Friday, May 1, 2020

Internet of Things in Industries Free-Samples for Students

Question: Discuss about the Security and Privacy Issues in Internet of Things (IoT). Answer: Introduction The report will discuss in detail about the Internet of Things which presented so many advantages to consumers and further has the potential to transform the manner in which the consumer communicate with the technology in some basic manners. In the future, the concept of Internet of Things is likely to change the way virtual and physical world will come at the same place in many ways that are challenging to comprehend (Suo et al., 2012). From security as well as privacy point of view, the anticipated pervasive introduction of different sensors and machines in the present intimate's space like home, car or with wearable as well as other parts of the body shows some specific challenges. Background Technology is rapidly transforming the way people communicate with people all across the world. In the present world, companies are manufacturing products for the consumer based market that was impossible to imagine a while back. There are cameras directly connected to the Internet which also permits the user to post pictures online with one click. Then there is home based or automation mechanism that helps in turning on the light in porch when people leave for work, and there are much more similar incidences (Stankovic, 2014). All these are different examples of the concept of Internet of Things which is based on interconnected surrounding where all perspective of objects has the presence on the digital platform along with the ability to communicate with another kind of objects as well as with people. Scope of engagement There is some new development which is expected to bring a lot of advantages for the consumers. The health devices are connected and permit consumers with health problems to work with the physician to manage the diseases. The concept of home automation process when with help the consumer to completely turn off the burglar alarm or play some music and at the same time also warm up for the food, right before getting in the home. The cars are also connected, and it timely notifies the responders especially in the case of an accident. The concept can also bring some advantages that one cannot even predict. At the same time, the connected devices also help in collecting, transmitting, storing as well as potentially sharing a lot of consumer based data (Vermesan et al., 2011). In answer to some request for the number of comments, staff is also able to receive so many comments from a range of consumer based advocacy people along with industry representatives. At the same time, the workshop with title The Internet of Things based on Privacy and Security is the present connected time is established in 2013, and it further consist of many academic, consumer based advocates and representatives Tools used The devices employed in the concept are poised to become pervasive by nature in the lives of people than any mobile phones and will further have access to the most sensitive data which is also personal like social security numbers or other personal information. Also, when the number gets multiplied, different security-based concerns rise on specific devices like a mobile phone which can rapidly turn some concerns while considering many multiple devices in the interconnected business or home (Miorandi et al., 2012). When the chair of Federal Trade Commission is setup, it gives a warning lately that small size along with limited amount of processing power of some connected devices has the potential to limit the overall usage of different security measures as well as encryptions. It can also be challenging to completely patch the overall flaws in low-cost products (Miorandi et al., 2012). The development of connected devices will also be able to spike over the next many years as per the number which is collected by many companies like Cisco Systems. The concept of Internet of Things security does not present a foggy kind of future anymore on issues as more similar devices are being introduced in the market as well as in people lives. Technology which helps in self-parking to other home based automation systems can be wearable with other smart devices. In future, it is expected to have so many sensors along with many devices that people will be unable to sense it properly (Da Xu et al., 2014). There are so many issues which surround around the security of mobile and are also a challenge in a current era of always being connected devices. It is also important to think about other greater challenges that any business will have, for instance, the connected devices of IoT and it many gets even more challenging and difficult. As and when, a concept of IoT evolves, there will be so many people along with connected devices and each one shown a potential option in IT-based infrastructure and company or personal data (Da Xu et al., 2014). Summary of findings There are so many threats which come under IoT, and it can be divided into three broad categories which are privacy, security as well as safety. Some experts claim that threat of security at Internet of Things are very broad in concept and also has the potential to cripple the whole systems further. Because the infrastructure components of IoT will have some critical impact and it will also be presented as an ideal target for the nation as well as industrial based espionage. It also consists of the complete denial of the other attacks and services. Another important area of concern is about privacy with the confidential information that can reside potentially on different networks and also likely to target for some cyber-based criminals (Jia et al., 2012). It is also important to keep in mind that while testing needs for security it is important that IoT is still very much exist in the category of work in progress. There are some other things that are also connected to the Internet in present time and will be seen as a rise and the advent of context based sharing of data and automatic actions of the machine which is based on the information. At the same time, the concept of IoT is based on the allocation in a virtual form to many physical objects as it grows different kinds of virtual presences. It will start to communicate as well as exchange many types of contextual data, and the machine will make important decisions which are entirely based on contextual devices (Bandyopadhyay and Sen, 2011). Impact in real life The recent examples consist of people who were researching hacked in two cars and disable the brakes in a wireless format. Also, they turned off the light plus switched the brakes. It happened way beyond the control of the driver, and in another case, a luxurious yacht was lured off course by practitioners who hacked the GPS signal that was being used for navigation. There are some home control hubs which are very vulnerable, and it permits the attackers to easily change or tamper with the concept of heating, power, lighting and other door locks. There are a number of other cases also which consist of industrial based control systems that are being hacked with the help of different wireless network along with sensors (Roman et al., 2013). The examples already show the hacked TV sets and another kind of video cameras along with child monitoring system that has raised some privacy issues and also hacked different power based meters which till date has been utilized to steal the electric power. It can also be said that a single worm that has the potential to comprise a huge number of different internet-based connected devices and at the same time, amass these devices into more of botnet kind of concept of a similar kind. It is important to remember here that it is just not based on value or any power of the devices that every bad guy or hacker is looking for (Roman et al, 2013). It is also related to overall bandwidth which can be accessed and used in a more DDoS manner. Conclusion The concept of security requires being manufactured on the foundation of many IoT systems with rigorous checks on validity, further authentication, verification of data and the data required to get encrypted. At the basic level of application, development of software companies require being better at writing a different kind of codes which are stable as well as resilient by nature. It is important that these systems are also trustworthy along with ideal standards for code development. When the complete system communicates with one another, it is important to agree on many kinds of standards which are safe as well as valid by nature (Sicari et al., 2015). References Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions.Future generation computer systems,29(7), 1645-1660. Stankovic, J.A. (2014). Research directions for the internet of things.IEEE Internet of Things Journal,1(1), pp.3-9. Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., Jubert, I.S., Mazura, M., Harrison, M., Eisenhauer, M. and Doody, P. (2011). Internet of things strategic research roadmap.Internet of Things-Global Technological and Societal Trends,1, pp.9-52. Miorandi, D., Sicari, S., De Pellegrini, F. and Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges.Ad Hoc Networks,10(7), pp.1497-1516. Da Xu, L., He, W. and Li, S. (2014). Internet of things in industries: A survey.IEEE Transactions on industrial informatics,10(4), pp.2233-2243. Bandyopadhyay, D. and Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization.Wireless Personal Communications,58(1), pp.49-69. Roman, R., Zhou, J. and Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things.Computer Networks,57(10), pp.2266-2279. Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead.Computer Networks,76, pp.146-164. Suo, H., Wan, J., Zou, C., Liu, J. (2012, March). Security in the internet of things: a review. InComputer Science and Electronics Engineering (ICCSEE), 2012 international conference on(Vol. 3, pp. 648-651). IEEE. Jia, X., Feng, Q., Fan, T. and Lei, Q. (2012, April). RFID technology and its applications in Internet of Things (IoT). InConsumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on(pp. 1282-1285). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.