Free Essay

Securing the Iot

In:

Submitted By SuryaDheeraj
Words 4572
Pages 19
INTERNET OF THINGS 2015

1. INTRODUCTION
The notion of Internet of Things (IoT) has been recognized by industrial leaders and media as the next wave of innovation, and pervading into our daily life. Sensors around us are increasingly becoming more pervasive and attempt to fulfill end users’ needs, thus providing ease of usability in our everyday activities. Devices deployed in households, industrial automation, and smart city infrastructure are now interconnected with the
Internet. This interconnection provides a whole range of data (environmental context, device status, energy usage, etc.) that can be collected, aggregated, and then shared in an efficient, secure, and privacy-aware manner. As these devices are connected to the Internet, they can be reached, and managed at any time and at any place. The current landscape of
IoT is filled with a very diverse range of wireless communication technologies, such as
IEEE 802.15.4, Wi-Fi, Bluetooth Low Energy (BTLE), and various other cellular communication technologies.
Naturally, devices using different physical and link layers are not interoperable with each other. Through an Internet Protocol (IP) router, these devices are, however, able to communicate with the Internet. When the differences in the protocol stack extend beyond the physical and link layer, protocol translation needs to be performed by a gateway device. This harms the deployment of IoT devices because the deployment becomes more complex and expensive with multiple middle boxes along the end-to-end communication path. In order to ensure seamless connectivity between different devices deployed in the market, a convergence toward all IP-based communication stack is necessary. Years ago, the Internet Engineering Task Force (IETF) has standardized
IPv6 over Low-Power Wireless Personal Area Networks (LoWPAN), Routing Over Lowpower and Lossy networks (ROLL), and Constrained Application Protocol (CoAP) to equip constrained devices with low memory footprint and computational capabilities to run
IPv6 over low-power wireless networks. The ZigBee IP standard, which primarily targets the smart energy domain, builds on top of the 6LoWPAN stack. IEEE 802.15.4-based devices used in other industry domains are expected to adopt the 6LoWPAN concept as well, since it provides the basis for running IPv6 over low-power radios via an adaptation layer, profiling of the IPv6 neighbor discovery mechanism, and compression schemes.
Similar adaptations are provided to BTLE and Digital Enhanced Cordless

1

INTERNET OF THINGS 2015
Telecommunications (DECT) Ultra Low Energy, the two other short-range radio technologies. Meanwhile, many IoT devices are using Wi-Fi and are already running the full IP protocol stack. IP protocol can be regarded as the glue to interconnect these heterogeneous wireless networks together. The pervasive device connectivity to the
Internet also poses hidden security risks, namely, eavesdropping on the wireless communication channel, unauthorized access to devices, tampering with devices, and privacy risks. The inherent nature of constrained devices means that the state-of-the-art cryptographic algorithms and protocols are not easy to deploy on such devices and even more difficult to keep the software up-to-date. The ability to connect, manage, and control a device from anywhere and at any time requires appropriate authentication and authorization measures. Security experts have emphasized the importance of security in
IoT deployments and have warned about the insecurity of current deployments.
Security for IoT encompasses a wide range of tasks, including embedding keying material during the manufacturing process of the device, provisioning of new keying material during operation, establishing access control policies for access to networks and services, processes for secure software development, use of hardware security modules to protect keys against tampering, software update management, and development and selection of efficient cryptographic primitives. Custom security solutions offered by the IoT research community offer mostly point solutions, but this rarely helps to understand the big picture for securing IoT devices. This papers provides the state-ofthe-art snapshot of the standardization efforts for securing IoT in the IETF.
We believe that these standardization activities play a crucial role in securing the IoT ecosystem, both in terms of improving interoperability of IoT devices in general and to pave the way toward wider industry adoption of security solutions.

2

INTERNET OF THINGS 2015
2. OPPORTUNITY, STATUS, AND CAPABILITY OF IOT

2.1. Opportunity of IoT
The IoT will create a huge network of billions or trillions of
“Things” communicating each other. The IoT is not subversive revolution over the existing technologies, it is comprehensive utilizations of existing technologies, and it is the creation of the new communication modes. The IoT blends the virtual world and the physical world by bringing different concepts and technical components together: pervasive networks, miniaturization of devices, mobile communication, and new ecosystem. In IoT, applications, services, middleware components, networks, and end nodes will be structurally organized and used in entire new ways. IoT offers a means to look into complex processes and relationships.
The IoT implies a symbiotic interaction between the real/physical and the digital/virtual worlds: physical entities have digital counterparts and virtual representation; things become context aware and they can sense, communicate, interact, and exchange data, information, and knowledge. New opportunities will meet business requirements, and new services will be created based on real-time physical world data.
Everything from the physical or virtual world will possibly be connected by the IoT.
Connectivity between the things shall be available to all with low cost and may not be owned by private entities. For IoT, intelligent learning, fast deployment, best information understanding and interpreting, against fraud and malicious attack, and privacy protection are essential requirements.

