A COMPREHENSIVE STUDY ON IOT ARCHITECTURES AND IOT SECURITY (original) (raw)
Related papers
Introduction to the Internet of Things
Connecting Objects to the Web, 2013
The expression "Internet of Things" (IoT), coined back in 1999 by Kevin Ashton, the British technology pioneer who cofounded the Auto-ID Center at the Massachusetts Institute of Technology, is becoming more and more mainstream. In opening the IoT Week 2013 1 with a pre-recorded video message, 2 Ashton insisted on the realization that IoT is here now; it is not the future but the present. While Gartner identifies IoT as one of the top ten strategic technology trends, 3 Cisco forecasts 50 billion devices connected by 2020, 4 a potential market in excess of $14 trillion, 5 and also claims that IoT is actually already here. 6 Similarly, it is not only companies with a technological focus, such as Ericsson, Bosch or Siemens that use IoT to advertise their cutting edge technologies-media companies such as the BBC are conducting research activities and have plans for IoT deployment. In short, we are currently on the verge of witnessing the emergence of a "mega-market", where markets such as home and building automation, electricity generation and
Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms
IEEE Access, 2019
The Internet of Things (IoT) is an evolving global trend in web-based information architecture aiding in the exchange of services and goods over a network without necessitating human to human or human to computer interaction. It has the potential to revolutionize physical world interaction of individuals and the organizations. The application of IoT can be recognized significantly in many areas such as in healthcare, resource management, learning, knowledge processing and many more. The practical realization of IoT is met with a plethora of security and privacy challenges that needs to be tackled for IoT"s successful deployment on a commercially viable large scale. This study analyzes the security issues related to IoT networks through an analysis of the existing empirical researches to get an insight on the security requirements of the IoT networks. The findings of the study revealed that security threats are one of the biggest and ever-growing challenges for IoT and it is essential to substantially mitigate them for the success of this platform. INDEX TERMS Internet Of Things (IoT), Security, Cyber-Attacks, Privacy, Threats, Cyber Security I. RESEARCH CONTEXT IoT is defined as an active global network architecture having self-configuring abilities based on standard and interconnected communication protocols, where both virtual and physical objects/things have identities, physical characteristics and virtual representation"(IERC, 2016 pp-3). This term "Internet of Things" (IoT) was coined by Kevin Ashton, in the year 1999 and later was formally introduced in 2005 by the International Telecommunication Union (ITU).
The Internet of Things(IoT) is a vision in which Internet outspreads into the real world espousal of daily objects. The objects no longer seems separated from the virtual world and can be controlled distantly. The term "Internet of Things" is devised from the two words "Internet" and "Things". The Internet is an interconnected computer networks that use the standard Internet. The word "Things" can be any object or person in real world from any electronic equipment to any non-electronic as well.The Internet of Things (IoT) represents the interconnection of several equipments such as smart devices and services. Presently, more than a billions of devices are connected to Internet, including PCs, embedded sensors, and mobile phones.This paper gives an overview, Architecture ,Application areas, security and privacy challenges in the Internet of Things.
In this chapter, the authors collected data from issues related to threats in the applications of IoT-based technologies that describe the security and privacy issues from 30 peer reviewed publications from 2014 to 2017. Further, they analyzed each threat type and its percentages in each application of the internet of things. The results indicated that the applications of smart transportation (20%) face the highest amount of security and privacy issues followed by smart home (19%) and smart cities (18%) compared to the rest of the applications. Further, they determined that the biggest threats were denial of service attack (9%) followed by eavesdropping (5%), man in the middle (4%), and replay (4%). Denial of service attacks and man in the middle attack are active attacks that can severely damage human life whereas eavesdropping is a passive attack that steals information. This study has found that privacy issues have the biggest impacts on people. Therefore, researchers need to find possible solutions to these threats to improve the quality of IoT applications.
Overview The Internet Of Things (IOT) System Security,Applications,Architecture And Business Models
— The Internet of Things (IoT) brings together a multitude of technologies, with a vision of creating an interconnected world.This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling system security,architecture,business models and application issues. The IoT is enabled by the latest developments in RFID, smart sensors. The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. The current revolution in Internet, mobile and machine-to-machine (M2M) technologies can be seen as the first phase of the IoT. In the coming years, the IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. We survey the four most dominant IoT architectures and analyze their security components with respect to the requirements. Our analysis shows a mediocre coverage of security requirements.
The Internet of Things: Vision & challenges
IEEE 2013 Tencon - Spring, 2013
The Internet of Things (IoT) was of a vision in which all physical objects are tagged and uniquely identified using RFID transponders or readers. Nowadays, research into the IoT has extended this vision to the connectivity of Things to anything, anyone, anywhere and at anytime. The IoT has grown into multiple dimensions, which encompasses various networks of applications, computers, devices, as well as physical and virtual objects, referred to as things or objects, that are interconnected together using communication technologies such as, wireless, wired and mobile networks, RFID, Bluetooth, GPS systems, and other evolving technologies. This paradigm is a major shift from an essentially computer-based network model to a fully distributed network of smart objects. This change poses serious challenges in terms of architecture, connectivity, efficiency, security and provision of services among many others. This paper studies the state-of-the art of the IoT. In addition, some major security and privacy issues are described and a new attack vector is introduced, referred to as the "automated invasion attack".
The Internet of Things: Security Challenges and Solutions
viXra, 2020
The Internet of Things (IoT) is the notion of converting everyday objects into smart objects. The purpose of this is to connect the rigid objects we use in our everyday lives to one another to create smart homes, smart cities and smart environments. Objects such as clocks, thermostats, speakers and almost every other electrical object are being equipped with the ability to connect to the internet. This in turn converts the object into a smart object which becomes a part of the internet of things family.
International Journal of Computer Trends and Technology (IJCTT), 2020
The so called internet of things (IoT) is a form of technology advancement that has a capacity for driving change in our daily lives in a variety of sectors. The fantastic opportunity will help in the collection of data that is relatively exponential and in a manner that is continuous to present changes that are significant on the lives. Devices growth and the speed in which they are developed to attain the IoT era of technology offers the challenges of security and the battling of freedom as people establish policies and governance that rebuilds the developments without interfering with the innovations. Among the issues, includes the concerns on the security and privacy brought by the technology. The vulnerabilities of security that are experienced by the IoT devices are as a result of the contributing factors like the low capabilities of the devices in terms of energy and the capabilities of computing, the wireless channels are seemingly unreliable, and the vulnerabilities on the physical nature of the devices. This paper will focus on the IoT evolution, the definitions attached to IoT, and some of the many applications of IoT. It will create an emphasis on the considerations of security and privacy, including the challenges that are tied to the general IoT and the IoT application context. A critical assessment of the works done for IoT is presented by the literature review on the perspective of the developmental era and the evaluation of the trend. The paper will also give the IoT security risks taxonomy, mechanisms, and attacks related to the technology.
Exploring the security and privacy issues arising from the Internet of Things
The Internet of Things is embodied in a wide spectrum of networked products, systems and sensors, which take advantage of the developments in computing power, electronics, miniaturization and network interconnections to offer new capabilities, which have not been possible before. It has been called “IoT revolution” in conferences, reports and news articles, which discuss the anticipated rapid development of this phenomenon. The Internet of Things is considered to be the Industrial Revolution 4.0, which is expected to bring great comforts for consumers, create more market opportunities and business models, but the road of progression is paved by concerns about security and privacy arising from the Information Technology field.