country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Journal Of Advanced Computer And Technology

tag 0 Download8 Pages / 1,984 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss About The Journal Of Advanced Computer And Technology?

 

Answer:

Introduction

IoT outlines the next big advancement of the internet where connectivity will be taken to the next level to include all devices and objects. In essence, IoT will provide a worldwide connectivity through anonymous systems that will require minimal human intervention in their operations, an outcome that essentially will promote the intelligence of technological devices. In all, unlike the modern internet infrastructure that is characterized by electronic devices, IoT will include any object whether electronic or not [1]. Furthermore, it will collaborate the elements of smart systems into its structures which will also facilitate the growth of smart cities. Although the actual implementation and development are yet to take their full effect, the foundational elements of the technology are already in place as exhibited by the existence of the internet. Now, this report highlight IoT as a technology and analyses the security threats/challenges facing it.

Literature revie

So, the genesis of IoT can be traced back to the inception of the internet where the various networking technologies were designed with a worldwide objective that would seamless connect all existing devices [2]. At the time, researchers through the basic technologies that led to the development of the internet focused on the establishment of protocols that could support extended connectivity with limited resources. This requirement led to the growth of packet-switched technologies such as ARPANET and later the modern internet. Nevertheless, today’s systems and technologies seem to promote this initial objective where the growth of anonymous systems is widely exhibited. Now, consider the technologies of today such as smart watches, smart television and smartphones. In essence, these devices/technologies have increased the intelligence of common household devices, an outcome that facilitates extended connectivity since minimal human intervention is required in the overall networking objective [3].

 

IoT defining technologies

For the objectives of IoT to be fulfilled its defining technologies must facilitate the implementation of smart systems. To start with, the devices connected to the wider network of IoT must be able to identify themselves by sharing information autonomously. Moreover, the same devices will require a centralized control system which will improve the overall management outcomes [4]. Now, identification requirement outlines the importance of sensors and actuators in the implementation of IoT. In essence, sensors will facilitate the mutual identification of devices in the networks of operation. These sensors will perform their roles by collaborating the functionalities of worldwide connections through technologies such as RFID and barcode identification [5]. However, based on the prevailing conditions, RFID (radio frequency identification) presents the best solution for this application as it's widely integrated with the modern internet infrastructure more so, the IP. Moreover, its application requires fewer resources which will minimize the overall implementation cost [1].

On the other hand, IoT will require other facilitating technologies to collaborate its functionalities. For one, the internet will serve as its foundational element owing to the existing extensive connections. Furthermore, the defining parameters of the internet such as access model and protocols will also facilitate the functionalities of IoT as it will require certain operation standards to maintain a constant operation outcome. In addition to this, the existing networking infrastructures will be transformed into wireless networks to facilitate the rapid growth of the IoT network because most devices will exist as mobile systems [6].

IoT architecture

Now, consider the number of devices that will be connected into the IoT after the defining elements of the technology have been established. In all, like the existing internet infrastructure, many devices having a wide range of standards and technologies will be used. Therefore, a common defining model will be needed to standardize operations, a role that will be facilitated by the following architecture/structure. This structure will consist of five layers, each having a specific and unique responsibility in the greater workings of the technology [7]. These layers are; Application layer, management layer, networking layer, access layer and the sensory layer.

The sensory layer – the lowest layer the IoT which among its many responsibilities will host the sensory devices that will facilitate the identification process of the devices. Moreover, the same layer will hold system actuators which will enable end users to control the devices from centralized locations. Therefore, the layer will have elements and devices such as detectors, accelerometers and pulse rate monitors.

Access layer – this layer will provide the gateways for accessing the technology’s connections. These gateways will, therefore, consist of networking structures such as localized networks (LANs) which will collaborate the functionalities of devices by connecting them to a common local network. These localized networks will then extend to include other wider networks such as WANs [8].

