Complete Analysis Of IoT Applications And Devices
Introduction to IoT
Discuss about the Interoperability and Open-Source Solutions.
Internet of things has improved the working style of business. This report covers the complete analyses of IoT things. It covers the applications, devices, security risk and their mitigation strategies. Internet of things has allowed users to access the devices from any location [1]. There are issues associated related to privacy and confidentiality of data as users enter the system through side doors. This report covers the security issues and the solution that could be used to remotely the flaws. Internet of thing is a collection of all the computing devices that provide unique identity to every device. It also allows data to be transferred from one place to other without the need of human efforts. Internet of thins is emerged from advancement of wireless technology and also allow all the machine generated results to be analysed.
As per Borgia, Internet of things is another idea which has changed the working environment. It can be viewed as a system of physical devices which are made to work under same software. It makes all the devices recognized over the network. Internet of things makes conceivable that all the devices are controlled remotely by offering more options [2]. Internet of things is used to enhance the financial advantage of an organisation by decreasing the human endeavours. Internet of thing makes utilization of innovation which helps them to keep track of all the stock and furthermore gives control measures. They also help in providing economic benefit to the organisation by removing the manual work. They keep track of all the devices connected to internet. The work is made automatically which eliminates the manual work and also helps devices to communicate to each other. They allow all the devices that are connected over internet to communicate with easy ther from anywhere.
In the view of Atzori, Luigi, Antonio Iera, and Giacomo IoT allow single devices to access the information from anywhere. The data can be captured through sensors and then information is stored over the big data network. They also make use of advanced technology like artificial intelligence so that could add huge benefits to organisation [3]. Internet of things can be seen as a network that has all the devices linked up together. The network consists of physical devices as well as devices that are connected to internet.
In the view of Hossain, internet of thing is an advanced technology that has covered various sectors and is basically used to store information by providing security. The three factors that are related to IoT are communication, control and cost saving tactics. It helps the business o keep track of the information and also monitor them at regular interval [4]. It also adds flexibility in work by providing quick response.
Advantages of using IoT technology
IOT has made conceivable that every gadget is associated with each other over a globe. It has offered different qualities when contrasted with traditional ways. They provide an interface for all the gadgets and also add up legitimate security control. IoT is where all the devise with different hardware’s and software’s are associated with each other [5]. The conventional system used to associate the gadgets that have same infrastructure. The traditional systems did not allow gadgets to change their state progressively. Yet, IoT enables different gadgets to be overseen together and furthermore helps in treatment of data. As far as security Iot is superior to any other traditional strategies as it undertakes legitimate encryption methods and additionally provides appropriate access control [6]. It guarantees that no unauthorised client gets the privilege to get to the important data. It is additionally a cost effective approach and also offers easy adaptability.
The old traditional strategies have been replaced by the innovation of internet of things. Internet of things is used everywhere from home appliance to business organisation. It allow all the information to be stored ta single location with high security and also helps in keeping tracking of all the devices from anywhere [7].
Internet of thing have many devices that include smart speakers, home assistant tool, smart clock, wearable’s, smart lock, auto completer, home pads, security devices, advanced hardware’s and software’s or sensors. Apart from that there are various electronic devices that are used in daily life fall under internet of things [8].
There are various applications that internet of things support. The three main advantages have been discussed.
- Improved health and safety- internet of things helps in monitoring, detection and surveillance of health and safety measures. Sensors are used to collect environmental conditions so that flaws can be detected and measures could be taken accordingly [9]. There are various tools that are available to monitor the situations so that instant precautions could be taken.
- Media- media also make use of internet of things as it helps in marketing of products. Internet of things helps in capturing target audience and enhances customers to interact more. It also helps in storing data and allow individual to access the information form anywhere.
- Implementing smart living- it has provided a way to live a flexible life by making all the trips automatically. The applications help in completing the work automatically as all the activities by offering alerts at time of emergency condition [10].
There are various issues associated with internet of things especially confidentiality, integrity and loss of information [11]. It is important to secure all the data so that no bug hit the network. Thus discussing three main security issues related to Iot are:
- Side channel attack- There is chances that attackers enter the system through side doors and access the data. In this way unauthorised user gets chances to access the data and read out all the sensitive data [12]. Thus the data should be encrypted so that even if invalid user aces the data they cannot understand the actual information.
- End to end protection- Internet of things provide protection but still there is no proper framework that is designed to deal with lack of privacy in the system. Thus policies need to be designed so that system could be recovered easily at time of failure.