2.2 Status of IoT
The IoT can be regarded as an extension of existing interaction between people and applications through a new dimension of “Things” for communication and integration. The IoT development process is a complex large-scale technological innovation process. The IoT is evolving from the vertical application to polymeric application. At the early stage of IoT deployment, driving of domain specific applications is the main development strategy.
A domain-specific application might be a manufacturing control system with its own industry characteristics. The application can provide various enterprise management services being integrated with the industry production and business processes.
Polymeric applications are cross-industry applications based on public information service platforms. These applications support both home users and industry users. The application

3

INTERNET OF THINGS 2015 are provided and promoted by communication operators and solution providers with large scale. For example, a vehicle integrated with sensor networks, a global positioning system (GPS), and radio communication technology can provide comprehensive detection, navigation, entertainment, and other information services. By maintaining such information through the public service platform, consumers, original equipment manufacturers (OEMs), maintenance providers, and vehicle management agencies can share these information and share services to improve the vehicle, the vehicle component design, and the fabrication process through the vehicle lifecycle management.

2.3. Capability of the IoT Application
In summary, the IoT applications shall have the following capabilities.
2.3.1) Location Sensing and Sharing of Location Info:
The IoT system can collect the location information of IoT terminals and end nodes, and then provide services based on the collected location information.
The location information includes geographical position information got from the GPS,
Cell-ID, RFID, etc., and absolute or relative position information between things. More typical IoT applications include at least the following.
a) Mobile asset tracking:
This application can track and monitor the status of commodity using the position sensing device and communication function installed on the commodity. b) Fleet management:
The manager of the fleet can schedule the vehicles and drivers based on the business requirements and the real-time position information collected by the vehicles. c) Traffic information system:
This application can get traffic information such as road traffic conditions and congested locations by tracking the location information of a large number of vehicles. The system thus assists the driver to choose the most efficient route. 2.3.2) Environment Sensing:
4

INTERNET OF THINGS 2015
The IoT system can collect and process all kinds of physical or chemical environmental parameters via the locally or widely deployed terminals. Typical environmental information includes temperature, humidity, noise, visibility, light intensity, spectrum, radiation, pollution (CO, CO2, etc.), images, and body indicators. Typical applications include at least the following.

a) Environment detection:
IoT systems offer environmental and ecological, such as forest and glacier, monitoring; disaster, such as volcanoes and seismic, monitoring; and factory monitoring. All are with automatic alarm systems using environmental parameters collected by large number of sensors.
b) Remote medical monitoring:
IoT can analyze the recurring indicator data collected from the device placed on patients’ body and provide the users with health trends and health advice.

2.3.3) Remote Controlling:
IoT systems can control IoT terminals and execute functions based on application commands combined with information collected from things and service requirements. a) Appliance control:
People can remotely control operating status of appliances through
IoT system.
b) Disaster recovery:
Users can remotely start disasters treatment facilities to minimize losses caused by disasters according to the monitoring mentioned before.

2.3.4) Ad Hoc Networking:
IoT system shall have rapidly self-organized networking capability and can interoperate with the network/service layer to provide related services. In the vehicle network, in order to transfer the data, the network between vehicles and/or road infrastructures can be rapidly self-organized.

5

INTERNET OF THINGS 2015

2.3.5) Secure Communication:
IoT system can further establish secure data transmission channel between the application or service platform and IoT terminals based on service requirements. In practice, an IoT application consists of different types of capabilities and even applications based on the service requirement. Table1 shows examples of different IoT applications.

2.4. SUMMARY OF IOT APPLICATIONS

TABLE-1

6

INTERNET OF THINGS 2015

3. INTEROPERABLE SECURITY FOR IOT
The success of the World Wide Web benefited from a solid foundation built on a standardized protocol stack consisting of the IP, the Transmission Control Protocol
(TCP), the Transport Layer Security (TLS) protocol, the Hypertext Transfer Protocol
(HTTP), and the Hypertext Markup Language (HTML). When Personal Digital Assistants
(PDAs) were introduced, they were not able to run the full Web stack. Therefore, the
Wireless Application Protocol (WAP) was developed to allow interworking with the Web infrastructure. The deployment of WAP was, however, a disappointment overall, as it never got anywhere close to the success of the plain HTTP/HTML. Proxying between the different protocols lead to slower innovation since new features deployed on the Web were only available to mobile devices once the gateways were updated. Once mobile devices were capable of supporting the full Web stack, the limited deployment of WAP quickly vanished. In terms of security, the Wireless Transport Layer Security (WTLS) protocol was standardized to provide communication security for WAP as a TLS counterpart. However, it did not mandate the use of cryptographic and key generation algorithms, thus leading to many insecure algorithms such as 12-round RC5 being implemented and deployed. Although a standardized security protocol was used, the fact that WTLS did not ensure end-to-end security is a problem since the WAP gateway was essentially a man-in-the-middle that had access to the data being transmitted over the
Internet. On one hand, it is important that standardization ensures interoperability. On the other hand, it is crucial that the correct (adaptation of) security protocol and security algorithms are also standardized to counter the Internet threat model and its changes over time. There are many standards for Internet security protocols developed in different standardization bodies, such as IEEE (link layer), IETF (network, transport, and application layer), and W3C (Web application layer). These different security protocols offer different protection at different layers and complement each other in fulfilling different security goals. The use of these standardized security protocols is at the discretion of the system architects, who are required to analyze the threats and to decide on how to mitigate them. The security consideration sections found in IETF specifications provide helpful guidance for system architects to make a good judgment. For example, IPsec is not mandatory to be used at the network layer, and TLS is only enabled for applications requiring channel security with authentication, integrity, and confidentiality. The OAuth
7

