Monday, December 9, 2019

Internet of Things Vision and Applications

Question: Discuss about the Internet of Things for Vision and Applications. Answer: Introduction The Internet of Things is much awaited revolutionary technology after the technology of internet. The focus and concentration of many experts has been shifted to the Internet of Things. However, there is a barrier to bring the technology from virtual and imaginary to real, because of its serious security issues (Cave, et al., 2011). Internet Of Things Internet of Things is a new technology proposed to connect the day to day using things altogether and establish communication among them. It can connect many physical things, such as vehicles, building, gadgets, machinery, appliances, furniture, equipment. The objective of the Internet of Things is to make them accessible to the user or human being for controlling their operations, without touching them, but virtually (Benkler, 2011). The things are connected through sensors, electronics, actuators and software. All these physical devices are going to be connected with internet connectivity. Once they are connected and networked, they all will be able to communicate and start exchanging the data among themselves. Internet of Things allows these objects to be sensed from anywhere and they will also be controlled by the user remotely and it would be enabled through network infrastructure. Internet of Things is going to create opportunities to connect the things altogether and integrate all of the things directly in the physical world towards the systems that are computer based (Cockton, et al., 2006). The result of interconnecting them would be improved accuracy, efficiency and also will yield economic benefit. Eventually, the Internet of things, which is a newer technology is considered as a double edged sword and it has brought new security issues along with its benefits. Related Technologies The related technologies for Internet of Things involve, internet technology, network technology, transport technologies, network technologies and even many more (EUIoTTF, et al., 2012). Applications of Technologies Internet of Thins has numerous applications currently and this number is going to be increased drastically, once its security and other issues are resolved with potential (Gusmeroli, et al., 2013). Medical and healthcare industry Manufacturing industry Transportation industry Automation of building Automation of home Deployment of metropolitan scale Consumer Applications Media Energy management Infrastructure management Security Challenges And Issues Limited CPU Power Internet of Things involves millions or billions of things that would be connected digitally for virtual access by the controller or use of the thing. Most of these things are very small devices. All these devices are to be powered in order to function electrically and digitally (Miorandi, et al., 2012). These devices cannot be powered high and so they have very limited CPU power. The CPU power would not be sufficient for providing the security provisions. For example, this small power could not allow installing antivirus software and running. The solution involves in development of new encryption scheme that can be enabled and functioned with less electric power . Security Technologies Internet of Things lacks in providing enough security, since it cannot manage identity management and encryption management (Miorandi, et al., 2012). It is a major security challenge and it is difficult to provide for millions of things that are going to be involved. The solution for this security problem would be to develop the advanced technologies for potential and secured identity management and encryption key management. Involvement of New Devices There are various kinds of devices things that are going to be involved in the Internet of Things (Paul, et al., 2011). Eventually, it would be a great security challenge for the IoT to design, develop and provide endpoint security for varied and several things and cannot provide anti-virus, anti-malware to all such devices. The solution for this problem lies in keep developing the endpoint security gradually, for the new devices that are going to be interconnected through the Internet of Things (Miorandi, et al., 2012). Transport Protocols The new and advanced and revolutionary Internet of Things do not have the transport protocols to provide secured network (Rolf., 2013).. Eventually, vulnerable networks allow many more breaches and ease the processes of black hat procedures. The solution lies in developing new transport protocols that can make and run the network security safer and secured (Uckelman, et al., 2011). Huge Network Internet of Things is intended to interconnect everything that can be physically used by human being, and establish communication through internet, among them (Miorandi, et al., 2012). Once the Internet of Things enable this technologies, billions of things will be connected among and the communication and network developed among these billions would eventually make ultimately complex network that would make almost impossible for the analysis of security of the entire network and individual things (Uckelman, et al., 2011). This problem can be resolved, only when the things, only new security technologies are researched and developed. The other security challenges for the Internet of Things that would make the entire IoT to be clumsy, insecured and cumbersome, are as the following (Miorandi, et al., 2012). Vulnerability management of IoT Attacks of Denial-of-service and disruption Modular software and hardware components Identification and implementation of security controls Fulfilling the capabilities of security analysis need Rapid demand in the requirement of bandwidth Understanding all possible vulnerabilities complexity Web interface that is going to be insecure completely Authentication that would be insufficient for enough security Authorization that would be insufficient for enough security Serious concerns of privacy of the user as well as the things Software that is going to be insecure Firmware that is going to be insecure Network services would be insecure Cloud interface would be insecure Physical security would become poor Security configurability would be vulnerable, as it would be insufficient for complete protection and security Mobile interface that would be insecure On an overall, the Internet of Things is going to merge the following four domains, with regards to the security. Information Security Physical security Operational security Information Technology security Solution The major solutions that are proposed by the researchers can be categorized majorly as two kinds (Uckelman, et al., 2011). Endpoint Security Endpoint security is the security provided to the human being and the things involved as entities in the network. Security can be provided to them, with potential and vulnerability and patch management. Network Security Network security involves the interconnection of all the devices or things. The network has to be maintained safe and secured to ensure that the potential data about the user thing and the data that is being communicated is maintained confidentially, without allowing the third person to peep or access them. The network security could be established with the following two methods. NetFlow based security analysis Network monitoring and visibility Conclusion Internet of Things is a new and much awaited technology in the world, by all the techies to connect their things and start operating them virtually, with much decreased effort. Internet of Things is a new technology that can interconnect the physical things altogether and establish communication among them. The major concern of Internet of Things is its security, which are majorly issues related to the end point security and network security. These two security problems lead to many clumsy and cumbersome issues related to the safety and security of the entire network. The security issues are addressed and the respective solutions are proposed in this report. References Benkler, Y. (2011). The Penguin and the Leviathan. New York: Random House. Cave, J. et al., (2011). Does It Help or Hinder? Promotion of Innovation on the Internet and Citizens Right to Privacy, final report, European Parliament. Cockton, Gilbert. (2006). Designing Worth is Worth Designing. NordiCHI,. EU IoT Task Force. (2012). Final Report of the EU IOT Task Force on IOT Governance. Brussels. Gusmeroli, S. Piccione, S. Rotondi, S. (2013). A capability-based security approach to manage access control in the internet of things, Mathematical and Computer Modelling 58. Mehra, P. (2012). Context-Aware Computing: Beyond Search and LocationBased Services. IEEE Internet Computing, 16. Miorandi, D. Sicari, S. Pellegrini, S. Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges, Ad Hoc Networks 10 (7) Paul, S. Pan, J. Jain, R. (2011). Architectures for the future networks and the next generation Internet: A survey. Comput. Commun. Rolf, H. W., (2013). Internet of things Governance quo vadis?, Computer Law Security Review, Uckelman, D., Harrison, M., Michahelles, F. (2011). Architecting the Internet of Things. Springer-Verlag Berlin Heidelberg.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.