The internet of things (IOT) is the basically performs the task of the inter-networking within various smart devices which has ability to connect. When these devices are connected to each other they has the ability of exchanging data and information. The devices can be vehicles or household goods like microwave, AC or TV.
The assignments discusses the challenge in the field of the Internet of things and discusses the issues in the IOT (Hossain et al., 2015). It further discusses about the relevant internet of things technologies and their applications and also poses five probable research questions. It further discusses the problems that were not addressed or not addressed adequately in the discussions and finally addresses the lesson learnt from the research question.
Challenges in the IOTThe IOT has huge application in advancing the technology thus its usage is not going to stop in the near time, however the issues related to the usage of the IOT is a huge challenge for the industry to overcome. Some of the challenges are:
More the device, greater is the challenge
One of the challenges related to the IOT regarding its usage is the number of the devices. More is the devices connected the weaker is the firewall; hence they are prone to be hacked (Jing et al., 2014).
The updates
The other issue related to the IOT is the updates. To improve the security of the device and to protect the device from hacking the device are needed to update the device regularly (Abomhara & Køien, 2014). The regular up gradation is another limitation of the application of the IOT.
The threat of the personal data
Another limitation of the IOT is the misuse of the personal data. The devices connected may contain the personal data which can be used by the companies or the hackers. The misuse may become dangerous if the personal data contains the details of the money transaction.
The lazy consumers
Other limitation of the IOT is that it requires the active costumers who can regularly update their devices to keep their data safe. They keep tab on the new version of the software in the market and install them to improve the security (Mahmoud et al., 2014). In the case of the lazy customers who fails to keep the updated software face the problem of the hacking thus they avoid the IOT applications.
The compatibility
Various devices may not be compatible with each other. Thus it huge challenge to integrate the entire device under a single control (Li & Da Xu, 2017).
The issuesChallenges Related to Usage of the IoT
Although the IOT has huge application and it has designed to make the person life smoother and closer to technology. The above described challenges are the reason that IOT has failed in its goal. The lack of the security and misuse of the personal data are some of the major reasons which limit the usage of the IOT (Zhao & Ge, 2013). Some parts of the Internet have stayed inaccessible because of the Dodos or “Denial of Service” attacks. This took place against the Dyn DNS servers.
The relevant technology which is related to the security issues of the IOT is given.
Internet of Thing network security-This part is concerned with the making the firewall for the devices which are strong enough to prevent the data from being hacked. Thus providing security of the devices
The authentication of the internet of things-The authentication part is concerned with the task of identifying the owner of the device as he has only right to operate the device. If the authentication then the device should remain locked and a message should sent to the user that someone is trying to access his device.
The encryption-The encryption of the internet of thing is concerned with providing extra security to the devices which can be in form of the password, thumb scanning or facial recognition.
Public key infrastructure-The public key infrastructure is an important part of the application of the IOT as its function is to secure the electronic transfer of the information which can contain financial transaction details or a confidential mail.
The security analytics-This has been aggregating, collecting, normalizing and monitoring data from the IoT devices. Moreover it has been delivering actionable alerting and reporting over particular activities.
The security of the application programming device-The API is the software which the set of protocols and codes used for designing the application software (Farooq et al., 2015). The application software is used for the exchange of data between various devices which is main work of the IOT.
The common people have been uncertain about the type of the data which is created by the IOT and how the data processing takes place. However in other designs the data of the IOT are kept in the cloud computer which makes an easy access to the data. The cloud centric architectures keep the cloud in the core devices (Roman, Zhou & Lopez, 2013). The applications are kept above and the network of the smart things beneath that.
The probable research questions:Relevant IoT Technologies Related to Security Issues
In keeping mind the challenges of the Internet of things various question rises related to the security and the usage of the IOT some of them are enlisted are:
- Can the big data in the IOT be completely secure?
- Will the IOT be made compatible to include all the devices?
- Can IoT devices be designed such that nature restricts the people from getting exploited?
- Will there a threat of job losses as the IOT is making devices and robots more operational?
- What should be the privacy policies related to the usage of the Internet of things?
The above described issues related to the security and privacy in the IOT poses a serious threat to the user data. The above question summarizes will there will be privacy of the data and what the privacy policies related to the data (Granjal, Monteiro & Silva, 2015). Other question arises about the compatibility issue whether the entire device can be configured under the single IOT. The other issue related to the IOT is whether it will have bad effect on the country economy and will be reduction in the jobs as the robot will take over the human’s job (Zhang et al., 2014).
There has been news of data breaches in the company and they have suffered a huge loss in terms of data and money. The survey conducted by the website shows that only few enterprises who have felt confident that they have strong firewall and can protect their data from hacking. The analysis presented is important and to the point in related to the issues of security. They could be utilized for generating the spam through emailing the content to the other devices. The contents gathered by the devices could be sent unknowingly to the parties also.
Problems that were not addressed or not addressed adequately in the discussions:There are primary two issues which have been ignored but it is important related to the security of the data they are:
The rush of the production
The application of the IOT has created a huge demand among customers and the companies are mass producing these device. To full fill the demand of the customer companies are compromising the security of these data from being hacked. As the result the failure in this device to have a proper security has been a considerable risk. Moreover various IoT devices have not possessed the storage or power required to host the endpoint security software.
