Tuesday, May 5, 2020
Privacy Issues in Internet of Things-Free-Samples for Students
Question: Discuss about the Internet of things. Answer: Internet of Things: The interconnection between the physical devices, buildings, vehicles, software, electronics, sensors, actuators, and the connectivity network is called as Internet of things. The network infrastructure is capable of controlling and sensing the IoT objects. It helps in improving efficiency, accuracy, and reducing the human intervention. The applications of cyber physical system are smart grid, smart homes, virtual power plant, smart cities, and intelligent transportation. The focus of IoT is providing machine to machine communication with the help of variety of protocols, application, and domains (Friess, 2013). The connectivity of devices helps in collecting more data. IOT security methodology helps in in improving the performance of the IoT analytics. The advantages of using IoT are that it helps in reducing costs, improving the efficiency of the processes, helps in effective utilization of assets, and increased productivity. The connection between people, processes, and businesses helps in smooth flow of information (Lord, 2014). Privacy issues in IoT: The value services are provided by the IoT by improving quality of life and providing new opportunities to the in the open market. The cloud technologies, big data paradigms wireless sensor netwroks, peer to peer networks, and others are the technologies which are used for leveraging the IOT system. The use of wireless sensors in the IoT application raises the problems like accessibility, accuracy, availability, and confidentiality (Simon, 2017). In the IoT environment the security problems are associated with data collection phase and transmission, processing, and storage of data throughout the life cycle. Some of the privacy issues are listed below: Privacy issues related with the design of IoT. In the process of tracking the threats Preserving privacy from the middleware in the internet of things Enhancing recovery from unconventional resources. Privacy issues related to big data in IoT Preserving privacy in data collection and mining methods Responsibility and accountability Privacy issues related to the use of cloud technology Use of new cryptographic methods in IoT environment Anonymization of IoT technology In the development of proactive privacy model Compliance with ethical and legal standards for IoT devices. Unauthorised accessing of data Internet is equipped with threat and vulnerabilities Machine to machine interaction Contract information with M2M Availability of information Unauthorised accessing of services Changes in the information used for communication Attacks of viruses and malwares Network security Code resources management Operator replacement The following diagram gives the clear description of security concern for the IoT: Trends and Methodology: The following table shows the trends in the IoT application: Particulars Description Intelligence The ambient intelligence and autonomous control are the integral part of the internet of things. The driving force helps in driving objects. The intelligent entities are auto-organised for bringing interoperability with virtual objects. Architecture The bottom up approach and the event driven architecture are the basic methodologies for the deterministic process. The semantic webs are created for the services, avatars, and components. Network architecture The huge scalability and network space is required for handling network devices in IoT environment. The edge devices are used for analysing and processing of data for achieving real time scalability. Complexity The closed loops are used for designing the complex system of the IoT devices. The systems are equipped with mitigation of risks, privacy, reliability, and control. The following roadmap shows the trends in the technology of IoT: Methodology: The installation and the configuration of devices are governed by the documentation. The monitoring and testing of devices helps in predicting vulnerabilities within the devices. The devices are tested separately. The security of the communication is directed by reverse engineering methods. The unauthorised access of data in the cloud environment should be checked by running active test (Rosa, 2015). The back-end cloud services are associated with the monitoring of traffic to assess devices security. Geo encryptions of IoT: The encryption practices which are used for securing the IoT services are: Allowing cryptographic methodology: Test: Does the communication can be protected by strong cryptographic methods? Impact: The authentication credentials are required for allowing encrypted communication in protecting data in the transition process. Requirement of cryptography: Test: Does the user required to use cryptography for using the IOT services? Impact: The strong cryptography methods helps in reducing the change of data leakage. It also helps in overcoming the problem of weaknesses of the network and user error. Enforcement of using strong passwords: Test: Password strength guidelines should be followed by the user in creating passwords: Impact: The cost of attacking can be increased by using strong passwords because the attacker has to use brute force or other algorithms for attacking (Cognizant Report, 2017). The cracking of passwords requires more effort and time. TLS certificate validation: Test: The TLS certificates should be used for validation Impact: The man in the middle attack arises due to the improper validation certificates. With the use of TLS certificate the problem of man in the middle attack can be resolved Authentication provided to Device to service: Test: Strong authentication mechanism should be used by the devices: Impact: The failure of device give rise to vulnerabilities. The communication session should be maintained between the devices and services (Morchan, 2014). Protection provided to sensitive data Test: The control services should use encryption methodology for carrying out communication Impact: The sensitivity of the data requires adequate protection from the passive observers (Arockiam, 2016). The passive observer looks for the flow of network traffic. It requires the encryption methodologies. Replay attacks should be protected: Test: The adequate protection should be planned against the replay of attacks Impact: Sometimes the protocols are not well designed to protect the data from attack. The weaknesses of the attack should remove for protecting the devices from unauthorised access in the future (Kumar, 2014). The debugging of the interface should be periodically performed to check the efficiency of the protocol. Conclusion: The IoT is the machine to machine technology which makes use of sensor and actuators to develop a smart environment. The privacy and security concerns should be periodically reviewed for increasing the efficiency and accuracy of the IOT services. The intelligent connection between people, devices, and processes can be made with the help of IoT services. References: Arockiam, L. (2016).A study of security issues and challenges in IoT. Retrieved from https://www.ijesmr.com/doc/Archive-2016/November-2016/5.pdf Cognizant Report. (2017).Safeguarding the internet of things. Retrieved from https://www.cognizant.com/whitepapers/safeguarding-the-internet-of-things-codex2465.pdf Friess, P. (2013).Internet of things- converging technologies for smart environment. Retrieved from https://www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf Kumar, S. (2014).A survey of internet of things: Security and privacy issues. Retrieved from https://research.ijcaonline.org/volume90/number11/pxc3894454.pdf Lord, S. (2014).The internet of things: An introduction to privacy issues. Retrieved from https://www.priv.gc.ca/media/1808/iot_201602_e.pdf Morchan, O. (2014).Privacy in the internet of things: Threats and challenges. Retrieved from https://assets.documentcloud.org/documents/2822904/Ziegeldorf-Jan-Henrik-Privacy-in-the-Internet-of.pdf Rosa, T. (2015).The internet of things: Security research study. Retrieved from https://www.veracode.com/sites/default/files/Resources/Whitepapers/internet-of-things-whitepaper.pdf Simon, T. (2017).Critical infrastructure and the internet of things. Retrieved from https://www.cigionline.org/sites/default/files/documents/GCIG%20no.46_0.pdf
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.