Home > Sample essays > Devices in an IoT ecosystem

Essay: Devices in an IoT ecosystem

Essay details and download:

  • Subject area(s): Sample essays
  • Reading time: 6 minutes
  • Price: Free download
  • Published: 1 April 2019*
  • Last Modified: 23 July 2024
  • File format: Text
  • Words: 1,707 (approx)
  • Number of pages: 7 (approx)
  • Tags: Internet of Things (IoT) essays

Text preview of this essay:

This page of the essay has 1,707 words.



Abstract

The Internet of Things has changed due to the advancement of technology and pressure from companies to innovate faster. The possibility of unintended surveillance that comes through modern lifestyle demands evolution of technology. Further, experts have predicted that more devices will be in IoT by 2020 (DI Martino, Li, Yang, & Esposito, 2017). This research has highlighted the significant challenges associated with the Internet as we know it today. There are challenges currently with IOT and it is expected to have more issues in the future. Therefore, these emerging technologies must be secured promptly and efficiently. The challenges and security concerns relate to IoT trust, authentication, provisioning, confidentiality, availability, confidentiality, access control and integrity. This paper, therefore, examines security and challenges for the Internet of Things.

Table of Contents

Title Page 1

Abstract 2

Introduction 4

Methods 4

Type of research 4

Using reliability theory 4

Background information 5

Findings 5

Cyberattacks 6

Establishing business model and location 7

Audio data 7

Digital identity 7

Emergent behaviours 8

Identification 8

Discussion 8

IoT scalability studied using simulation 8

IoT business investment. 9

Conclusion 9

References 10

Introduction

Internet of Things can be termed as a process of interconnecting devices intelligently to systems with the aim of leveraging data that is gathered by embedding sensors and actuators in machines. These devices include; cell phones, home appliances, smart outlets, LED bulbs and among other machines that have on and off options to be connected to the internet. Experts have predicted that IOT will rapidly spread shortly and the quality of services will improve within the next few years. The advantages associated with IOT include better, optimized production and enhanced management (Krishna, 2016). However, despite these advantages, security vulnerabilities are threatening the system and can lead to security breaches. Users will get worried about privacy violation such as ransomware. Also, there is fear of loss of life due to attackers controlling various items such as your home devices and such.

Methods

Type of research

This paper utilizes both qualitative and quantitative types of research. The objective of the qualitative research is to understand the security of IOT and the security challenges. The discipline investigates the vulnerability of the Internet of Things. This research was conducted through Internet by gathering secondary data.  According to Di Martino, Li, Yang, and Esposito, (2017), experts have been trying to figure out mitigation measures against internet threats. Therefore, to get accurate data, this research paper is based on secondary data. Besides this, the paper will vividly present an explanation of the phenomena by analysing numerical data to show progressive changes in the sector.

Using reliability theory

This theory can describe the reliability of the IoT system to achieve the expected performance. Each component is keenly analysed to determine its viability. Five reliability functions are included in internet, perception layer, mobile, network, satellite communication, and application layer (Di Martino, Li, Yang, & Esposito, 2017). This theory can also be applied to determine the quality of service and data management

Background information

The concept of internet research was put forward by Mark Weiser when he wrote an article in Scientific American. According to him, the idea generated due to the continued trend of the reduced price of items, size, and energy consumption. The term was used by the British technologist Kevin Ashton. He described IoT as a process in which physical items can be linked to the internet using sensors. He was illustrating the power of connecting Radio-frequency identification (RFID) that is used in supply chains to count and track goods without the need for human   intervention (Fraga-Lamas et al., 2016). Thus, much of the research conducted into IoT has been from an engineering perspective with scientific approach.

Findings

Table 1. Technical and Business Research Challenges of IoT and applicable OR tools

IoT Challenge OR Tools/Techniques Applicable

Design

Architecture Data analytics, optimization, game theory

Interoperability (Addressing/

Naming Objects)

Scalability Simulation

Mobility Simulation

Security/Privacy Data analytics; fuzzy systems; graph theory

Scientific/Engineering

Energy Efficiency/Power Simulation; Game theory; decision analysis

Reliability/Robustness Reliability theory

Management/Operations

Software Development Expect simulation to help?

Availability Reliability theory; simulation should apply

Data Management/Information Fusion Game theory; data analytics

Cloud Computing Decision analysis; data analytics

Performance (Quality of Service) Optimisation; reliability theory;

queuing theory; math programming;

stochastic processes

(Fraga-Lamas et al., 2016)

Cyberattacks

Devices that are not well secured could be entry points for cyber-attacks. Individuals with malicious intentions can re-program the devices or cause them to malfunction. Therefore, the user’s data can be exposed to theft by leaving data streams inadequately protected. Higher costs of production and technical constraints on the internet of things context challenge manufacturers to design security features into these devices which leads to a security vulnerability. Security deficiencies in these devices coupled with increased number and nature of IoT raise opportunities for attacks (Krishna, 2016). Therefore, every device that is connected online through internet potentially affects the security and resilience of the internet.

