A Survey, Design and Analysis of IoT Security and QoS Challenges

A Survey, Design and Analysis of IoT Security and QoS Challenges

M Kesavan, J Prabhu
Copyright: © 2018 |Pages: 19
DOI: 10.4018/IJISMD.2018070103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

IoT is a technological exemplar with a vision of “Everything is connected” enabling everyone to publish their generated data collected from different heterogeneous and homogenous systems onto the web. The basic concept of IoT is connectivity, a set of physical objects that use network support to exchange data. These objects can be software, boards, sensors, etc. In the real end to end network deployment, IoT is a platform and cloud is one part of it. In order to turn the IoT vision into reality high reliability, security and QoS are required to support the communications between the homogenous and heterogeneous networks. The security and QoS are critical factors in the real End to End topology. In this article, the authors proposed the various challenges for IoT security, and IoT routing between the edge and cloud.
Article Preview
Top

1. Introduction

Internet plays a very important role for the devices to communicate with the help of protocols. In recent technological fields, Each IoT devices has unique identity and unique Identifier (Ip address and Url). Most of the IoT devices has an interface allows users to query the devices, monitor and control them remotely (Weber, 2010). These devices communicate to the other smart things wirelessly thus connecting them to internet and making them establish their ID and identifier status on the web. Eventually an IoT is formed, which is in turn used as an IoT application by human users. These devices can be used as tool for tracking, observing and influencing the real world. Miniatures of these devices are created and attached to other objects such as people, desk are rooted into places like home, office etc. A wireless network of these devices are formed. A good example is RFID tags.

The entity is brought from origin to a destination by routing the packets without losing the Integrity. These devices can either be an IoT or an Internet device. This approach involves routing and better security in the layers.

1.1. Background of IoT

The IoT is simply the network of interconnected things which are embedded with sensors, software, and network connectivity and embedded devices that enable them to collect and exchange data making them accessible over the Internet. IoT brings useful applications like home automation, smart health monitoring, security, automated devices monitoring and management of daily tasks. Every sector like Energy, Computing, Management, Security and transportation are going to be benefited with this new paradigm (IEEE Internet of Thing Journal Evaluating critical security issues of the IoT world: Present and Future challenges of IoT, n.d.). Development of sensors, actuators, smart phones, RFID tags makes it possible to materialize IoT which interact and co-operate each other to make the service better and make accessible at any time, from anywhere using any network. Wireless sensor technology allows objects to provide real-time environmental information and context. IoT allows objects to become more intelligent which can think and communicate among them.

As the number of devices connected to the internet is growing in rate, the concept of IoT has gained power. Survey has revealed that there will be billions of devices connected to IoT serving various purposes in day to day life (Al-Fuqaha et al., 2015). This results in development of applications in various domains, whereas the application depends on QoS requirements.

The QoS requirements classified are Best effort, Differentiated services and guaranteed services. The guaranteed services known as hard QoS should use suitable mechanism at each layer of IoT architecture. A delay in any layer could lead to unacceptable QoS, in order to provide guaranteed services it is important to know QoS has been addressed properly at each layer (Ahsan et al., 2016).

In the real deployment, IoT is connected to different backend systems with different Vendors. Due to high heterogeneity and scalability upgrading the devices for various Malware, virus scanning, and software Functionality is highly challenging. Numerous vendors and integrators likely would be involved over the lifetime of the device, requiring a collaborative mix of standards-based, proprietary and open-sourced components (Stoimenovic & Wen, 2014; Qu &Chan 2016).

As a result, security solutions for the devices are indeed with strong hardware-based security, and legacy devices should be protected behind purpose-built gateways (Khari et al., 2016).

Also, there is no single, perfect level of security. Various devices at different companies have varying risk profiles. Creating just the right security level is achievable, through evaluating the risk, use and capability of every device. IoT security focus is more on data than the device. Due to immense use and importance of the Internet of Things, it has become paramount to secure it. IoT security is so critical because private information could be stolen from the use of connected devices.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 8 Issues (2022): 7 Released, 1 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing