Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Executive Summary of Developing Security Framework for Internet of Things (IoT) Layers

Category: Computer Sciences Paper Type: Dissertation & Thesis Writing Reference: APA Words: 5000

In this paper, the main focus is given to internet of things (IoT) and its relevant aspects. The research will try to understand that which issues are more crucial for internet of things (IoT) in terms of its privacy and security. The research has focused on cloud computing as a source for internet of things (IoT) to keep its process streamlined. To get more idea about the topic, a comprehensive literature review has been done to see that which aspects related to internet of things (IoT) are more important than the others, and it has also tried to analyze that what kind of risks are there for internet of things (IoT). The privacy and security is crucial for internet of things (IoT) because a lot of sensitive data is transmitted through this technology, and if any threat is there to breach the data, or destroy it, then it can be devastating for the future outcomes of technology. So, research has tried to use different research methods to provide solution for internet of things (IoT) in terms of its security and privacy. The paper has concluded that internet of things (IoT) and cloud computing are both important for each other, and their collective use for better security and privacy can be instrumental for the field.

 Introduction of Developing Security Framework for Internet of Things (IoT) Layers

In this paper there is discussion about security in internet of things. Due to increase in technology we have seen that internet of things is one of the most emerging technology of the twenty first century. The main aim of this technology is the development of user-specific IoT applications and myriad industry-oriented is facilitated by the IoT. Meanwhile, networks and devices offer the connectivity that is physical. In a robust and reliable manner, the device-to-device connectivity and interactions are enabled by the IoT applications. On the devices, IoT application requires to ensure that messages have been grasped and managed according to the time (Bandyopadhyay, Debasis, & Sen, 2011). The main aim of this internet of things is that they will connect all the embedded devices to everyday objects around us and also to make them smart devices or objects. All those smart devices that are attached to the internet of things are unique and also identifiable. Though the use of these devices we can easily communicate with each other (Botta, Donato, Persico, & Pescapé., 2016). The internet of things provides the users a great chance to achieve their main goals by performing the impossible and complex task that is used for the benefit of the humanity. All these devices who providing the internet of thing services have the ability to collect the right amount of data and also able to process that data and transmit the required information to the customers (Miorandi, Sicari, Pellegrini, & Chlamtac, 2012)

These all these tasks are only possible when there is use of integration of existing technologies that includes smart sensor networks, near field communication, radio frequency identification and also the internet itself. Through integration of all these technologies into a system as the internet of things are made up of vast variety of devices that can able to make more powerful and more complex servers for the system. Due to the heterogeneous nature of the internet of things it can be said that some devices are the constrained devices (Derhamy, Eliasson, Delsing, & Priller, 2015). The constrained devices are those devices that contain low throughput but their probability of packet loss is extremely high. The main reason behind these constrained devices is that these devices processed limited capabilities like they processes high power, low memory and their bandwidth is also limited. By putting all these limitations in mind about the constrained devices we have seen that the traditional solutions for the security problems which are designed for the internet will not able to function it perfectly. The reason behind this solution is that these solutions require a considerable quality of resources and also the energy (Al-Fuqaha, Ala, Mohammadi, Aledhari, & Ayyash, 2015)

The main question for the attention is that why the world is interested in internet of things the main reason is that this is one of the most emerging technologies of the world and also this can able to change the mindset of the world towards emerging new technologies. As many other big organization are attracted to this internet of things because this is emerging technology and then after this many security risks has been increased. As we have seen that emerging technologies like IoT is facing a lot of challenges according to the security issues in this technology. All these security issues regarding the internet of things must have to be overcome so that all the organizations can able to use this technology for their regular use (Liang & Chao, 2011)

The main and most important challenge is according to the security of this technology because internet of things collects data from different servers around the globe so because of this the risk issues arise in a great amount because sensitive information has to be delivered to other people and corporations. When the sensitive information has to be transferred from one point to another through the use of internet of things so that many security issues arise for this the organizations have to develop a system that can able to minimize and end the security issues regarding this system (Alam, Chowdhury, & Noll, 2010)

For example, transportation applications monitor and watch over the status of goods that are transported like the meat and fruits etc. For the IoT applications, it is quite important for them to be produced with the intelligence so that the environment can be monitored, and problems are identified etc