INTERNET OF THINGS 2015
2.0 protocol is only relevant for applications that require delegated authorization to protected resources. This flexibility has been desired because traditionally, Internet devices accomplish interoperability by implementing several of these protocols which can typically be updated fairly easily. Therefore, interoperability is often by devices implementing a wide range of security protocols and cryptographic algorithms.
However, it is infeasible to require resource-constrained IoT devices to implement all security protocols in all layers. Consequently, it is important to ascertain the threats and risks posed in IoT, and subsequently determine the security protection require that should be deployed across the layers. By mandating such a security protocol implementation for IoT devices, some level of security interoperability can be guaranteed.
While one-size fits all may not serve all IoT use cases, security profiles (i.e., a subset of security protocol functionalities and options) can be specified to address the requirements of different IoT applications.
Ideally, a single security protocol suite that provides a full security service, namely, authentication, authorization, integrity, and confidentiality protection, should be standardized. In fact, various such security protocols have already been standardized, and adapting them to cater for the required security functionalities for use in IoT would be beneficial. In terms of security, most of the standardized protocols have been through a thorough security analysis. Furthermore, such a standardized protocol when deployed on
IoT devices, they can interoperate more easily with existing Internet infrastructure and services. Conversely, designing a completely new security protocol for IoT seems like reinventing the wheel, and it might be difficult to get market traction whereby a critical mass of devices needs to be achieved in order to have an interoperable IoT.

8

INTERNET OF THINGS 2015
4. CHALLENGE AND PROSPECT OF IOT
IoT trends to be unified, seamless, and pervasive. Large-scale service deployment needs to be framed within a set of standards. However, IoT involves many manufacturers, spans multiple industries, and it differs widely in application scenarios and user requirements, which consequently gives impacts on large-scale commercial deployment of related services. The development of IoT is a step-by-step process. There are still many problems to be solved, such as low power nodes and computing, low cost and low latency communication, identification and positioning technologies, self-organized distributed systems technology, and distributed intelligence.

4.1 Challenge of IoT
The IoT provides many new opportunities to the industry and end user in many application fields. Currently, however, the IoT itself lacks theory, technology architecture, and standards that integrate the virtual world and the real physical world in a unified framework. Following key challenges are thus listed.
1) Architecture Challenge:
IoT encompasses an extreme wide range of technologies. IoT involves an increasing number of smart interconnected devices and sensors (e.g., cameras, biometric, physical, and chemical sensors) that are often nonintrusive, transparent, and invisible. As the communications among these devices are expected to happen anytime, anywhere for any related services, generally, these communications are in a wireless, autonomic, and ad hoc manner. In addition, the services become much more mobile, decentralized, and complex. In IoT, data integrations over different environments are thus tough and will be supported by modular interoperable components. Infrastructure solutions will require systems to combine volumes of data from various sources and determine relevant features, to interpret data and show their relationships, to compare data to historical useful information, and support decisionmaking. Single reference architecture thus cannot be a blueprint for all applications.
Heterogeneous reference architectures have to coexist in IoT. Architectures should be open, and following standards, they should not restrict users to use fixed, end-to-end solutions. IoT architectures should be flexible to cater for cases such as identification
(RFID, tags), intelligent devices, and smart objects (hardware and software solutions).

9

INTERNET OF THINGS 2015
2) Technical Challenge:
IoT technology can be complex for variety of reasons. First, there are legacy heterogeneous architectures in the existing networking technologies and applications, e.g., different applications and environments need different networking technologies, and the ranges as well as other characteristics of cellular, wireless local area network, and RFID technologies are much different from each other. Second, communication technologies, including fixed and mobile communication systems, power line communications, wireless communication, and short-range wireless communication technologies, for both fixed and mobile devices, either simple or complicated, should be low cost and with reliable connectivity. At last, there are thousands of different applications; it is in natural to have different requirements on what parties need to communicate with each other, what kind of security solutions are appropriate, and so on. To summarize, complexity and alternative technologies may introduce problems; unnecessary competition and deployment barriers in markets may also introduce problems; systems and communication mechanisms with unnecessary dependencies may block the migration of IoT systems to the most economic and efficient platforms. All the above may block IoT to connect as many “Things” as possible. 3) Hardware Challenge: higher the RF, the more power consumption from RF PA will be. In another way, not yet used very na Smart devices with enhanced inter-device communication will lead to smart systems with high degrees of intelligence. Its autonomy enables rapid deployment of IoT applications and creation of new services.
Therefore, hardware researches are focusing on designing wireless identifiable systems with low size, low cost yet sufficient functionality. As the bandwidth of IoT terminals could vary from kbps to mbps from sensing simple value to video stream, requirements on hardware are diverging. However, two requirements have been nevertheless the essentials: one is the extremely low power consumption in sleep mode and the other is ultra-low cost. Suppose the sleeping time over active time is one million, the leakage power of an IoT terminal shall at least be one million time less than that of active. It is so far impossible when an IoT terminal is sleeping and receiving RF signals. It will be even difficult when using advanced CMOS silicon with relatively more leakage power.
Hardware and protocol code sign for sleeping has been thus the first hardware challenge of IoT. Billions of IoT terminals will be used; the cost of an IoT terminal must be ultralow. However, so far, there is no low cost positioning solution for IoT, especially the positioning precision of a short-range IoT terminal must be high. Low active power is also a challenge for low-cost terminal. Traditionally, low cost equals to lower
10

