Trend & challenges Internet of Things

20
Trend & Challenges: Internet of Things (IoT) Dr. Deris Stiawan Universitas Sriwijaya 2017

Transcript of Trend & challenges Internet of Things

Page 1: Trend & challenges Internet of Things

Trend & Challenges:

Internet of Things (IoT)

Dr. Deris Stiawan

Universitas Sriwijaya

2017

Page 2: Trend & challenges Internet of Things
Page 3: Trend & challenges Internet of Things

Introduction

Yan, Zhang, & Vasilakos, 2014 The Internet of Things (IoT) denotes the interconnection of highly heterogeneous networked entities and networks following a number of communication patterns such as: - - Human-to-human (H2H), - Human-to-thing (H2T), - Machine-to-machine (M2M), - Thing-to-thing (T2T),

The IoT such as sensors or mobile devices senses, monitors and collects all kinds of data about human social life. These data can be further aggregated, fused, processed, analyzed and mined in order to extract useful information to enable intelligent and ubiquitous services.

Gubbi, Buyya, Marusic, &2013

Page 4: Trend & challenges Internet of Things

IoT

IoT (Razzaque, Milojevic-Jevric et al. 2016)

Page 5: Trend & challenges Internet of Things

IoT applications (Eleonora Borgia, 2016)

Page 6: Trend & challenges Internet of Things

Examples of Device Heterogeneity in IoT. (Razzaque, Milojevic-Jevric et al. 2016)

The nature of the Internet of Things, which are among others: - Heterogeneity (e.g., different objects, sensors, protocols and applications), - Dynamicity (e.g., arrival and departure of objects and sensors) - Evolution (e.g., support for new protocols, sensors).

Page 7: Trend & challenges Internet of Things
Page 8: Trend & challenges Internet of Things
Page 9: Trend & challenges Internet of Things

Issues

Main security issues in IoT (Sicari, Rizzardi, Grieco, & Coen-Porisini, 2015)

Page 10: Trend & challenges Internet of Things

Security architecture (Qi Jing, 2014)

Page 11: Trend & challenges Internet of Things

Graphical representation of security challenges (Miorandi et al., 2012)

Page 12: Trend & challenges Internet of Things

The middleware is a software layer or a set of sub-layers interposed between the technological and the application levels, it is gaining more and more importance in the last years due to its major role in simplifying the development of new services and the integration of legacy technologies into new ones

Roman, Zhou, & Lopez, 2013 Miorandi, Sicari, De Pellegrini, & Chlamtac, 2012

Describes some security issues and represent some attacker models. There are some malicious in IoT, which categorized by threats: (i) denial of service (DoS), (ii) physical damage, (iii) eavesdropping, (iv) node Capture, and (v) controlling

Page 13: Trend & challenges Internet of Things

Zuech, Khoshgoftaar, & Wald, 2015

This research will be addressed and answered it. - Solve the challenges, - A mediator or middleware for the integrating - Study case at Air quality monitoring control.

security data across heterogeneous sources issued

Page 14: Trend & challenges Internet of Things

Security & Privacy Issues

Rolf H. Weber, 2015

Describes the challenges issues for privacy regulations in the IoT Confirms, the new legal approaches for the protection of privacy need to be developed.

Weinberg, Milne et al. 2015

They main concern with the data, privacy, security and hacking Privacy and security are arguably the most prominent issues; they are at the heart of trust, relation-ship building, and exchange.

Sicari, Rizzardi et al. 2015

IoT security requirements: authentication, confidentiality and access control

Suitable solutions need to be designed and deployed, which are independent from the exploited platform and able to guarantee: confidentiality, access control, and privacy for users and things

Page 15: Trend & challenges Internet of Things

Drawbacks existing

Vučinid et al., 2015

Neisse, Steri, Fovino, & Baldini, 2015

They created new architecture for end-to-end security in the IoT. It is based on the concept of object security that relates security with the application payload.

1. They concern an architecture for end-to-end security in the IoT 2. Propose a Model-based Security Toolkit, which is integrated in a

management framework for IoT devices, without discuss the main issues in communication between devices.

3. They did not testing experiments in real-time and used heterogeneous devices in IoT environment

They propose a Model-based Security Toolkit, which is integrated in a management framework for IoT devices

Page 16: Trend & challenges Internet of Things

Drawbacks existing

Avelar et al., 2015

Heterogeneity raises a high level of complexity for networks. New characteristics must be managed and more aspects need to be considered, intensifying existing security vulnerabilities on networks or producing new ones.

1. They addressed to solve interconnection between heterogeneous without discussed the security & privacy data

2. They method is not concern in middleware to connected the mesh node

3. They did not testing experiments in real-time and used heterogeneous devices in IoT environment

Page 17: Trend & challenges Internet of Things

Smart City

Page 18: Trend & challenges Internet of Things
Page 19: Trend & challenges Internet of Things
Page 20: Trend & challenges Internet of Things