The ability to function, without using internet-connected devices will reduce. Notably, it is already difficult to purchase items that are not internet enabled. Most people are becoming dependent on devices that are IoT connected for essential services. While doing so, we need to be secure, yet we know that no device is secure.

Establishing business model and location

Developing a business model for the IoT is a challenge but can be addressed by OR. Free enterprise society has a market setting whereby it is easier to locate customers that are near the region. Knowing the location patterns of the target demographics help advertisers to efficiently plan (Ziegler et al., 2015). IoT has enabled social media and physical dimensions to proximity. However, people are not willing to give their location data, but IoT sensors that are owned by others can share data implicitly anonymous. Only four data points are required to identify a person, and it's identified as a commodity in commerce and governments. This aspect is likely to become an enabler crime.

Audio data

Many home devices have voice activation features. Thus, for that to work, voice data are collected continuously and then uploaded from the device cannot recognize a command when something is spoken. The unfortunate issue is that it is a requirement for users to accept the terms and conditions before using the services (Ziegler et al., 2015). The Less acceptable practice also happens to make it unavoidable to breach privacy agreements.

Digital identity

The only right way to provide digital identification is by delivering pre-shared secret keys. These keys are stored in non-volatile read-only memory that is used to encrypt data. He approaches, expensive and vulnerable side channel attacks since it can tamper.

Emergent behaviours

These are behaviors that can happen in complex systems, mostly due to feedback relationships. The possibility of unintended negative emergent behaviors can be significantly substantial.

Identification

Interaction and collection of a significant amount of information have become relevant as the evolving technologies raise the threats of identification (Ziegler et al., 2015). For example, surveillance cameras have become increasingly integrated and are being used in the non-security context like marketing platforms. This aspect of identifying individuals automatically defies the privacy policy

Discussion

The OR techniques can be readily applied to predict IoT and reliability. Three subsystems of the network layer, perception layer, and application layer (Roy & Chowdhury, 2017). Their transmission networks are assumed to independent. Therefore, as per Roy and Chowdhury (2017), the application layers and perception layers are dependent, total reliability (RT) is therefore given by

RT = R1 × R5 × (1 − ∏ 4 k=2(1 − Rk))

From this equation, R1 is the reliability of perception while R5 is a reliability of application layers. R2 is the reliability of the internet, R3 is the reliability of the mobile network, and R4 is reliabilities of satellites. Also, reliability theory can be applied to data collected.

IoT scalability studied using simulation

According to Roy and Chowdhury (2017), scalability is the first challenge in IoT. The reason is that IoT will have billions of devices connected. These devices will require management and maintenance. These devices operate and supported using conventions, protocols, and power appropriately. The available approaches may lack adequate and hence fail to scale the required number IoT objects.

The IoT will have billions of electronic devices, and many of them will be impossible to reconfigure in the contrast one's computer that needs regular software updates or hardware upgrade. These updates and upgrades will increase more memory, CPU power, and storage space.

IoT business investment.

Decision analysis has been applied before. But game theory and discrete event simulation as appropriate for the application. These techniques have been used previously to explore technical issues like the multipath selection and data distribution (Krishna, 2016).

Conclusion

In conclusion, this paper emphasizes the need to analyze security threats and challenges on the internet of things. First, I provided a basis to discuss security and difficulties in IoT with a short review. Secondly, I acknowledge that IoT is evolving and gives good services. Finally, I stress my core thoughts that privacy is a challenge and must be faced with necessary measures Solutions require well-coordinated actions to provide technical support. This research paper has shown how QR techniques can be applied to solve challenges associated with the internet with technology. The IoT is best requires other forms of systems and software engineering, project management that will help develop and control the system in future. Privacy violations in the interaction and presentation are possibly considered as a future threat. The correspondent mechanisms with smart things and systems that are evolving heave received little attention in the related work.

References

Di Martino, B., Li, K., Yang, L. T., & Esposito, A. (2017). Trends and Strategic Researches in Internet of Everything. Internet of Things, 1-12. doi:10.1007/978-981-10-5861-5_1

Fraga-Lamas, P., Fernández-Caramés, T., Suárez-Albela, M., Castedo, L., & González-López, M. (2016). A Review on Internet of Things for Defense and Public Safety. Sensors, 16(10), 1644. doi:10.3390/s16101644

Krishna, M. B. (2016). Security and Trust Management for the Internet of Things: An Rfid and Sensor Network Perspective. Cyber-Assurance for the Internet of Things, 137-162. doi:10.1002/9781119193784.ch4

Roy, S., & Chowdhury, C. (2017). Integration of Internet of Everything (IoE) with Cloud. Internet of Things, 199-222. doi:10.1007/978-3-319-50758-3_8

Ziegler, S., Nikoletsea, S., Krco, S., Rolim, J., & Fernandes, J. (2015). Internet of Things and crowd sourcing – a paradigm change for the research on the Internet of Things. 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). doi:10.1109/wf-iot.2015.7389087

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Devices in an IoT ecosystem. Available from:<https://www.essaysauce.com/sample-essays/2018-12-10-1544418738/> [Accessed 20-11-24].

These Sample essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.