Based on the development, methodologies, and products, this section of the article will discuss the role of the cloud computing in the development of IoT. The adoptive enterprises will suffer many problems with the disruptive innovations. Say, an explosion is produced by the machines of IoT; it will not only damage the server technologies, storage management, consumer privacy, security, and even the networking of data center (Uckelmann, Harrison, & Michahelles, 2011)

Problem Definition of Developing Security Framework for Internet of Things (IoT) Layers

The internet of things is a network of physical based objects that can able to communicate with the other devices and can able to interact with the environment.  Based on the development, methodologies, and products, this section of the article will discuss the role of the cloud computing in the development of IoT. The main aim of this network is that this creates ecosystems that contain many applications and services. The adoptive enterprises will suffer many problems with the disruptive innovations. Say, an explosion is produced by the machines of IoT; it will not only damage the server technologies, storage management, consumer privacy, security, and even the networking of data center. The main problem is that as the internet of things is the emerging technology of the modern era so because of this several security risks increase in a great amount so the organization that are using this technology have to overcome so because of this the sensitive data can be saved.

There are some key issues that has been identified are as follows regarding the internet of things like the authentication, authorization, confidentiality, integrity, privacy, self configuration, software authenticity, availability, hardware anti-tempering, trust management and the key management.

Hypothesis of Developing Security Framework for Internet of Things (IoT) Layers

H0: what is the future challenge regarding the internet of things

H1: what kind of research has been done to overcome the security issues regarding internet of things

H2: how to transfer the data through the use of internet of things by minimizing the risks.

Objectives of Developing Security Framework for Internet of Things (IoT) Layers

The main objective of this paper is that to manage the security issues regarding the internet of things. Through the use of internet of things the different users can able to communicate with the other users easily. The security risk issues were discussed in detail.

Significance of Research of Developing Security Framework for Internet of Things (IoT) Layers

The adoptive enterprises will suffer many problems with the disruptive innovations in the technology so that a system is required that can able to overcome all the security issues regarding internet of things.

Literature Review of Developing Security Framework for Internet of Things (IoT) Layers

According to Muhammad Umar Farooq (2015), the IoT has a very secure future and has backup plans made for security threats. However, it is always important to build a precise solution for the unseen attacks which may be poised on the company. The possibility of a company being exposed to a hacker is also present. That is why companies need to make sure that their products and services are completely safe. The same thing goes for the IoT as well. Muhammad Wasim (2015) tells that there are different security threats at different layers of the security system. At the perception layer, there might be an invalid access or entrance to the tags while at the network layer; there can be sinkhole and Sybil attacks. At the middle-ware, there can be a DoS attack and at the application layer, there can be a Malicious Code Injection along with a Spear-Phishing Attack.

According to Anjum Khairi, the development is advancing at very high speeds and the only hurdle is the security. The security threats to the operating of IoT are quite expository. In order to make sure that there are no security threats risking the confidentiality, modifications should be made to architectural layer along with the implementation of a infrastructure concerning the security using previous and further IT techniques as well (Farooq, Waseem, Khairi, & Mazhar, 2015).

According to Gubbi (2013), the challenges that IoT faces despite the advanced networking and high quality services include Cloud computing, visualization on the basis of GIS, data analytics, participatory sensing, and privacy. Meanwhile, the normal WSN issues and challenges include quality of service, protocols, security, energy efficiency, and architecture. All the while Marusic (2013) tells that the goal is to ensure the implementation of smart and efficiency objects which can be programmed and used anywhere in the system to blend in the environment and start producing some efficient results.

Palaniswami (2013) tells that encryption plays a major role in securing the system against different types of security threats and making the system secure. With the use of encryption, data confidentiality is strengthened while codes of message authentication ensure the data authenticity and integrity. However, it doesn’t mean that encryption protects against all the types of attack. When it comes to inside attacks which are particularly malicious, it fails to protect the system. That is non-cryptographic means are needed for the development of a strong security layer. Generally, such means refer to nothing but WSNs. Moreover, the installation of new applications concerning the sensors is also required. If resources are not capable of that then existing ones can also be updated (Gubbi, Buyya, Marusic, & Palaniswami, 2013).