INTERNET OF THINGS 2015 performance or longer process latency. Longer processing latency ends up to higher energy consumption. As the spectrum resource is very limited at the lower part in L band, IoT may use higher RF such as the frequency bands higher than 5 GHz. The rrow spectrum band between two used bands may have to be used by future IoT. To use very narrow band with strong power neighbors, the cost of passive component will not be low and that will definitely be a potential challenge in the future.

4) Privacy and Security Challenge:
Compared with traditional networks, security and privacy issues of
IoT become more prominent. Much information includes privacy of users, so that protection of privacy becomes an important security issues in IoT. Because of the combinations of things, services, and networks, security of IoT needs to cover more management objects and levels than traditional network security. Existing security architecture is designed from the perspective of human communication, may not be suitable and directly applied to IoT system. Using existed security mechanisms will block logical relationship between things in IoT. IoT needs low-cost- and M2Moriented technical solutions to guarantee the privacy and the security. In many use cases, the security of a system has been considered as a general feature. Related research shall focus on privacy control. Low cost, low latency, and energy-efficient cryptography algorithms and related flexible hardware will be essential for sensor or device. 5) Standard Challenge:
Standards play an important role in forming IoT. A standard is essential to allow all actors to equally access and use. Developments and coordination of standards and proposals will promote efficient development of IoT infrastructures and applications, services, and devices. In general, standards developed by cooperated multiparties, and information models and protocols in the standards, shall be open. The standard development process shall also be open to all participants, and the resulting standards shall be publicly and freely available. In today’s network world, global standards are typically more relevant than any local agreements.

6) Business Challenge:
For a mature application, its business model and application scenario are clear and easy to be mapped into technical requirements. So the developers do not need to spend much time on business-related aspects. But for IoT, there are too
11

INTERNET OF THINGS 2015 many possibilities and uncertainties in business models and application scenarios. It is thus inefficient in terms of business-technology alignment, and one solution will not fit possibilities for all. The IoT is a challenging traditional business model. Although small-scale applications have been profitable in some industries, it is unsustainable when extended to other industries. In the early stage of IoT development, business aspects should be considered to reduce the risk of failure.

4.2 Prospect of IoT
With the development and maturity of distributed intelligent information processing technologies, IoT systems will make intelligent sensing widely available through information sharing and collaboration. The gradual establishment and improvement of the standards system will inevitably bring IoT into our daily life. The IoT creates an opportunity for the web-based services, thus enhancing the commercial and social potential future of IoT. The development of IoT keeps going forward along scale, collaborative, and intelligent. Promoted by technology, standardization, and application experiences, IoT applications will expand the scale in the different industries, and more enterprises will be attracted to come in.

1) Interoperability:
Information interoperability will take place among different things, different enterprises, different industries, and different regions or countries; application models will change from closed to open and the globalization of IoT application system serving different industries and fields will be constructed. Interoperability is the essential issue for crossing layers of physical, device, communication (protocol and spectrum utility), function and application.
These levels traditionally are built with different languages and protocols. Level and domain transparent languages and protocols are, therefore, needed. A holistic approach is required in addressing and solving the interoperability of IoT devices and services at several layers.

2) Intelligent System:
12

INTERNET OF THINGS 2015
The IoT will bring seamless business and social networking over fast reliable and secure networks into our society. System intelligence will be important for the development of IoT and the key point will be context awareness and inter-things information exchange. Therefore, increasing and adapting the intelligence at the device level will be a focus of research, such as the integration of sensors and actuators, high efficiency, multi standard and adaptive communication subsystems, and adaptable antennae. Intelligences can be introduced using micro control unit (MCU) on upper layers. However, physical layer so far has been far behind the required intelligent level, for example, to adapt IoT devices under different radio infrastructures.
Four parts in physical layer must be further developed to adapt to and/or to form an intelligent IoT device, which are as follows. Programmable baseband processor will be used to adapt to different modulation algorithms, different error correction algorithms, different channel bandwidths, and different channel scenarios. Software-controlled RF will be essential for transceiver to adapt to the local radio frequency requirements. Fully digital RF PA will be the indispensable device to consume less low power and offer programmability for PA to adapt radio transmission requirements.
Finally, controllable integrated passive components will be an essential glue to connect intelligent semiconductor components into a sensor node with low cost, low size, and low power.

3) Energy Sustainability:
In the future, energy-efficient and self-sustainable systems will be key enhancing issues to the IoT. The ways to harvest energy from environments must be developed. Efficiency in processing and communication must also be increased through new circuits, new programming paradigms, and the further development of energy-efficient protocols and smart antennae. The development of new, efficient, and compact batteries, fuel cells, as well as new energy generation devices coupling energy transmission methods or energy harvesting will be the key factors for the roll-out of autonomous wireless smart systems.
Charging of global IoT terminals, power consumption of global IoT access points and gateways, as well as the power consumption of IoT data processing in IoT infrastructures will be one of the dominant power consumers in the future world.
Mechanical energy harvest will be sufficient for body network as a part of IoT. Solar or wind energy is a conditional energy sources which may not be reliable. It can be used for battery charging.

13

INTERNET OF THINGS 2015
5. CONCLUSION
The IoT encompasses several technologies such as information technology, cognitive sciences, communication technology, and low-power electronics. IoT creates a newer information society and knowledge economy. But the challenges from research, industries, and the government will keep pushing and investing. The development of IoT will depend on technological advances in silicon scaling and energy-efficient devices, in getting the information from heterogeneous sources, in reducing costs, and in improving efficiencies. The development of the IoT exposed many new challenges including the lack of fundamental theory supporting, unclear architecture, and immature standards. To meet these challenges, we give a three-layer architecture including three platforms.
The proposed acting standard can hopefully balance desires from different parties, can open the door for future fundamental theory development, and can eventually stimulate/regulate IoT development. The future of IoT will be expected to be unified, seamless, and pervasive. Large-scale service deployment needs to be framed within a set of standards. Thus, the developments of IoT as an intelligent system can be proceeding with interoperability, energy sustainability, privacy, and security.
IoT have become an inevitable trend of development of information industry, which bound to bring new changes to our lives.
A standardized security protocol is indispensable for the success of
IoT. When every object in our daily life is connected to the Internet, they must speak the same (security) protocol to ensure interoperability. The standardization efforts in
IETF is, therefore, a very important effort to make IoT a reality.

14

INTERNET OF THINGS 2015

REFERENCES
[1]. J. A. Stankovic, “Research directions for the Internet of Things,” IEEE Internet Things J., vol. 1, no. 1, pp. 3–9, Feb. 2014.
[2]. G. M. Lee et al., “The IoT—Concept and Problem Statement,” IETF Standard draft-leeiot-problem-statement-05, Jul. 30, 2012.

[3]. I. M. Smith et al., “RFID and the inclusive model for the IoT,” CASAGRAS Partnership
Rep., West Yorkshire, U.K., Final Rep., 2009.
[4]. J. Gubbi et al., “IoT: A vision, architectural elements, and future directions,” Future
Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, Sep. 2013.
[5]. A. Zanella et al., “Internet of Things for smart cities,” IEEE Internet Things J., vol. 1, no.
1, pp. 22–32, Feb. 2014.
[6]. R. Kranenburg and A. Bassi, “IoT challenges,” Commun. Mobile Comput., vol. 1, no. 1, pp. 1–5,
2012.

15

Similar Documents

Premium Essay

The Importance Of Health Care Systems

...human mismanagement or fatigue. Mechanics used to automate process can produce an abundance of data in an everlasting feedback loop that can be used for performance enhancement and optimization. Due to the above mentioned reasons healthcare play an important role in Internet of things. Remote monitoring, smart sensors, activity trackers, wearable biometric sensors, medication dispensers, smart beds, glucose monitors are some of IoT’s modest beginning in the field of healthcare systems. The significance of IoT is healthcare is commendable. For eg a wearable device attached to a patient can tell him if his heart-rate is going haywire or has dwindled in taking care of himself. Prevention is a principal area of focus as health care outlays are bound to grow nuts in the future. One point that has to be kept in mind is security. Security once compromised can have very dangerous consequences. For eg the lack of EHR integration is a problem to address. Smart pills is one way IoT has impacted healthcare. The pills flux inside the stomach and route signals to the sensor worn on the...

Words: 1483 - Pages: 6

Premium Essay

Nt1330 Unit 9 Assignment 1

...across various relationships. Data can be from multiple sources and across databases, flat files. In addition to the above challenges, data obfuscation implementation does not have any set of standard for its comparison. Data obfuscation is a form of data masking. Providing necessary training to corporate and end users who are responsible for utilizing the data obfuscation technology to achieve deeper business insights. It is important that time needs to be placed aside to ensure that proper training takes place for all users/organization utilizing Media630. IoT internet of a thing allows the connections of devices and objects to the internet and allowing remote controlling for the collection and sharing of data without the involvement of human being. The implementation of IoT has challenges which include connectivity, security, and technology interaction with legacy systems. The type of technologies required to make the IoT system function as part of an existing system or as a stand-alone will be a technology/process hurdle posed by the new technology. Additionally, the security challenge posed by the new technology interacting with legacy systems provide an opportunity for malicious attackers to exploit the security holes in the numerous new nodes introduced between the systems. For two systems to communicate, new network nodes have to be established thus creating a security weakness for malicious exploitation. Other challenges posed by the introduction of the new tech/system...

