Literature review internet of things
The basic idea was the application of electronic codes to products. These codes having the information about the products could be used to identify and share the same information about the items. Initial research focused on standardization architectures such as Radio Frequency Identification (RFID) as well as the modern sensor networks as presented by (Atzori et al, 2010). However, the IoT architecture and systems depended heavily on the view of the ubiquitous computing put forward by Weiser. In 1988, Weiser put forward this concept with the aim of enabling communication between gadgets (such as tabs and pods) despite their presence in terms of physical location and also regardless of the timing. On the other hand, Fu et al (2017) explored likely threats in scenarios of a home and a hospital.
Roman et al (Roman, R. , Zhou, J. , & Lopez, J. , 2013) together with Sicari et al in their literature provided various challenges in IoT architecture while proposing solutions including solutions for access control and authentication issues, confidentiality as well as privacy (Sicari et al, 2015). Yang et al also presented a classification method proposed by Ronen et al (Ronen, E. , & Shamir, A. , 2016)based on how characteristics of an attacker differ from those of the genuine IoT devices. The various categories are extracted through misusing, ignoring, reducing an extension of the system. In the paper, two attacks were presented both exploiting the smart lights being utilized in a building, first by coming up with a diversion channel to collect confidential information from an organization implementing the idea of smart lights and secondly is the attack which could lead to seizures through the creation of strobes within the frequencies of the lights.
The paper, however, proposes the use of transfer learning for authentication purposes of devices with different feature spaces. The simulation results in the deployment of this authentication approach showed that the performance had increased when compared to traditional approaches. Zhang et al (Zhang, C. , & Green, R. , 2015) put forward the use of a special algorithm to avert the Denial of service attacks by putting into consideration a network made of four nodes; the attacker node, working node, genuine user node, and the monitoring node. The approaches to authentication, security issues, and solutions proposed for the different layers of the architecture are also presented and will be analyzed deeper in the following sections. Generally, the IoT devices security is dependent on the underlying protocols, technologies, and mechanisms as stipulated and implemented by respective manufacturers.
This renders the devices vulnerable to various attacks and therefore points to the need of standardization when it comes to the security of the IoT. This is in alignment with the aim of this study which is proposing a standardized IOTMS which will be given in the sections below. References Al Salami, S. (2015, July). Internet of Things: Security vulnerabilities and challenges. In Computers and Communication (ISCC), 2015 IEEE Symposium on (pp. IEEE. dos Santos, G. A DTLS-based security architecture for the Internet of Things. In Computers and Communication (ISCC), 2015 IEEE Symposium on (pp. IEEE. Evans, D. The internet of things: How the next evolution of the internet is changing everything. Computing Community Consortium. Jebri, S. , Abid, M. , & Bouallegue, A. (2015, December). IEEE Internet of Things Journal, 4(5), 1125-1142.
From $10 to earn access
Only on Studyloop