According to Rodrigo (2011), virtualization of everything real takes place. It means that every single thing and a person have a significant signature on the internet. There is definitely a code imprinted in the internet which can be assessed using different methods. There are different hurdles which are present in the path of IoT. Although their vision is very broad and promising, there are still some issues such as security which threaten to produce some inefficient outcomes. The users of internet are always at a very strong risk of penetration from the outside which can expose the confidential files and take the advantage of vulnerability. IoT cannot just stand and watch as their networking system is exploited. There is no way that a virus or something malicious can just enter the framework and leave a full impact. It is very important for IoT to ensure that security frameworks among layers are always strong and ready to tackle different malwares and malfunctions all the time.

Lopez (2011) tells that only enhancing privacy assurance, secure protocols, cryptography, and protection mechanisms are not enough to block. It is very important for researchers to explore the risks properly and measure just how the obstacles work. In order to make the security framework strong, the present security protocols must be properly analyzed. After the evaluation, it must be decided whether such protocols and security practices are enough to be implemented in the existing technologies or not. It should be analyzed whether new technologies can enhance the overall security layer or not. A proper, technical, and a legal framework are quite important. In order to establish such a system, the risks concerning with different scenarios of IoT (Roman, Najera, & Lopez., 2011).

According to Weber (2010), when it comes to the internet and its connections among different devices and functions, risks automatically reach there. No matter what designs is implicated, there are always some potential risks that threaten to break the firewalls and trespass the boundary to steal the important information or to ruin altogether. Data being lost is much more risky that it being exposed. The exposed information can be recovered and generated again. However, the lost one is very important because it has all the leads that a specific organization is going to follow in all of the upcoming plans. That is why building a strong framework against the security threats is very important.

Weber (2010) tells that measures concerning the privacy of client, access control, data validation and authentication, and resilience of the architecture to attacks and different types of risks are very meaningful and significant for IoT. Such measures are also very important for other companies as risks are present regardless of the industries (Weber, 2010).

Sicari (2015) demonstrates that heterogeneous technologies make the innovative solutions and services which IoT provides to different industries and domains. They are capable of fitting every environment and drive the best results from it. The security of such technologies and applications is always important and it cannot be denied that satisfaction comes by knowing that the information is safe without a threat. Within the network of IoT, it is very important for the access control, data authentication, and data confidentiality to be strong no matter what. With a strong framework of security, IoT will be able to develop not only the trust but also the satisfaction (Sicari, Rizzardi, Grieco, & Coen-Porisini., 2015).

According to Jing (2014), IoT has never actually stopped getting popular. With every passing day, the fame is rising but it doesn’t mean that the path ahead is easy for it. Almost the opposite can be said with the emergence of different and stronger security issues for the system of IoT. In order to make the framework stronger and repel viruses, only the solutions and adjustments from each of the sub layers are not required. The required criterion is not only stricter but difficult as well.  Some common applications of IoT are: Smart Grid, Smart Green, Intelligent Medical, Intelligent Urban Management, Smart Home, and Intelligent Transportation. All of them have their own requirements for security and they vary according to different risks. For example, it can be said that data privacy’s security is important for the Intelligent Medical and Intelligent Transportation. However for Smart Green and Intelligent Urban Management, the importance of data authenticity is considerable.

In order to produce the best framework, the study of each application and its threats is very important. There are some security requirements which just cannot be improved using a application layer which is weak. In a weak layer, a hacker will be able to access the information without much of a difficulty regardless of the efforts done to keep it powerful. Therefore for the usage of cross layers, corresponding technologies must be designed by us (Jing & Athanasios V. Vasilakos, 2014).

According to Atzori (2010), the IoT has many reasons for being vulnerable to different types of attacks. Mostly, the components are unattended and the communications are utilized without wires which makes taking information without being noticed quite easy. In the security of IoT, the major concerns are the data integrity and the authentication. They are the ones which make it very difficult for the security to be strong. Authentication is mostly tough due to the valid authentic infrastructure for the achievement of goals.

Although, different initiatives have been taken for the strengthening of the security infrastructure but they have made no progress. After all, basics ought to be addressed first before moving on to the difficult parts. In order to make the infrastructure strong in such a way that no risk is able to penetrate, elements such as authenticity must be made stronger no matter what happens. A solution concerning previous techniques and the upcoming ones must be devised (Atzori, Iera, & Morabito, 2010).

