Sunday, December 8, 2019

Architecture Protocols Internet Of Things â€Myassignmenthelp.Com

Question: Discuss About The Architecture Protocols Internet Of Things? Answer: Introduction Internet of things (IoT) represents a dynamic shift in the operational structure of the internet where technological objects and gadget are holistically embroiled into a worldwide network. In this network, these devices identify themselves autonomously and share information based on their needs and those of their users. Therefore, as a future technology IoT represent the next evolution of the internet where technology will take advantage of the advancement in digital systems more so, virtualization, computing power and system miniaturization [1]. Furthermore, it is through IoT technology that smart systems will be developed having the ability to function without human intervention. In essence, the implementation of IoT will signal the start of smart cities, an outcome already seen today. Now, this report analyses IoT as a technology including the security challenges and threats that will be experienced as a result of its implementation. Literature review In the current world, the foundational concepts of IoT are already being seen, things like smart television systems, smart watches and smart phones are propelling the digital era into a smart society. These gadgets rarely need human intervention to operate, an outcome that is used to define a smart object or device. Moreover, these devices are designed based on the needs of the users which make them dynamic and versatile as compared to conventional systems that were developed based on the existing conditions [2]. Again, this shift in the design of technological system outlines the parameters needed to implement IoT where intelligence and self-awareness are critical components. However, in all the research and discussion given on the topic, no single accepted definition is given on the term (IoT) other than the ability to add intelligence into the various working environments [3]. IoT Technologies To increase the worldwide connection of devices, extensive networks are needed which outlines the importance of the internet in the future of IoT. In fact, its integral role in connectivity outlines why smart systems and even IoT are named as its next evolution. However, at the same time, the digital environment has to consider the demands made by the end users particularly based on their convenience requirements. This demand necessitates the need for agile and dynamic systems, factors that have led to the growth of wireless technology, a centre mark for IoT [4]. In essence, wireless technologies will act as the foundation of IoT connecting different data centres, devices and the complementary features (sensors and actuators). Now, the complementary features (sensors and actuators) will enable the devices to connect with each other based on various identification technologies. At the moment, RFID (radio frequency identification) is still the main technology proposed for IoT as it serves the connection purpose and has multiple operational benefits such as simple design structure and minimal cost. Furthermore, RFID can be integrated with the existing internet technologies more so IP (Internet Protocol) addressing which is majorly used to connect and uniquely identify devices online [5]. Now, IP has in the past few years experienced drastic changes especially in its addressing scheme where the IPv6 has been developed to handle the number of devices expected in the future. In all, IPv6 will offer an unlimited number of addresses based on a bi-directional and symmetrical machine to machine (M2M) communication structure. Architecture Similar to other new technologies various models/architecture have been outlined based on the existing systems. However, according to the ITU (International Telecommunication Union), IoT should be based on five implementation layers, i.e.: Sensory layer (SL) Access layer (AL) Network layer (NL) Middleware layer (ML) Application layer (AL) [6] SL: The initial operational layer that will hold the sensors and control actuators. These devices will collect information and turn it into important data to control the IoT devices. This layer covers a wide range of devices such as camera systems, detectors, accelerometer and even heart rate monitors among many others [7]. AL: consisting of the access gateways, this layer will aggregate the sensors and actuators through the various connection methods. In this case, the layer will hold networking concepts such as local area network (LAN) and wide area networks (WANs) to integrate the various devices. Furthermore, these connections will be supported by the various networking technologies such as Ethernet, Wi-Fi, ZigBee, Bluetooth and 6LowPAN [8]. NL: the different networks used in the access layer will need a common aggregator that will combine them into the one IoT platform. Now, this will be the function of the network layer which will be based on the defining protocols such as IP and the embedded operating systems. In essence, the network model defined will have to support a worldwide communication having the QoS parameters (latency, bandwidth, error probability and scalability etc.) [6]. ML: the intermediary layer that will manage the IoT services including the data involved. Therefore, the middleware layer will act as both a service layer and a data management layer. Its management service will include; security control, object management and analyzing information. On the other hand, its data management roles will filter data to produce the critical operational information [9]. AL: the final layer that will present the features of IoT to the end users based on appropriate APIs (application presentation interfaces). Now, these APIs will vary based on the industry or application used. Furthermore, they will vary based on the needs of the users which could be personal (home application), enterprise (business), or utility in nature (national or regional application). In all, the application layer will operate in a smart environment holding agile and adjustable opeational domains [2]. Benefits of IoT IoT will present many benefits, most of which will arise from its autonomous nature and the ability to operate with minimal resources. Some of these benefits will be: Minimal operational costs IoT will be fully automated