Networking layer – the basic networking infrastructures i.e. LAN and WAN will require a common integrator to support a worldwide connection [9]. In essence, various networks from different regions will have to be connected, a role that will be performed by the network layer. Now, similar to the existing network layer of the internet, embedded protocols such as IP and TCP will be used.

Management layer – this layer will facilitate the roles of the end users where management and control functionalities will be conducted. This layer will manage the system’s security, objects and analyze the collected data to facilitate the roles of the IoT devices.

Application layer – the uppermost layer in IoT which will deliver the services and functionalities of the technologies to the end users. Now, APIs (application presentation interfaces) will facilitate these roles by delivering data and system control to the end users through graphical systems [1].

 

Security vulnerabilitie

IoT like any other new technology presents many benefits that will advance the users way of life. However, at the same time, the technology will also present a wide range of challenges particularly its security as it will extend the structures of the existing internet infrastructure which to date still holds many security vulnerabilities. Furthermore, most of its functionalities are still untested and thus will lack the necessary robustness to withstand attacks and intrusions. In all, IoT holds the following security vulnerabilities [10].

Extensive networks and device autonomy

Let’s consider the internet as a rudimentary version of the IoT where devices are connected to a worldwide network thus are able to exchange a wide range of information. This networking infrastructure cannot adequately identify all the users of its system as many elements are used. Furthermore, it’s pervasive and anonymous nature makes it a suitable environment for promoting sinister actions such as attacks and intrusions. Now, IoT aims to extend this infrastructure to a higher level where all devices and objects will be a part of the overall networking infrastructure [11]. This extensive network will limit the accountability measures which will affect the overall security of the system used. Moreover, the end users will not be able to adequately track their resources which again may affect the security of the resources more so, the data.

Minimal network isolation

Isolation is a critical component of the security of devices connected to worldwide networks. This isolation facilitates the accountability of resources where administrators are able to identify and track resources based on certain predefined parameters. Moreover, the same tactic also minimizes the intrusion levels when attacks do occur. However, with IoT, this isolation element is lost as the defining protocols of IoT require extensive connections [12]. Furthermore, different devices having different standards will be used which will affect the overall security procedures. For instance, a network and its corresponding devices will have the necessary security features only to be compromised by a rudimentary system having substandard security measures e.g. a smartwatch.

 

User and manufacturer’s ignorance

According to security experts, the end users are responsible for the highest number of cyber intrusions owing to their ignorance and negligence. In essence, they will apply substandard security features in an attempt to save their overall expenditures [13]. A similar outcome is experienced by system developers and manufacturers who will implement substandard security structures in an attempt to increase the overall revenues.

Solution

In the first vulnerability, IoT’s extensive networks will facilitate the growth of the security problems facing the modern networking infrastructures. Therefore, it will be difficult to track and manage resources online. As a solution, the technology must implement extensive security features in the form of encryption and authentication. These security measures will maintain the integrity of the resources used more so, the data which as per the existing infrastructure will be difficult to manage while in transit. Now, these security features should thoroughly protect the channels of communication by providing end to end encryption and user authentication based on verified access policies [14].

 

Conclusion

IoT is not a new technology but an advancement of the existing networking infrastructure which aims to increase the intelligence of the participating devices. This objective will promote the growth of networking infrastructure which will increase information availability and access. However, at the same time, the extended access will facilitate several limitations and vulnerabilities because the resource will be difficult to track. Nevertheless, a wide range of security features can and will be used to minimize these limitations, among them being adequate authentication and encryption standards.

 

References

Madakam, "Internet of Things: Smart Things," International Journal of Future Computer and Communication, pp. Available: https://www.ijfcc.org/vol4/395-ICNT2014-2-203.pdf.

