OISM Session 21 New Trend and Challenges - Is Perspective Session 9
Trend & challenges Internet of Things
-
Upload
deris-stiawan -
Category
Internet
-
view
78 -
download
0
Transcript of Trend & challenges Internet of Things
Trend & Challenges:
Internet of Things (IoT)
Dr. Deris Stiawan
Universitas Sriwijaya
2017
Introduction
Yan, Zhang, & Vasilakos, 2014 The Internet of Things (IoT) denotes the interconnection of highly heterogeneous networked entities and networks following a number of communication patterns such as: - - Human-to-human (H2H), - Human-to-thing (H2T), - Machine-to-machine (M2M), - Thing-to-thing (T2T),
The IoT such as sensors or mobile devices senses, monitors and collects all kinds of data about human social life. These data can be further aggregated, fused, processed, analyzed and mined in order to extract useful information to enable intelligent and ubiquitous services.
Gubbi, Buyya, Marusic, &2013
IoT
IoT (Razzaque, Milojevic-Jevric et al. 2016)
IoT applications (Eleonora Borgia, 2016)
Examples of Device Heterogeneity in IoT. (Razzaque, Milojevic-Jevric et al. 2016)
The nature of the Internet of Things, which are among others: - Heterogeneity (e.g., different objects, sensors, protocols and applications), - Dynamicity (e.g., arrival and departure of objects and sensors) - Evolution (e.g., support for new protocols, sensors).
Issues
Main security issues in IoT (Sicari, Rizzardi, Grieco, & Coen-Porisini, 2015)
Security architecture (Qi Jing, 2014)
Graphical representation of security challenges (Miorandi et al., 2012)
The middleware is a software layer or a set of sub-layers interposed between the technological and the application levels, it is gaining more and more importance in the last years due to its major role in simplifying the development of new services and the integration of legacy technologies into new ones
Roman, Zhou, & Lopez, 2013 Miorandi, Sicari, De Pellegrini, & Chlamtac, 2012
Describes some security issues and represent some attacker models. There are some malicious in IoT, which categorized by threats: (i) denial of service (DoS), (ii) physical damage, (iii) eavesdropping, (iv) node Capture, and (v) controlling
Zuech, Khoshgoftaar, & Wald, 2015
This research will be addressed and answered it. - Solve the challenges, - A mediator or middleware for the integrating - Study case at Air quality monitoring control.
security data across heterogeneous sources issued
Security & Privacy Issues
Rolf H. Weber, 2015
Describes the challenges issues for privacy regulations in the IoT Confirms, the new legal approaches for the protection of privacy need to be developed.
Weinberg, Milne et al. 2015
They main concern with the data, privacy, security and hacking Privacy and security are arguably the most prominent issues; they are at the heart of trust, relation-ship building, and exchange.
Sicari, Rizzardi et al. 2015
IoT security requirements: authentication, confidentiality and access control
Suitable solutions need to be designed and deployed, which are independent from the exploited platform and able to guarantee: confidentiality, access control, and privacy for users and things
Drawbacks existing
Vučinid et al., 2015
Neisse, Steri, Fovino, & Baldini, 2015
They created new architecture for end-to-end security in the IoT. It is based on the concept of object security that relates security with the application payload.
1. They concern an architecture for end-to-end security in the IoT 2. Propose a Model-based Security Toolkit, which is integrated in a
management framework for IoT devices, without discuss the main issues in communication between devices.
3. They did not testing experiments in real-time and used heterogeneous devices in IoT environment
They propose a Model-based Security Toolkit, which is integrated in a management framework for IoT devices
Drawbacks existing
Avelar et al., 2015
Heterogeneity raises a high level of complexity for networks. New characteristics must be managed and more aspects need to be considered, intensifying existing security vulnerabilities on networks or producing new ones.
1. They addressed to solve interconnection between heterogeneous without discussed the security & privacy data
2. They method is not concern in middleware to connected the mesh node
3. They did not testing experiments in real-time and used heterogeneous devices in IoT environment
Smart City