IoT has introduced a completely new face with the use of RFID to the industry. A lot of development has been made just on the basis of it. In recent years, many wireless devices have been developed and implemented as well. They have been adjusted in such a way that the whole network is benefitted and is able to produce efficient results. However, the security issue still is there. It must be addressed properly to ensure the satisfaction and trust in IoT devices. After all, the privacy and confidentiality of the data is very important. It is significant to erase all types of possibilities of risks (Xu, He, & Li, 2014).

Resign Design Methods – Solution Approach of Developing Security Framework for Internet of Things (IoT) Layers

Security testing should be performed at highest possible scale. The sheer volume of technology in IoT makes it necessary for every design and security consideration to be taken into account. Simple bootstrapping into an ecosystem can create a self-denial of service condition at IoT scale. Automated systems are capable of complex, monotonous, and tedious operations that are extremely difficult and time consuming for humans to perform. IoT systems should seek to exploit this advantage for security. Data encryption only protects encrypted pathways. Data transmitted over an encrypted link is still exposed - prior to encryption, after decryption, and along any communication pathways that do not enforce encryption. The entire data lifecycle should be carefully scrutinized to ensure that encryption is applied uniformly and appropriately. Make sure that all IoT components are stripped down to the minimum viable feature set to reduce attack surface. Unused ports and protocols should be disabled, and unnecessary supporting software should be uninstalled or turned off. Be sure to track third party components and update them regularly. Ensure every line of code provided by third parties is audited. IoT systems are not very powerful. They have multiple nodes even in cases of minimal computing. Always account for communication and processing issues. IoT systems should have capabilities to respond to compromises, hostile participants, malware and other adversities.

Another study the research concerning the cloud computing security. In today's era the problems that faced by the cloud computing is that the executable side of the relevant development. The effectiveness of the tools enhances the practices of our integrity and suitableness effects. This field faces several challenges, which will need to resolve. The author quoted that, there are the argument and typically effective learning improvement that assess the protection conspiracies in an exceedingly correct method. The subject of analysis might argument the talents and effective thinking’s within the method. Typically their space heap things to figure and being within the credibleness of the items that are concerned within the security method. If we tend to be sure of the protection problems with our learning atmosphere it will build things higher in an exceedingly correct method. Technology talks concerning the protection domains and also the affected problems with the web connected cooperative issue which will enhance the talents of our technical field. The problems might enhance the mistrust chance towards the shoppers and also the public, as a result of in our business life we tend to accommodate security clouds of knowledge and technologies might face several issues and consequences. We want to search out some effective thanks to enhance our info technological areas. This work might take it slow to induct the items that are enclosed within the cloud computing atmosphere of knowledge and technology (Jayakumar, et al., 2014).

Methodology of Developing Security Framework for Internet of Things (IoT) Layers

To identify which area desires additional analysis and effective, in cloud computing security problems do the literature review. In an exceedingly literature review, we embody all the information in keeping with our analysis study. We will use the strategy of snowball sampling.

Collecting information from the literature of Developing Security Framework for Internet of Things (IoT) Layers

It has been decided to take the info from literature review. Through this we will be able to take the articles written by the researchers relevant to the subject. These items of data embrace the within the snowball sampling for collection the knowledge to satisfy the necessities of RQ1 and RQ2, this methodology can facilitate in gathering the references that if incomprehensible through the snowball sampling. This literature review can facilitate to seek out the results. Some steps which will be conducted in gathering data are as follows;

List of attainable terms

Establish the keywords

Modify the list terms

Collecting the Data Using Qualitative Approach of Developing Security Framework for Internet of Things (IoT) Layers

After gathering the information from literature review, we will be able to conduct some interviews with the relevant persons. In the interview qualitative questions will be asked from the individuals. The interview is the best way to collect in-depth information. The interview would be unstructured and the individuals will be allowed to provide detail information. Along with interview qualitative survey will also be done to gather data in abundance.

Contribution of the Research of Developing Security Framework for Internet of Things (IoT) Layers

In the past the researchers have conducted various studies to provide brief information regarding the privacy & security of the internet of things. However over time due to increase in various security related issues and advancement in technology the need for a better and more secure approaches has increased. The hackers today are come up with more advance ways to breach the security protocols therefore research is required for providing more information regarding security of devices which are connect with each other. This research will try to fill the research gap which previous studies have regarding security and privacy in the internet of things (IOT) framework.

SWOT Analysis and Strengths of Developing Security Framework for Internet of Things (IoT) Layers

In this project, the strengths are there due to resources with lot of available information. It is important to have enough information, resources to set a road map for the research project. The processes and systems are already there and other researchers have also looked at various security issues for internet of things (IoT), which would allow this research project to keep things on right track. It also means that resource availability and research data are integral for this research.

Weaknesses of Developing Security Framework for Internet of Things (IoT) Layers

It is important for the research project to identify any gaps in knowledge and those gaps can be considered weakness for this research project. Moreover, lack of expertise and skills can also be a weakness for this research project as research methods cannot be tested without proper knowledge. It is also important to ensure that given time frame of the project is good enough to complete all relevant steps otherwise time will be gone without completing the project in given time frame.

Opportunities of Developing Security Framework for Internet of Things (IoT) Layers

This research project has great opportunities for the future research and for the field of internet of things (IoT). The market and technology are evolving, so they need more ways to integrate processes with better security and privacy for the users. The research would allow researchers to look at the security issues in more detailed manner and try to find ways, which would allow bringing in innovation, and keeping internet of things (IoT) as secure as possible with improved security methods.

Threats of Developing Security Framework for Internet of Things (IoT) Layers

The technology has so many aspects and it is always hard to keep them streamlined in the research project. So, if proper expertise will not be used with proper strategy, the research can face various threats and problems. For instance, the lack of resources may stop the project from its completion in time or it may not give desired results for the research project.

Conclusion of Developing Security Framework for Internet of Things (IoT) Layers

Summing up the discussion it can be said that cloud computing and IoT are inseparable. The IoT and cloud computing are quite a recent development, there is still a need of studies concerning the economic, managerial, social, and behavioral aspects. That is what makes this challenging for the companies to make decisions concerning the cloud computing role in IoT. The innovation of IoT really is exceptional. However, there are some challenges involved as well. For the journey ahead, use of cloud computing in IoT needs to cover the threats and offer the reliability.

References of Developing Security Framework for Internet of Things (IoT) Layers

Alam, S., Chowdhury, M. M., & Noll, J. (2010). "Senaas: An event-driven sensor virtualization approach for internet of things cloud.". NESEA, 1-6.

Al-Fuqaha, Ala, M. G., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). "Internet of things: A survey on enabling technologies, protocols, and applications." . IEEE Communications Surveys & Tutorials 17, 2347-2376.

Atzori, L., Iera, A., & Morabito, G. (2010). "The internet of things: A survey." . Computer networks 54, 2787-2805.

Bandyopadhyay, Debasis, & Sen, J. (2011). "Internet of things: Applications and challenges in technology and standardization.". Wireless Personal Communications 58, 49-69.

Botta, A., Donato, W. D., Persico, V., & Pescapé., A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems 56 , 684-700.

Derhamy, H., Eliasson, J., Delsing, J., & Priller, P. (2015). "A survey of commercial frameworks for the internet of things.". IEEE Communications Society.

Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).

Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems 29, 1645-1660.

Jayakumar, H., Lee, K., Lee, W. S., Raha, A., Kim, Y., & Raghunathan, V. (2014). Powering the Internet of Things. 375-380.

Jing, Q., & Athanasios V. Vasilakos, J. W. (2014). Security of the Internet of Things: perspectives and challenges.". Wireless Networks 20, 2481-2501.

Liang, Z., & Chao, H.-C. (2011). "Multimedia traffic security architecture for the internet of things." . IEEE Network 25, 3.

Miorandi, D., Sicari, S., Pellegrini, F. D., & Chlamtac, I. (2012). "Internet of things: Vision, applications and research challenges.". Ad hoc networks 10, 1497-1516.

Roman, R., Najera, P., & Lopez., J. (2011). Securing the internet of things. Computer 44, 51-58.

Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini., A. (2015). "Security, privacy and trust in Internet of Things: The road ahead. Computer networks 76, 146-164.

Uckelmann, D., Harrison, M., & Michahelles, F. (2011). An architectural approach towards the future internet of things. In Architecting the internet of things, pp. 1-24. Springer, Berlin, Heidelberg,.

Weber, R. H. (2010). Internet of Things–New security and privacy challenges. Computer law & security review 26, 1.

Xu, L. D., He, W., & Li, S. (2014). "Internet of things in industries: A survey.". IEEE Transactions on industrial informatics, 2233-2243.


Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed