1. Internet of Things (IoT) :
Peluang Riset
Deris Stiawan. Ph.D
Fakultas Ilmu Komputer | Universitas Sriwijaya
Disampaikan pada Seminar :
Fakultas Sains & Teknologi | Universitas Respati Yogyakarta
2017
2.
3. Introduction
Yan, Zhang, & Vasilakos, 2014
The Internet of Things (IoT) denotes the
interconnection of highly heterogeneous
networked entities and networks following a
number of communication patterns such as: -
- Human-to-human (H2H),
- Human-to-thing (H2T),
- Machine-to-machine (M2M),
- Thing-to-thing (T2T),
The IoT such as sensors or mobile devices senses, monitors and collects all
kinds of data about human social life. These data can be further aggregated,
fused, processed, analyzed and mined in order to extract useful information to
enable intelligent and ubiquitous services.
Gubbi, Buyya, Marusic, &2013
7. Examples of Device Heterogeneity in IoT.
(Razzaque, Milojevic-Jevric et al. 2016)
The nature of the Internet of Things, which are among others:
- Heterogeneity (e.g., different objects, sensors, protocols and applications),
- Dynamicity (e.g., arrival and departure of objects and sensors)
- Evolution (e.g., support for new protocols, sensors).
24. Security & Privacy Issues
Rolf H. Weber, 2015
Describes the challenges issues for privacy
regulations in the IoT
Confirms, the new legal approaches for the
protection of privacy need to be developed.
Weinberg, Milne et al. 2015
They main concern with the data, privacy, security
and hacking
Privacy and security are arguably the most
prominent issues; they are at the heart of trust,
relation-ship building, and exchange.
Sicari, Rizzardi et al. 2015
IoT security requirements: authentication,
confidentiality and access control
Suitable solutions need to be designed and deployed,
which are independent from the exploited platform and
able to guarantee: confidentiality, access control, and
privacy for users and things
25. Drawbacks existing
Vučinid et al., 2015
Neisse, Steri, Fovino, & Baldini, 2015
They created new architecture for end-to-end
security in the IoT. It is based on the concept of
object security that relates security with the
application payload.
1. They concern an architecture for end-to-end security in the IoT
2. Propose a Model-based Security Toolkit, which is integrated in a
management framework for IoT devices, without discuss the main issues in
communication between devices.
3. They did not testing experiments in real-time and used heterogeneous
devices in IoT environment
They propose a Model-based Security Toolkit,
which is integrated in a management framework
for IoT devices