Alsaadi and A. Tubaishat, "Internet of Things: Features, Challenges, and Vulnerabilities," International Journal of Advanced Computer Science and Information Technology (IJACSIT), p. Available: , 2

Mattern and C. Floerkemeier, "Fro m the Internet of Computers to the Internet of Things," Distributed Systems Group, Institute for Pervasive Computing, ETH Zurich, pp. Available: https://www.vs.inf.ethz.ch/publ/papers/Internet-of-things.pdf., 2012

Vatsa and G. Singh, "A Literature Review on Internet of Things (IoT)," International Journal of Computer Systems , p. Available: https://www.academia.edu/19560667/A_Literature_Review_on_Internet_of_Things_IoT

Gubbi, R. Buyya, S. Marusic and M. Palaniswami, "Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions," pp. Available: https://www.cloudbus.org/papers/Internet-of-Things-Vision-Future2012.pdf        

Madakam, E. Ramaswamy and S. Tripathi, "Internet of Things (IoT): A Literature review," Journal of Computer and Communications, p. Available: https://file.scirp.org/pdf/JCC_2015052516013923.pdf

Rose, S. Eldridge and L. Eldridge, "The Internet of Things: An Overview," Understanding the Issues and Challenges of a More Connected World, pp. Available: https://www.internetsociety.org/sites/default/files/ISOC-IoT-Overview-20151014_0.pd

FREMANTLE, "A REFERENCE ARCHITECTURE FOR THE INTERNET OF THINGS," WSO2, pp. Available: https://wso2.com/wso2_resources/wso2_whitepaper_a-reference-architecture-for-the-internet-of-things.pdf., 2

Castellani, N. Bui, P. Casari, M. Rossi, Z. Shelby and M. Zorzi, "Architecture and Protocols for the Internet of Things: A Case Study," p. Available: https://webofthings.org/wot/2010/pdfs/144.pdf., 2010

Reposubstandard security measures e.g. a smartwatch.ble: https://www.cognizant.com/InsightsWhitepapers/Reaping-the-Benefits-of-the-Internet-of-Things.pdf., 2014

society, "The internet of things: overview," Understanding the issues and challenges of a more connected world, pp. Available: https://www.internetsociety.org/doc/iot-overview, 2015.

Ericsson, "IoT SECURITY," ericsson White paper, pp. Available: https://www.ericsson.com/assets/local/publications/white-papers/wp-iot-security-february-2017.pdf., 201

Rimavicius, "Literature Review of the Internet of Things: Anticipating Tomorrow’s Challenges for Privacy and Security," pp. Available: https://sever.wustl.edu/degreeprograms/cyber-security-management/SiteAssets/Lit%20Review%20of%20IoT%20for%20Privacy%20and%20Security.pdf., 2015

Sharma and R. Tiwari, "A review paper on “IOT” & It?s Smart Applications," International Journal of Science, Engineering and Technology Research (IJSETR), pp. Available: https://ijsetr.org/wp-content/uploads/2016/02/IJSETR-VOL-5-ISSUE-2-472-476.pdf., 201

Chen, P. Deng, J. Z. D. Wan, A. Vasilakos and X. Rong, "Data Mining for the Internet of Things: Literature Review and Challenges," International Journal of Distributed Sensor Networks, p. Available: https://downloads.hindawi.com/journals/ijdsn/2015/431047.pdf., 2015

MIT, "The Internet of Things," MIT technology review, pp. Available: https://www.technologyreview.com/business-report/the-internet-of-things/. , 2017.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Journal Of Advanced Computer And Technology. Retrieved from https://myassignmenthelp.com/free-samples/journal-of-advanced-computer-and-technology.

"Journal Of Advanced Computer And Technology." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/journal-of-advanced-computer-and-technology.

My Assignment Help (2018) Journal Of Advanced Computer And Technology [Online]. Available from: https://myassignmenthelp.com/free-samples/journal-of-advanced-computer-and-technology
[Accessed 27 May 2020].

My Assignment Help. 'Journal Of Advanced Computer And Technology' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/journal-of-advanced-computer-and-technology> accessed 27 May 2020.

My Assignment Help. Journal Of Advanced Computer And Technology [Internet]. My Assignment Help. 2018 [cited 27 May 2020]. Available from: https://myassignmenthelp.com/free-samples/journal-of-advanced-computer-and-technology.


