the IoT: a policy-based RFID tag management protocol”, Security and Communication Networks, vol. 7, no. 12, pp. 2669-2683, 2011.

[6]P. Rajani and P. Reddy, “Security Ecosystem in IoT & Cloud”, International Journal Of Engineering And Computer Science, 2016.

[7]B. Rudra and O. Vyas, “Investigation of security issues for service-oriented network architecture”, Security and Communication Networks, vol. 9, no. 10, pp. 1025-1039, 2015.

[8]E. Delgado, The internet of things. 2014.

[9]S. Sinha and Y. Park, Building an effective IoT ecosystem for your business. Cham: Springer, 2017.

[10]D. Burrus, “The Internet of Things Is Far Bigger Than Anyone Realizes”, 2016.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask