Internet of Things Analysis of Security Risk

INTERNET OF THINGS 1

Abstract

Internetof Things (IoT) is referred to as “the network of inter-connectedsensor equipped electronic devices that communicate with each other,collects data, and can be checked or supervised remotely over theinternet” (Ahrens, 2014). The primary objective of Internet ofThings innovation is to link the physical world and environment tothe Internet of wireless connection, which would allow the making ofobjects, machines, and work environment interactives. The connectionwill be possible through sensors objects will be in a position ofexchanging data with other devices without the need of human effort.Internet of Things includes different technology infrastructure,devices, and services like cloud computing, data analytics, andmobile communications. In this case, billions of smart objects willbe immersed in the environment, sensing, interacting, and cooperatingwith each other to enable efficient services that will bring tangiblebenefits to the economy, the environment, and the society globally.However, the majority of research have been conducted does notanalyze in detail, the security concern of this technology.Therefore, the principle objective of this study is to identify andexplain the weakness of this new technology (Internet of Things) andaddresses the guidelines and recommendations that would possiblyreduce them. This research is, therefore, based on the currentresearchers of the network security technology and it focuses onproviding new approaches to particular applications of Internet ofThings that will assist in reducing the problems of security that areassociated with Internet of Things.

According to Qiang et al. (2013), Internet of Things is the mutualdesegregation of the product of Sensor wireless networks, PervasiveComputing, Ubiquitous Network, and The Internet. Scholars consider itan emerging theme of technical, social, and economic importance.Consumer products, goods, cars and vehicles, industrial and utilitycomponents, everyday objects, and sensors are compounded withinternet connectivity and powerful data analytic potentialities thatprognosticate to transubstantiate the manner in which we work, play,and live. Protrusions on the effect of Internet of Things on Internetand economy are quite telling, with other anticipating up to billionsof connected Internet of Things objects and the global economicimpact that will exceed up to 11 trillion by 2025 (Internet Society,2015).

This tech promises a high potential for flexibility and promises ofgreater future but holds a potential of security problems too (Farooqet al., 2015). As the technology provides a broad scope ofsignificance, its prevalence of such big network of interconnecteddevices will have to pose new security risks, privacy threats, andwill end up putting all these objects at a higher risk of hackers asthey clutch at the security gaps to make the technology work fortheir benefits. Up to modern times, almost 3 billion of individualsaround the globe use Internet for browsing, communicating throughemails, accessing multimedia content and services, games, usingsocial networking applications, and many other projects. Indeed, manypeople will gain access to such global information when using thistechnology (Internet of Things) and communication infrastructure.Another big leap forward is coming, which is related to theconsumptions of Internet as global chopine for letting machines andother brilliant objects communicate, compute, dialogue, andcoordinate with one another.

With this leaps in advance in technology, it is evidence that theinternet will exist as a seamless fabric of classic networks andnetworked objects. This interaction of new objects will be around uspaving ways on how we operate the new application, new ways ofinteracting, entertainment, and living as well. In such position, thecontroversial concept of Internet of Things as an infrastructurenetwork reaching out for end users terminals’ will somehow fade,which will leave the general notion to a smart interconnected objectthat will form a pervasive computing platform. This innovation andInternet infrastructure will never disappear, as it will retain itssignificant global role as the backbone of the worldwide informationsharing and diffusion, interconnecting physical objects withcommunication capabilities across a wide range or scope oftechnologies and services (Miorandi et al., 2012).

According to Miorandi et al. (2012), this innovation resulting fromInternet of Things will allow the chopine of electronics intoeveryday physical objects, constricting them to be smart and enablingthem to integrate within global resulting cyber-physicalinfrastructure and communication technologies. This will pave the wayfor new services and applications that are in the position tointerconnect and indicate visual realms.