Lack in the standardization for sharing of the data:
Although there has been rules and regulation related to the sharing and usage of the information, the IOT still lacks a proper standards to use and share the personal data of the customer. Each company designs and makes their own rules and regulation related to the sharing and usage of the information. This must be without the baseline for bare minimum.
Discussion on the impact of the above mentioned issues and their application in real world:Questions Related to IoT Security and Usage
Problems |
Discussions |
Physical Attacks
|
The physical attacks are targeting the hardware of the IoT system which also includes the breaching at the sensor layer. They also require the physical proximity of that system. However it also includes the reduction of the efficacy of IoT hardware (Ahlmeyer & Chircu, 2016). The hackers can also tamper with the nodes to control over the sensor devices or nodes in the IoT environment. The hackers are also trying to extract the code, data and materials. The other way the hacker can hack the system is by injecting the malicious code; through this hackers can deploy physically the malicious nodes between the legitimate nodes at the IoT network. The malicious nodes are called the MitM or man-in-the-middle attacks which can control the operations and the data flowing between the linked codes. |
Network attacks
|
The other attack is the network attack which targets the network layer of the IoT system; moreover it can be carried out from the distance without being in the premise. The Dodos attacks have been on the top of all other network attack which has compromised the IoT security risks. It typically involves the server from replying to the legitimate requests (Sadeghi, Wachsmann & Waidner, 2015). The usage of the sniffing application, the attacker can see the traffic analysis and change them by inferring information which is on the basis of pattern of the communication between the devices in the network of IoT. |
Analyzing above security of the physical and network attack it can be analyzed that the idea behind the usage of the IOT in home can reduce the loads of work and bring closer to the technology. However IOT is still at testing phase and various upgrades needs to be done at its application (Kumar, Vealey & Srivastava, 2016). The first challenge is to solve the security related question and the privacy of the data. The devices connected through the IOT and the public key infrastructure which is an important part of the application of the IOT as its function is to secure the electronic transfer of the information which can contain financial transaction details or a confidential mail which is the prime target of the customers. The company has been mass producing this device in order to full fill the demand of the customer companies are compromising the security of these data from being hacked which is at considerable risk. Various customers are unable to update their IOT infrastructure which has put the risk on their personal data (Sicari et al., 2015) . The Defense department of the country has undertaken the responsibility to take up the IoT enterprises which can come up with the roadmap to support and make that clear to users. The choice for either manual or automatic updates must be provided to every client.
Conclusion
From the above assignment it can be concluded that the application of the IOT has huge application and revolutionized the way the devices are exchanging the data. However the security and privacy threats imposed by them have limited their use. The challenges included more the device, greater is the challenge, the updates, the threat of the personal data, the lazy consumers and the compatibility. Various questions have been raised in related to the security of the IOT. In keeping mind the challenges of the Internet of things various question raises related to the security and the usage of the IOT. The two primary excuses the rush of the production and the Lack in the standardization for sharing of the data. For such causes, the IoT could get pushed back for longer time than it actually needed to be.
References:
Bokhara, M., & Køien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on (pp. 1-8). IEEE.
Conclusion
Ahlmeyer, M., & Chircu, A. M. (2016). SECURING THE INTERNET OF THINGS: A REVIEW. Issues in Information Systems, 17(4).
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).
Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294-1312.
Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues, challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE World Congress on (pp. 21-28). IEEE.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Kumar, S. A., Vealey, T., & Srivastava, H. (2016, January). Security in internet of things: Challenges, solutions and future directions. In System Sciences (HICSS), 2016 49th Hawaii International Conference on (pp. 5772-5781). IEEE.
Lake, D., Milito, R. M. R., Morrow, M., & Vargheese, R. (2014). Internet of things: Architectural framework for ehealth security. Journal of ICT Standardization, 1(3), 301-328.
Li, S., & Da Xu, L. (2017). Securing the Internet of Things. Syngress.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (iot) security: Current status, challenges and prospective measures. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 336-341). IEEE.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266-2279.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in industrial internet of things. In Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE (pp. 1-6). IEEE.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014, November). IoT security: ongoing challenges and research opportunities. In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on (pp. 230-234). IEEE.
Zhao, K., & Ge, L. (2013, December). A survey on the internet of things security. In Computational Intelligence and Security (CIS), 2013 9th International Conference on (pp. 663-667). IEEE.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2022). Challenges And Security Issues In The IoT Essay.. Retrieved from https://myassignmenthelp.com/free-samples/cab240-information-security/security-and-privacy-in-the-internet-of-things.html.
"Challenges And Security Issues In The IoT Essay.." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/cab240-information-security/security-and-privacy-in-the-internet-of-things.html.
My Assignment Help (2022) Challenges And Security Issues In The IoT Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/cab240-information-security/security-and-privacy-in-the-internet-of-things.html
[Accessed 19 August 2024].
My Assignment Help. 'Challenges And Security Issues In The IoT Essay.' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/cab240-information-security/security-and-privacy-in-the-internet-of-things.html> accessed 19 August 2024.
My Assignment Help. Challenges And Security Issues In The IoT Essay. [Internet]. My Assignment Help. 2022 [cited 19 August 2024]. Available from: https://myassignmenthelp.com/free-samples/cab240-information-security/security-and-privacy-in-the-internet-of-things.html.