The Challenges in the Internet of Things – Research Paper Example

Download full paperFile format: .doc, available for editing

The paper “ The Challenges in the Internet of Things” is a   thrilling variant of research paper on information technology. Internet of Things (IoT) can be defined as everyday objects’ networked interconnection that is normally seen as a sensors’ self -configuring a wireless network for interconnecting all ‘ things’ (see Appendix One). Nowadays, the world completely relies on information offered on the internet that is captured through text or by taking images. Evidently, this outlines the major participation of people in gathering information. Still, involving people can result in some problems considering that they have less accuracy and limited time, which results in inconsistent and inappropriate data.

Therefore, there is a need for a system that can automatically capture and transfer data to the internet devoid of any human to machine interaction. Therefore, the IoT is a state whereby there is a connection of all ‘ things’ in the internet sensors for management as well as intelligent identification. Such things according to Bhabad and Bagade (2015, p. 1) when offered with unique identifiers may be read using radio-frequency identification (RFID) tags together with information sensing devices (sensors).

Therefore, the thing in the IoT could be a human being having a heart for monitoring an implant, a car with in-built sensors that monitors the pressure and alert the driver when it is low, or other manufactured objects having a unique Internet Protocol (IP) address that can be connected to the network to facilitate the transfer. Basically, the increasing utilization of IoT systems creates the need for powerful protection against any potential vulnerability or attacks. 1.1 BackgroundGiven that the nodes of IoT are of low communication speed, less computation power, low storage, and naturally heterogeneous, it requires forward and backward secrecy, smooth control of the data access, confidentiality, integrity, and scalable security algorithms.

The phrase ‘ security’ normally involves different concepts; for instance, security connotes the basic security services provision, which involves availability, confidentiality, non-repudiation, authorization, integrity as well as authentication. Such services could be implemented through various cryptographic mechanisms, like signature algorithms, hash functions, or block ciphers. All of the aforementioned mechanisms need a solid infrastructure for key management so as to manage the needed cryptographic keys. However, in the IoT context, security should focus on both the needed security services and how the services would be achieved in the entire system as well as how to execute the security functionalities.

Even though security considerations have been there in the IT context, the features of various IoT executions bring about unique and new security challenges. Therefore, managing such challenges and making sure IoT services and products are protected should be the main priority. The IoT devices, as well as the associated data services, should be protected from vulnerabilities, particularly because this technology has turned out to be pervasive and integrated and pervasive in people’ s day-to-day lives.

This research report focus on challenges in IoT with a focus on the security perspective. The report determines how security challenges in IoT can be managed in the present and future systems. Using a document analysis research method, the existing IoT devices have been analyzed with the objective of creating a clear, perceptible depiction of the challenges as well as solutions existing in the IoT today.

References

Abomhara, M. & Køien, G.M., 2014. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders, and Attacks. Journal of Cyber Security, vol. 4, pp.65–88.

Bakara, C., 2014. Security Issues and Challenges for the IoT-based Smart Grid. Procedia Computer Science, vol. 34, pp.532 – 537.

Bhabad, M.A. & Bagade, S.T., 2015. Internet of Things: Architecture, Security Issues, and Countermeasures. International Journal of Computer Applications, vol. 125, no. 14, pp.1-4.

Borgohain, T., Kumar, U. & Sanyal, S., 2015. Survey of Security and Privacy Issues of the Internet of Things. The International Journal of Advanced Networking and Application, vol. 6, no. 4, pp.2372-78.

Bowen, G.A., 2009. Document Analysis as a Qualitative Research Method Glenn A. Bowen WESTERN CAROLINA UNIVERSITY ABSTRACT. Qualitative Research Journal, vol. 9, no. 2, pp.27-40.

Chigasaki, D. & Mansour, C., 2015. Security challenges in the internet of things. Int. J. Space-Based and Situated Computing, vol. 5, no. 3, pp.141-49.

Cirani, S., Ferrari, G. & Veltri, L., 2013. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview. Algorithms, vol. 6, pp.197-226.

Covington, M.J. & Carskadden, R., 2013. Threat implications of the Internet of Things. In the 5th International Conference on Cyber Conflict. Austin, Texas, 2013. IEEE.

Das, D. & Sharma, B., 2016. General Survey on Security Issues on the Internet of Things. International Journal of Computer Applications, vol. 139, no. 2, pp.23-29.

Farooq, M.U., Waseem, M., Khairi, A. & Mazhar, S., 2015. A Critical Analysis of the Security Concerns of Internet of Things (IoT). International Journal of Computer Applications, vol. 111, no. 7, pp.1-6.

Fremantle, P. & Scott, P., 2015. A security survey of middleware for the Internet of Things. PeerJ PrePrints, vol. 3, pp.1-23.

Hancke, G.P., Markantonakis, K. & Mayes, K.E., 2010. Security Challenges for User-Oriented RFID Applications within the "Internet of Things. Journal of Internet Technology, vol. 11, no. 3, pp.307-13.

Heer, T. et al., 2011. Security Challenges in the IP-based Internet of Things. Wireless Personal Communications, vol. 61, no. 3, pp.527–42.

Hossain, M., Fotouhi, M. & Hasan, R., 2015. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. In IEEE World Congress on Services. Birmingham, 2015.

Meltzer, D., 2015. Securing the Industrial Internet of Things. ISSA Journal, pp.24-30.

Mondal, B., Kumar, D. & Mandal, T., 2015. Security Challenges in the Internet of Things (IoT). International Journal of Software and Web Sciences, vol. 13, no. 1, pp.8-12.

Rajeswari, B., 2016. Addressing Security Challenges In the Internet of Things. International Journal of Scientific Engineering and Applied Science. vol, 2, no. 3, pp.393-95.

Subramanian, S., Gopal, V.V. & Muthusamy, M., 2015. Security and Privacy Challenges of IoT-enabled Solutions. ISACA Journal, vol. 4, pp.33-36.

Suchitra, C. & Vandana, C.P., 2016. Internet of Things and Security Issues. International Journal of Computer Science and Mobile Computing, vol. 5, no. 1, pp.133 – 139.

van Tilborg, H.C.A. & Jajodia, S., 2014. the utilisation of the Public Key Infrastructure (PKI) can help the IoT users to realize a strong authentication. New York: Springer Science & Business Media.

Download full paperFile format: .doc, available for editing
Contact Us