In this research, I propose at providing a holistic perspective onthe Internet of Things concept and its technological development,which critically analyzes its security risk it poses to its end usersas technology. It includes a revision on its application fields,enabling technologies, and challenges that range from his safetyrisk. In fact, most related research on Internet of Things seems tobe highly fragmented, though it networking and communicationsscientific communities is still limited, despite the possible highimpact of their contributions on the development of the field. Totest the security risk posed by Internet of Things, I attribute toverify the hypothesis, which hackers use to attack the objectsconnected to each other through user interaction, laid-back approach,and interceptions of communications.

Literaturereview

Descriptionof the Technology

According to Ahrens (2014), Internet of Things is a network ofinterconnected sensor-equipped electronic devices that tend tocommunicate, collect data, and can be monitored over the web. In hisarticle, he notes that most of the established industrialapplications for Internet of Things that mitigate things.Consequently, Internet of Things is currently an emerging as one ofthe greater technological trend shaping the development oftechnologies in the Information Communication Technologies (ICT) atlarge. The shift from the use of Internet in current world forinterconnecting its end users to Internet use for interconnectingphysical objects that associate with one another.

Indeed, this technology of Internet of Things is looked like a highlydynamic and radically distributed networked system, which is composedof enormous numbers of sharp objects producing and consuminginformation. The capacity if the interface with the physical realm isachieved through the presence of devices able to sense physicalphenomena and translate them into a stream of data. Internet ofThings also provides large sets of opportunities to users,manufacturers, and companies. Hence, Internet of Things will find abroad scope of applicability in many productive sectors, whichincludes environmental monitoring, healthcare, inventory, and productmanagement, workplace, and home support, security, and surveillance.From my point of view, this technology is characterized bysubstantial heterogeneity regarding device-taking part in the system.

Potentialapplications

One of the most original use of Internet of Things, for instance, isthe embedding of sensors in roads and bridges that helps to preventinfrastructure failure. Similarly, remote sensing applications invehicles that transport perishable goods avoid spoilage and possiblesafety issues. On the other hand, industrial temperature controlusually prevents overheating that can result in equipment failure.The applications of this sensor technology report real-time data thatare related to car brakes, hatches, and loads, data that is importantfor companies that transport hazardous materials.

The technology is also applied in areas such as the human, forexample is used to monitor and maintain people`s health and wellness,disease management, and higher productivity. At home, the technologyis used as home controllers and security systems. In a retailenvironment where consumers engage in commerce, it is employed inbanks, restaurants, and inventory optimization. Other areas ofapplications include offices, factories, worksites, cars andvehicles, and industries.

Possibleimprovement in the scope of IT

The projection of Internet of Things and trends towards theenhancement of the extent of Technology is becoming reality. This isreal in the sense that that technology forces a shift in thinkingabout the implications issues in the world where most frequentinteraction with the internet originates from passive engagement withconnected objects instead of active participation. In addition,Internet of Things holds a significance promise for delivering socialand economic rewards to the emerging and developing economies in theInformation Technology sector (IT). Internet of things shifts onimproving areas such as agriculture, healthcare, industrialization,and environmental management, among others (Heires, 2014). In theend, Internet of Things holds a promise as a technological tool forachieving development in the sector if IT.

Finally, Internet of thins also pledges to offer a contemporary,fully connected brilliant world through the relationships betweenobjects, their environment, and making people or end users to becomemore rigidly compressed. According to Internet Society (2015), thelarge-scale implementation of this technology promises to change manyaspects of the ways we live. For instance, consumers of new Internetof Things like Internet-enabled appliances, home automation devices,and energy management devices projects us towards the world of asmart home.

Analysisof its Security Risk

Some of the entire Internet of Things security threats revolve aroundsmart cars, smart homes, aircraft, and communication. Lee and Kimassert that everything can be hacked, and hacking is demonstrated tobe against the application of Internet of Things. For instance, smartcars are cut by exploring a vulnerability in the remote network suchas Bluetooth and telematics in vehicles and phone applications (Lee &ampKim, 2015). Similarly, smart homes are at risk through monitoring andremote control of the main household materials to bypass the securityfeatures of the next bright, fresh home and authorize access viasatellite communications systems by hacking navigations and safetysystems (Brewster, 2014).