requiring less operational resources. Minimal errors decisions will be based on factual and accurate data, which will improve outcomes. Worldwide integration this will increase information access and create new environments for business operations [10 Security Vulnerabilities Most of the IoT components such as sensors and actuators will be deployed on a massive scale that traditional and conventional interconnections will not have experienced. These components will be intensified further by the number of devices that will be connected into the IoT framework. In all, this design structure will have resounding pressures on the existing networking systems more so, the security structures that are designed to contain and isolate networks. In essence, the existing security protocols will lose their strengths as IoT will infringe directly on their operation mechanisms which will make them vulnerable to intrusions/attacks [11]. Secondly, consider the diversity of devices, protocols and network models that will exist within the general framework of IoT. In the existing structure of the internet, various systems are used which make it vulnerable to attacks as different security measures are used. Similarly, IoT will have different components that will either be identical or non-identical. This homogeneity and heterogeneity will magnify the existing security problems of worldwide connections. In essence, some devices and networks will have the necessary security measure to protect the users as compared to others. A good example is a smart watch that may act a rogue access point having minimal security measures while connected to a home network having sensitive data [11]. Finally, consider the manufacturers and developers of IoT devices and technologies. Most of these companies will design systems based on the immediate needs of the users while having minimal security considerations. In fact, some companies will design systems without security features so as to boost support business. Moreover, other companies will design systems without upgrade features which will affect the overall IoT security when new intrusion mechanisms are developed. In addition to this, some devices will outlive their manufacturers while they are still connected to the worldwide structure which will create serious security vulnerabilities as they will have no technical support [12]. Possible solution Although the solution outlined in this section covers the deployment of IoT devices i.e. the first vulnerability, this mitigation procedure can as well prevent the other security threats outlined. In essence, the solution to the security issues of massive system deployment is proper design practices. How is this so? While worldwide connection and integration are needed, there should be critical trade-offs between the technologies used and the security measures implemented. The design and development of IoT devices should be done based on specific industry standards that would see all manufacturers conform to certain security regulations. Moreover, the same standards would outline the design practices or framework of deploying all IoT systems. Now, this design practices would include security features such as cryptography where system authentication, authorization and encryption would be done. Furthermore, the same practices would encapsulate the requirements of system upgrades, parti cularly in the field setting [11]. Conclusion IoT defines the next evolution of information technology where the internet will be extended to support all devices and objects. Now, through this extension, IoT will integrate all aspects of life from business to home activities. Furthermore, through this technology devices will become autonomous which will improve their intelligence hence increase their efficiency. However, the implementation process should also cater for the security issues outlined as they may derail and interfere with the objectives of the technology. References S. Madakam, E. Ramaswamy and S. Tripathi, "Internet of Things (IoT): A Literature review," Journal of Computer and Communications, p. Available: https://file.scirp.org/pdf/JCC_2015052516013923.pdf, 2015. S. Madakam, "Internet of Things: Smart Things," International Journal of Future Computer and Communication, pp. Available: https://www.ijfcc.org/vol4/395-ICNT2014-2-203.pdf., 2015. E. Alsaadi and A. Tubaishat, "Internet of Things: Features, Challenges, and Vulnerabilities," International Journal of Advanced Computer Science and Information F. Mattern and C. Floerkemeier, "Fro m the Internet of Computers to the Internet of Things," Distributed Systems Group, Institute for Pervasive Computing, ETH Zurich, pp. Available: https://www.vs.inf.ethz.ch/publ/papers/Internet-of-things.pdf., 2012. V. Vatsa and G. Singh, "A Literature Review on Internet of Things (IoT)," International Journal of Computer Systems , p. Available: https://www.academia.edu/19560667/A_Literature_Review_on_Internet_of_Things_IoT_, 2015. J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, "Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions," pp. Available: https://www.cloudbus.org/papers/Internet-of-Things-Vision-Future2012.pdf., 2012. K. Rose, S. Eldridge and L. Eldridge, "The Internet of Things: An Overview," Understanding the Issues and Challenges of a More Connected World, pp. Available: https://www.internetsociety.org/sites/default/files/ISOC-IoT-Overview-20151014_0.pdf., 2015. P. FREMANTLE, "A REFERENCE ARCHITECTURE FOR THE INTERNET OF THINGS," WSO2, pp. Available: https://wso2.com/wso2_resources/wso2_whitepaper_a-A. Castellani, N. Bui, P. Casari, M. Rossi, Z. Shelby and M. Zorzi, "Architecture and Protocols for the Internet of Things: A Case Study," p. Available: https://webofthings.org/wot/2010/pdfs/144.pdf., 2010. C. Reports, "Reaping the Benefits of the Internet of Things," Cognizant Reports, pp. Available: https://www.cognizant.com/InsightsWhitepapers/Reaping-the-Benefits-of-the-Internet-of-Things.pdf., 2014. I. society, "The internet of things: overview," Understanding the issues and challenges of a more connected world, pp. Available: https://www.internetsociety.org/doc/iot-overview, 2015. Ericsson, "IoT SECURITY," ericsson White paper, pp. Available: https://www.ericsson.com/assets/local/publications/white-papers/wp-iot-security-february-2017.pdf., 2017.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.