MyAssignmenthelp.com has become one of the leading assignment help provider in New York City and Boston. We provide top class auditing assignment help. Not only auditing, but we also cover more than 100 subjects and our writers deal with all types of assignments with utmost expertise. To make writing process faster and accurate, we have segmented our assignment experts' teams as per their expertise on writing different types of assignments. We guaranteed that students who buy our assignment online get solutions worth their investment.

Latest Management Samples

BUS105 Computing Assignment Instructions

Download : 0 | Pages : 7

Answer: Introduction Statistical analysis is an important component for business intelligence. Statistical analysis assists in scrutinizing every data sample in data sets from which samples are drawn (Chen et al., 2012, p.16). The process of statistical analysis entail description of the nature of data that is chosen for analysis, investigating the relationships of data in the primary population, creation of models to assist in summarizi...

Read More arrow

ECON11026 Principles Of Economics1

Download : 0 | Pages : 10
  • Course Code: ECON11026
  • University: Central Queensland University
  • Country: Australia

Answer: Some real life examples of monopolistic competitive market are restaurants, hairdressers, designing clothes, different petrol stations and different television programmes. They operate under this market structure because there are large numbers of similar organisations and every one operates independently (Parenti, Ushchev & Thisse, 2017). Though they are selling same types of products, all products are not exactly same. They are c...

Read More arrow

BUSN20019 Professional Project Disclosures On Market

Download : 0 | Pages : 16
  • Course Code: BUSN20019
  • University: University Of Hong Kong
  • Country: Hong Kong

Answer: Introduction  The main purpose of this study is to find out the relationship between employee satisfaction at the workplace on organisational performance. Secondary research is conducted to get the information related to the employees' satisfaction at the workplace and detailed analysis is done to show the connection between two variables. Employees' satisfaction determines the organisational performance to meet the objectives of...

Read More arrow

BSBMKG609 Develop A Marketing Plan1

Download : 0 | Pages : 5
  • Course Code: BSBMKG609
  • University: The University Of Sydney
  • Country: Australia

Answer: This particular section deals with analysis of market plan, SWOT analysis, marketing objectives, work schedule and budgeting process for purpose of sale revenue forecast. As an acting manager representing a colleague on maternity leave, I have a responsibility of fitting in so as to carry out the required mandates to generate a 12 month marketing plan. This information will be important to executive management team so as to facilitate ...

Read More arrow

HA3011 Advanced Financial Accounting12

Download : 0 | Pages : 10

Answer: Introduction: The intention of this report is to concentrate on the criteria of impairment and assumptions used on the part of M2 Telecommunications Group Limited for carrying out impairment tests on assets.  The report would deal with the procedures of impairment testing and the subjectivity involved in such procedures. For commenting on these procedures, the annual report of the organisation for the period ended 30th June ...

Read More arrow Tags: Australia Merrylands Management Computing Theory University of New South Wales 
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,320,224

Orders

4.9/5

Overall Rating

5,075

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

416 Order Completed

95% Response Time

Tyler Moore

MBA in Accounting

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

230 Order Completed

97% Response Time

Liya Han

Master Of Science in Geotechnical Engineering (MSc Geotec)

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

very good writings, good references and really good pronunciation. would do here again the other time. very recommended!!!

flag

User Id: 409717 - 27 May 2020

Australia

student rating student rating student rating student rating student rating

must be a stupid expert who finished my assignment, don\'t trust it when they say, how good they are. They are all lies!!! i paid 148 dollars for 1000 words, and got less than 50%.!

flag

User Id: 422981 - 27 May 2020

Australia

student rating student rating student rating student rating student rating

It was good and was satisfied with this. This is completed and was passed right away after the presentation. Thank you!

flag

User Id: 238261 - 27 May 2020

Australia

student rating student rating student rating student rating student rating

They did a good job but this time i was no happy that much because i feel i need to let them again and again then even they did't done proper what i need but anyway once happend otherwise other all are mine good and i clear too

flag

User Id: 247567 - 27 May 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?