Words: 672 - Pages: 3

Premium Essay

Hefty

...magine a criminal using your nanny cam to watch your house Can You Trust Your Fricge? TODAY'S INTERNET OF THINGS IS FULL OF SECURITY FLAWS. WE MUST DO BETTER By Alan Grau • Illustration by J D King or to scream at your child—or even to post footage of your home on a crime boss's website. And suppose your refrigerator were spewing spam e-mail, enraging people you'd never even met. The Internet of Things has been touted as many things. But what you haven't heard is that it could be your worst enemy. Yet all of these incidents have actually occurred, according to news reports. And it's likely that even more disturbing transgressions have been taking place unbeknownst to homeowners. For example, researchers have discovered that in some cases, they can hack the Internet of Things to intercept each document you print and divert it to a remote site, use your smart TV to bug your house, and even control the traffic light on the corner outside your home. For although the Internet of Things offers great convenience by linking our gadgets—an estimated 50 billion of them worldwide by 2020—it can also let hackers take control of your house, your car, and even your body. The vulnerabilities lie all around you. A recent HP Research study reported that the average Internet of Things gadget has an astounding 25 security flaws, and 70 percent have at least one such vulnerability. Many of these problems may yield to solutions like those adopted by the...

Words: 3850 - Pages: 16

Free Essay

Internet of Things

... | |2 |Eric Ombasa |CBM12/10183/15 | | |3 |Vincent Master Oseko |CBM12/10220/15 | | Table of Contents What is Internet of Things 1 The Advantages of IoT 2 The Disadvantages of IoT 4 Scenarios: 6 Challenges and Concerns 8 WAYS THE INTERNET OF THINGS IS CHANGING THE WORLD 10 ENVIRONMENT 10 RECOMMENDATIONS 24 In particular, policymakers should do the following: 24 Diagram illustrating IoT 27 References 28 THE INTERNET OF THINGS (IOT) What is Internet of Things The Internet of Things (IoT) is an environment in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS) and the Internet. Technologies for the Internet of Things The Internet of Things is a technological revolution that represents the future of computing and communications, and its development depends on dynamic technical innovation in a number of important fields, from wireless sensors to...

Words: 7142 - Pages: 29

Premium Essay

The Internet of Things

...See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/263893131 TruSMS: A trustworthy SMS spam control system based on trust management Article in Future Generation Computer Systems · July 2014 Impact Factor: 2.79 · DOI: 10.1016/j.future.2014.06.010 CITATIONS READS 4 2,022 4 authors, including: Zheng Yan Raimo Kantola Xidian University Aalto University 88 PUBLICATIONS 588 CITATIONS 91 PUBLICATIONS 298 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. SEE PROFILE Available from: Zheng Yan Retrieved on: 12 April 2016 This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy ...

Words: 18072 - Pages: 73

Premium Essay

Nt1330 Unit 3 Assignment 1

...security technologies are employed on the network in order to take advance precautionary measures to avoid various security threats. According to various situations companies adopt the required security measure in order to address different types of unethical activities on the network. Following are some of the recent trends that might impact the network security and its strategies: Political Cause There might be some political opposition in defining and using several security guidelines and applications within the network from the administrative management. The network might be under threat if there are no proper security guidelines and procedures defined for a network. The use of proper security applications also plays a major role in securing the critical infrastructure of the network. For example: 1) Most of the employees who have newly joined within organisations will not have much knowledge about all the defined security policies and guidelines. So, there are great chances of new employees violating the security policies within the organisation. 2) The employees who have more knowledge about sharing the confidential data within the organisation have faced some problems towards the security violations. Breaking the security policies within the organisation is considered to be serious and there are severe legal consequences defined for employees for security policy violations within the organisations. Big Data Problem Most of the organisations are managing huge amount of...

Words: 2324 - Pages: 10

Free Essay

Records Management

...Current Trends Grace D. Buencamino BSIT-S7C 1.) E1 – World’s smallest 4K interchangeable lens camera The E1, two years in the making, is currently running a Kickstarter campaign not to raise funds for manufacturing, but to promote the company (Z Camera), as it is still an unknown startup. The company launched the campaign in advance of its official announcement, and has already shattered its $42,000 goal (as of this writing, it’s currently at more than $147,000). And unlike many Kickstarter projects, the E1 is real and we’ve played with one; its engineer and creator, Jason Zhang, told us that manufacturing has already started and first deliveries are scheduled for later this year. Zhang was a former engineer with Ambarella, the chipset maker that supplies hardware to GoPro. After branching out on his own, Zhang and a few colleagues saw an “opportunity gap” for a camera that fits between an action cam and a DSLR – small and light enough to fit onto a drone, but more powerful and flexible than an action cam. Built around an Ambarella 4K-capable A9 chipset, Zhang went with a Micro Four Thirds sensor (made by Panasonic) for the E1 because it’s the only open standard option in interchangeable lenses, Zhang says. The E1’s mount works with most Micro Four Thirds lenses from Olympus and Panasonic, as well as some third-party makers like Sigma. The camera doesn’t have any built-in image stabilization, but you could use one of Panasonic’s O.I.S. lenses. The E1 will autofocus any attached...

Words: 3595 - Pages: 15

Premium Essay

Business Review

...Wireless IP Solutions Enhancement Business Plan 2014 September 17 draft Rosemary Thorsen TBS Complex Mobile Solutions Content    Market Problem and Opportunity Market Analysis Market & Product Strategy    Product Requirements Project Schedule Business Advantages    Success Criteria Risk Assessment Implementation & Launch Plans  Financial Data 2 TELUS Confidential 2 Market Problem and Opportunity Wireless IP Solution Portfolio – Problem and Opportunity What was this portfolio designed for? capabilities - Originally designed to support CDMA Architecture 7 years ago - Built to implement 2 to 3 enterprise clients per month - Focused on modem market in the enterprise segment (C BAN Only) - Mostly in ILEC territories with MPLS network (in Canada) Where does this need to evolve to? - Support M2M & Non M2M (Smartphone) growth on LTE network and beyond - >500K+ loads annually and more in coming years - Across ENT, TBS and Partner segments for all devices (Modems, POS, Routers, Smartphones, Tablets, ATMs, Cars) - Across ILEC / Non ILEC territories (TELUS, Non TELUS, Internet) and even international connectivity 4 TELUS Confidential TELUS restricted and confidential– not for distribution 4 Mobile Business Drivers the courage to innovate TBS Segment • Provide controlled real-time access to business applications and systems for mobile workers in the business market Machine-to-Machine • Provide secure...

Words: 5354 - Pages: 22

Premium Essay

Internet

...The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia Europe Direct is a service to help you find answers to your questions about the European Union New freephone number * 00 800 6 7 8 9 10 11 Certain mobile telephone operators do not allow access to 00800 numbers or these calls may be billed. In certain cases, these calls may be chargeable from telephone boxes or hotels. «The views expressed are those of the authors and not necessarily those of the European Commission or any of its officials» A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server (http://www.europa.eu). Cataloguing data can be found at the end of this publication. ISBN 978-92-79-08008-1 © European Communities, 2008 Reproduction is authorised provided the source is acknowledged. Printed in Belgium PRINTED ON CHLORE FREE PAPER The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia ••• 2 Preface 5 priorities identified by the Internet Governance Forum: openness, security, access, diversity and critical Internet resources. The use of the Internet in public policies will considerably grow in areas such as education, culture, health and e-government...

Words: 66329 - Pages: 266

Premium Essay

Windows 10 Introduction

...Introducing Windows 10 for IT Professionals Technical Overview ED BOTT PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright 2016 © Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-0-7356-9697-6 Printed and bound in the United States of America. First Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at mspinput@microsoft.com. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/ Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions Editor: Rosemary Caperton Project Editor: Christian Holdener; S4Carlisle Publishing Services Editorial Production:...

Words: 48336 - Pages: 194

Premium Essay

Capstone Project

...ITT Capstone Project NT2799: Network Systems Administration | Donna Williamson, Andy Lara, Mary Hunter, Carlos Vargas, Matt Koppe, Morten Laigaard Donna Williamson, Andy Lara, Mary Hunter, Carlos Vargas, Matt Koppe, Morten Laigaard Table of Contents Part 1: Structure of WAN2 Part 2: Types of Equipment7 Part 3: Protocol Choices25 Part 4: Phone System73 Part 5: Security Proposal78 References89-92 Part 1 Structure of WAN Structure of WAN- Mary Hunter We have initially considered our LAN components and began our documentation. We have planed the design and determined all resources involved. We have considered and interviewed all the stakeholders involved. We are in the beginning stage, so the components, resources, stakeholders and design may change. We will use switches to connect hosts to the internetwork, and both hubs and switches will be used to interconnect devices in our star network architecture. This way if we need to add workstations we will only have to insert another hub or switch. All of ABC worldwide offices will include file services, print services, message services, directory services, and application services. All of the offices will have the use of a file server for file sharing backing up files and storage. They will have access to a print server that will include Queue-based printing and print sharing; a message server that will allow for e-mails with attachment files, including video, sound, and documents. All the offices will have access to a...

