Wednesday, May 6, 2020
IOT Security Issues And Solutions Samples â⬠MyAssignmenthelp.com
Question: Discuss about the IOT Security Issues And Solutions. Answer: Description of the challenge The concept of Internet of Things or IoT has received a lot of hype in last decade especially for its scope of implementation. Right from the starting of 2015, there are number of experts that have claimed that they year will existential time for this concept. At the same time, the overall development is sluggish with poor growth owing to IoT safety that has resulted in doubts. There is a wave in the society to prove that there are a lot flaws in the connecting each document with internet. People are obviously very sceptic about it however, there is lack of awareness as well (Ahlmeyer Chircu, 2016). Challenges of Internet of Things or IoT are real and should be addressed first. With time, it has proved that any kind of emerging technology has faced a fair amount of issues. Issues in IoT security are reality since it must not be discouraged people from growing the IoT applications. As a part of development process, any kind of IoT based applications with security as well as testing framework plays a significant part. To create a more secured as well as attack immune internet of things helps in enabling the devices as well as application. The report will address security concerns from IoT and how it can be addressed (Botta et al, 2016). Summary of two peers research paper on IoT Research paper 1 The concept of IoT based security is very like mobile safety which consist of the overall protection of business information as well as personal which can be stored, transmitted and collected from number of devices connects with the internet. This consist of the protection from any kind of malware based threats which has no authority or power to access the device. There three important themes that are present in the academic paper and practitioner investigated for number of IoT related security analysis (Ahlmeyer Chircu, 2016). Firstly, it is important to have call to action based documents that highlight it as the security concern and those using IoT devices must carefully pay some attention on security related issues. Secondly, the technical part of the document also says that can be analyse IoT threats of security and focus on answers as how it can be solved with security challenges impacting IoT. Thirdly, there are number of legal based foundations documents that look at the sec urity as well as privacy regulations along with laws and their overall application to IoT. Research paper 2 IoT Security IoT System Security Issues and Solution Approaches Devices with no communication activity at all are now can be connected easily with nearby network with the help of IoT systems. These kinds of systems also help in discovering the elements that were unseen previously and had also provided new kind of insights. When data was collected through varied connected machineries were analysed in proper manner with new base of information. Such characteristics make the function IoT very promising technique for elevated level of effectiveness by decreasing the overall cost or rise in the level of sales (Tanaka et al, 2016). But the discussion is also based on security threats in IoT activities, the IoT accelerated consortium along with collaborative program with different people from industry has also underscored the requirement for calculating the base for handling following three challenges: - Rise in the number of network connected with IoT devices The challenge of perfect surveillance with manual guide Long life cycle Issues not addressed in research paper Hardware issues: - right from the starting the concept of IoT or Internet of Things based hardware has always an issue. With much hype and immediate interest in IoT machineries like chipmaker like ARM as well as Intel are forcing the processor for elevated level of security with new generation and realistic scene that doesnt look closer to security gap. The issue is with modern level architecture for the chips that made especially for IoT devices and the prices will also go up and make it costlier (Gubbi et al, 2013). The complex design will need more power for battery which is an issue for IoT applications. There are number of affordable kind wearable with IoT devices that wont utilise such kind of chips means that there is requirement for better kind approach. Impact of above discussed issues One crucial factors are that is based on the concept of networking appliances and there are other devices is new, security is not always about prioritizing during design of the products. IoT products are usually have unpatched and old operating systems as well as software. In addition, the end user fails to transform the default kind of passwords on smart devices and normally dont select a strong password. The IoT based devices are provided with distinct kind of identifiers and the capacity to transfer data for network (Jing et al, 2014). The already embedded sensor devices are utilised in industrial communication called as machine to machine with smart energy based grids, home as well as building automation with vehicle communication and wearable devices and other devices for computing for most of communication in IoT. There are number of vulnerabilities that frightening enough to found IoT devices. Thus, the system bought IoT security in addition to the fore. Producers and the users can connect with device that must spend time and try to understand the devices can collect data and information is shared as well as with whom and how data is received. Moreover, when the data is stored is crucial and it includes the stringent for the privacy settings that requires to be activated in accompanying the software. Just like any other device, it is very important to implement the upgraded software and patch the vulnerabilities as well as make sure that all kinds of application related with the computer device is timely and properly updated with any harm occurs (Li Da Xu, 2017). It is also important to note that a hacker can hack the system at any time and they can do so by being from remotest of place. Important lessons The best method to reduce the hardware based security challenges for IoT is to have strong testing framework in various places. Following is the detailed discussion: - Device range: there is coverage based networks with IoT devices is highly paramount. One need to be very particular about the range based metrics for the application. For example, while using Zigbee based technology that helps in empowering the device network that one will have to measure about number of repeaters that one need to settle to give range of communication range for the machineries. However, it is also important to understand that one cannot put any number on repeater blindly since rise in number of repeaters the ability of the system reduction (Sicari et al, 2015). Thus, device range also evaluates will enable people to find the right spot where one can increase the range without reaching the breaking point. Capacity and latency: the capacity is based on bytes per second also called as bps and it handles the speed of the network while the concept of latency also denotes the complete time spent on transferring the data that exist between the endpoint of application. It is important that developers always look for methods to rise the capacity of the IoT application to boost the level of performance. Issues in several factors is inversely proportionate and it resulted in improving the level of degrades than other. There are data intensive devices as well which can be applied and tested thoroughly for right balance in capacity and latency (Farooq et al, 2015). Manufacturing test: it is rare that company build IoT device right from the starting on their own. Many time, companies will use elements and modules that are manufactured by other in the application. Evaluation of such modules on your own for right kind of functioning is very crucial. The produces always assemble the line based testing from their end however one must properly verify it beforehand (Roman et al, 2013). In addition, while putting all kind of modules at one place or on a board based evaluation is needed to ensure that there are no mistakes that are introduced due to wiring. The evaluation of manufacturability is crucial to ensure the applications that can work as per its intentions. References Ahlmeyer, M., Chircu, A. M. (2016). SECURING THE INTERNET OF THINGS: A REVIEW.Issues in Information Systems,17(4). Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Farooq, M. U., Waseem, M., Khairi, A., Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT).International Journal of Computer Applications,111(7). Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions.Future generation computer systems,29(7), 1645-1660. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., Qiu, D. (2014). Security of the internet of things: Perspectives and challenges.Wireless Networks,20(8), 2481-2501. Li, S., Da Xu, L. (2017).Securing the Internet of Things. Syngress. Roman, R., Zhou, J., Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things.Computer Networks,57(10), 2266-2279. Sicari, S., Rizzardi, A., Grieco, L. A., Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead.Computer Networks,76, 146-164. Tanaka, S., Fujishima, K., Mimura, N., Dr. Eng.,Ohashi, T., Tanaka, M. (2016). IoT SECURITY IoT SYSTEM SECURITY ISSUES AND SOLUTION APPROACHES.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.