- Planning- It capture the data from different location thus it there are chances that data could be leaked. This enhances a risk of data outflow to unauthorised user which can be future misused [13]. The planning over Iot network is not secure as the sensitive information could be leaked.
There are different security issues that should be addressed by using internet of thing framework. Few mitigations measures are embraced to provide a safe system and avoid errors to mitigate in the system.
- Authentication of data- All the association and organizations these days store delicate data over IoT system [14]. In this manner data stored should be encrypted and appropriate access control should be given with the goal that only substantial client utilizes the information.
- Recovery strategies -The framework ought to be planned in a way that goals are achieved and all the bugs are overcome. In some cases if bugs hit the framework they ought to recover from it effectively without making any misfortune an association.
- Assigning access rights-There is a probability that data is spilled which may cause loss of privacy. Along with this appropriate control should be chosen about who is permitted to get the data and who can read and access the data [14]. There are chances that rights are assigned regarding to who can read, compose and alter the information at that point there are no chances that information would get leaked. Only substantial clients should be offered authorization to peruse and alter the information else it may release the sensitive information.
Conclusion
From this report it can be concluded that internet of thing has helped in making the working easy and also helps the devices to be accessed from anywhere. It has made the work automatic by removing the manual efforts. It also improves the financial conditions of an organisation by improving the profit revenue. Internet of things makes use of advanced technology that allows devices to communicate to each other remotely. All the devices that have access to internet connection can communicate to each other through IOT network. In this report the old traditional method is compared to the use of internet of thing system. There is various advantages that are offered by Iot. The iot devices have been used at many places. Internet of things have used at various places from use at making smart city, wearable’s or at media. It has gained importance in the current market place. This report also covers various security issues that are associated with using iot things. Thus the risk associated and their respective mitigation strategies have been analysed.
F Bonomi, M Rodolfo, N Preethi, and Z Jiang. “Fog computing: A platform for internet of things and analytics.” In Big data and internet of things: A roadmap for smart environments, pp. 169-186. Springer, Cham, 2014.
Borgia, Eleonora. “The Internet of Things vision: Key features, applications and open issues.” Computer Communications 54, 1-31, 2014.
Atzori, Luigi, Antonio Iera, and Giacomo Morabito. “From” smart objects” to” social objects”: The next evolutionary step of the internet of things.” IEEE Communications Magazine 52, no. 1 (2014): 97-105.
Hossain, Md Mahmud, Maziar Fotouhi, and Ragib Hasan. “Towards an analysis of security issues, challenges, and open problems in the internet of things.” In Services (SERVICES), 2015 IEEE World Congress on, pp. 21-28. IEEE, 2015.
M, Bawa, C, Dagma, S, Ivan and S, Daniela. “Importance of internet of things and big data in building smart city and what would be its challenges.” In Smart City 360°, pp. 605-616. Springer, Cham, 2016.
Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. “Security of the Internet of Things: perspectives and challenges.” Wireless Networks 20, no. 8 (2014): 2481-2501.
Da Xu, Li, Wu He, and Shancang Li. “Internet of things in industries: A survey.” IEEE Transactions on industrial informatics 10, no. 4 (2014): 2233-2243.
Fleisch, Elgar, Markus Weinberger, and Felix Wortmann. “Business models and the internet of things.” In Interoperability and Open-Source Solutions for the Internet of Things, pp. 6-10. Springer, Cham, 2015.
Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. “Security, privacy and trust in Internet of Things: The road ahead.” Computer networks 76 (2015): 146-164.
In Lee and Kyoochun Lee. “The Internet of Things (IoT): Applications, investments, and challenges for enterprises.” Business Horizons 58, no. 4 , pp- 431-440, 2014.
M, Georgescu and P, Daniela. “The Importance of Internet of Things Security for Smart Cities.” In Smart Cities Technologies. InTech, 2016.
Kamath, H, Srikanth, P, Suyashi, and T, Kar. “Security Issues in Internet of Things.” International Journal of Emerging Research in Management &Technology 6, no. 5, pp-260-264, 2017.
Sadeghi, R, Ahmad, W Christian, and W Michael. “Security and privacy challenges in industrial internet of things.” In Proceedings of the 52nd annual design automation conference, p. 54. ACM, 2015.
Whitmore, Andrew, A, Anurag and Li Da Xu. “The Internet of Things—A survey of topics and trends.” Information Systems Frontiers 17, no. 2 ,pp- 261-274, 2015.