Words: 13943 - Pages: 56

Premium Essay

Infosec Career

...Even once a person realizes he or she has a passion for information security, moving in the field can seem a daunting task. The education market is oversaturated with degrees, certifications, and training programs. Meanwhile, many prominent hackers mock those programs publicly. Although I’ve touched on security education and training quite a bit, I’m continually asked to provide a resource for people who are trying to transition from school or other fields into Information Security roles. Ours is a healthy job market and we do need qualified and motivated applicants. The jobs exist, but we repeatedly see candidates being given false advice to get them. With tremendous and very much appreciated help from many of my colleagues and friends in the field, I have endeavored to compile a comprehensive blog about starting an InfoSec career. This is a very lengthy blog broken into sections that may help people as parts or as a whole. We want you to succeed in our field. As always, please feel free to ask questions or leave comments / gripes / suggestions. Chapter 1: The Fundamentals  Unfortunately, for all the interminable hacking tool tutorials and security guides floating around the internet, many InfoSec job candidates haven’t grasped two fundamental concepts: * To hack something (or defend it from hacking), you must have a solid understanding of how that thing works. And, * InfoSec is not a career that can be put in a box once you go home from work or school. You must be...

Words: 11232 - Pages: 45

Premium Essay

Petronas Dagangan Annual Report

...AN NU AL RE PO RT 20 11 ENERGISED PDB is the leading provider of quality petroleum products in Malaysia. As we move ahead, we remain committed to continuously innovate and redefine our products, services and customer experience, further affirming our aspiration to go “All the Way” in creating sustainable value for our stakeholders. ...all the way 77 Corporate Responsibility 6 Business Highlights 78 Sustainability Report 8 Letter to Stakeholders 88 Corporate Governance Statement 13 PDB Today 97 Statement on Internal Control 15 Our Vision & Shared Values 101 Board Audit Committee’s Report 16 About PDB 104 Board Audit Committee’s Terms of Reference 18 Areas of Operation 106 Statement of Directors’ Responsibility 19 Group Structure 107 Investors’ Overview 21 Corporate Information 108 Investor Relations Report 22 Board of Directors 109 Share Performance 24 Profiles of Directors 110 Shareholders’ Information 30 Management Committee 115 Financial Calendar 35 Performance Review 117 Financial Statements 36 Q&A with the MD/CEO 173 List of Properties 43 Business Review 200 Corporate Directory 63 PDB in the News 201 Notice of Annual General Meeting 64 Highlights 2010/11 Proxy Form 70 Crude Oil and Petroleum Product Price Trend 71 Economic Outlook 72 Group Financial Summary 75 Simplified Group Financial Position 76 Value Added Statement FY 2010/11 Financial Highlights 4 29th Annual General Meeting Sapphire Ballroom, Level 1, Mandarin Oriental Kuala Lumpur, Kuala Lumpur...

Words: 62938 - Pages: 252

Premium Essay

Thesis

...THE IMPACT OF COMPUTER-BASED ACCOUNTING SYSTEMS ON MALAYSIAN PUBLIC SECTOR AGENCIES BY WAN ZURIATI WAN ZAKARIA A thesis submitted to the School of Business and Law, Central Queensland University, Australia, for the fulfilment of the requirement of the degree of Doctor of Philosophy (PhD) MAY 2014 ABSTRACT The positive and negative impacts of information technology (IT) have been continuously discussed and debated by researchers, practitioners and scholars for several years. In the public sector environment, IT can be a powerful tool for improving the delivery of government services with better collaboration among various governments. Therefore, the Malaysian Government, similar to many other governments, has planned and implemented a number of programmes to embrace the digital world by transforming itself to deliver information and services electronically. In public sector audit and accounting practices, the Malaysian Government has experienced local reform aimed at escalating transparency, streamlining accountability and improving overall financial management in line with international standards and practices. The purpose of this study is to evaluate the impact of computer-based accounting systems (CBASs) on the effectiveness of performing accounting tasks by Malaysian public sector agencies (PSAs). This study focuses on the impact of performancebased outcomes at three levels: individual task, accounting-related task, and organisational level...

Words: 66979 - Pages: 268

Premium Essay

Infosys Ar

...Annual Report 2014-15 Infosys Annual Report 2014-15 Narayana Murthy A tribute to our founders Nandan M. Nilekani S. Gopalakrishnan K. Dinesh The year 2014 was a milestone in our Company's history, when we bid farewell to three of our founders who held executive positions in the Company during the year – Narayana Murthy, S. Gopalakrishnan and S. D. Shibulal. Narayana Murthy stepped down as the Chairman of the Board on October 10, 2014. His vision, leadership and guidance have been an inspiration to Infosys, the Indian IT industry and an entire generation of technology entrepreneurs. He propelled the Company into accomplishing many firsts and in setting industry benchmarks on several fronts. He espoused the highest level of corporate governance standards that have defined Infosys over the years and made us a globally respected corporation. Between June 2013 and October 2014, he guided the Company through a period of stabilization and leadership transition. S. Gopalakrishnan stepped down as Vice Chairman of the Board on October 10, 2014. Kris, as he is popularly known, served the Company in several capacities over the last 33 years. As the Chief Executive Officer between 2007 and 2011, he steered the Company at a time when the world was faced with economic crises. Ranked as a global thought leader, Kris has led the technological evolution of the Company. S. D. Shibulal stepped down as the Company's Chief Executive Officer on July...

Words: 136409 - Pages: 546