In industries and factories that used Internet of things is connectedin ways that they can be hacked. As presents by Storm (2014), hackerson the technology focus on the energy sector for them to stealintellectual property on the new tech. This disruptive attack leadsto significant financial losses. Separately, factors that affect orendanger information on The Internet can also cause harm on theInternet of things. For instance, cloud computing usually collectsthe global hacker’s attacks node address, and this maliciousintrusion of elements results from violation of user’s privacy andthe end user losses massively.

In the Internet of Things, Ad hoc network is a peer-to-peernon-center network that can remove heterogeneous between theperception layer nodes by Ad hoc network protocol. This posessecurity risk such as illegal node security issues, and data securityissues, which can leak. In line to the Internet of Things, RadioFrequency Identification (RFID) tech is only applicable as RFID tagsfor automated substitute of information without any physicalinvolvement. However, these RFID tags are prone to various attacksfrom outside because of the inferior security status of the RFID tech(Borgohain, Kumar, &amp Sanyal, 2015). Most of its common attacksinclude an assault on the authenticity, unauthorized tag cloning, EPCrendering misinformation against the unique numerical combinations ofidentity, and attack on the availability.

Conclusion

In this research paper, I have analyzed the potential security riskthat revolves around Internet of Things that has proven and willcontinue to turn out to be very detrimental in the development andthe implementations of the Internet of Things as a technology indeferent fields. Indeed, while the potential ramifications of thistechnology are vital, some potential risk and challenges stand in theway of this technology vision, mostly in areas such as security,privacy, and interoperability, legal, regulatory, and an inclusion ofemerging economies. Because it involves a set of complex and evolvingtechnological advances and the fact that this technology is trendingnow, it calls for the need to address its challenges and securityrisk with an aim of maximizing its benefits while reducing its risks.

References

Ahrens, D. (2014, July 10). Making Sense of The Internet of ThingsSTARS. [Web log post] Retrieved fromhttp://www.csstars.com/making-sense-of-the-internet-of-things/#.VO4GirPF8h4

Brewster, T. (2014, Mar 20) “There Are Real and Present Dangersaround the Internet of Things.” The Guardian. [Web log post]Retrieved from http://www.theguardian.com/technology/2014/mar/20/internet-of-things-security-dangers

Borgohain, T., Kumar, U. &amp Sanyal, S. (2015). Survey of Securityand Private Issues of Internet of Things. Retrieved from.http://arxiv.org/ftp/arxiv/papers/1501/1501.02211.pdf

Farooq et al. (2015). A Critical analysis of the SecurityConcerns of the Internet of Things (IoT). International Journal ofComputer Applications, Vol. 111 (7) 1-6.

Heires, K. (2014, Feb 1) Preparing for the Internet of Things. RiskManagement. Retrieved from.http://www.rmmagazine.com/2014/02/01/preparing-for-the-internet-of-things-smart-devices-present-new-security-challenges/

Internet Society (2015). The Internet of Things: An Overview.Retrieved from.https://www.internetsociety.org/sites/default/files/ISOC-IoT-Overview-20151014_0.pdf

Lee,Y., &amp Kim, D. (2015). Threats Analysis, Requirements, andConsiderations for Secure Internet of Things.International Journal of Smart Home Vol. 9, No. 12, (2015),pp. 191-198 http://dx.doi.org/10.14257/ijsh.2015.9.12.20

Miorandi at al. (2012). Internet of Things: Vision,Applications, and Research Challenges. Ad Hoc Networks 10 (2012)1497–1516

Qianget al. (2013).Research on Security Issues of the Internet of Things. InternationalJournal of Future Generation Communication and Networking Vol.6, No.6(2013), pp.1-10.http://dx.doi.org/10.14257/ijfgcn.2013.6.6.01

Storm, D. (2014, Jan 1), Hackers exploit SCADA holes to take fullcontrol of critical infrastructure[ Web log post ] Retrieved from.http://www.computerworld.com/article/2475789/cybercrimehacking/hackers-exploit-scada-holes-to-take-full-control-of-criticalinfrastructure.html