Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Trend & challenges Internet of Things


Published on

Internet of Things

Published in: Internet
  • Be the first to comment

  • Be the first to like this

Trend & challenges Internet of Things

  1. 1. Trend & Challenges: Internet of Things (IoT) Dr. Deris Stiawan Universitas Sriwijaya 2017
  2. 2. Introduction Yan, Zhang, & Vasilakos, 2014 The Internet of Things (IoT) denotes the interconnection of highly heterogeneous networked entities and networks following a number of communication patterns such as: - - Human-to-human (H2H), - Human-to-thing (H2T), - Machine-to-machine (M2M), - Thing-to-thing (T2T), The IoT such as sensors or mobile devices senses, monitors and collects all kinds of data about human social life. These data can be further aggregated, fused, processed, analyzed and mined in order to extract useful information to enable intelligent and ubiquitous services. Gubbi, Buyya, Marusic, &2013
  3. 3. IoT IoT (Razzaque, Milojevic-Jevric et al. 2016)
  4. 4. IoT applications (Eleonora Borgia, 2016)
  5. 5. Examples of Device Heterogeneity in IoT. (Razzaque, Milojevic-Jevric et al. 2016) The nature of the Internet of Things, which are among others: - Heterogeneity (e.g., different objects, sensors, protocols and applications), - Dynamicity (e.g., arrival and departure of objects and sensors) - Evolution (e.g., support for new protocols, sensors).
  6. 6. Issues Main security issues in IoT (Sicari, Rizzardi, Grieco, & Coen-Porisini, 2015)
  7. 7. Security architecture (Qi Jing, 2014)
  8. 8. Graphical representation of security challenges (Miorandi et al., 2012)
  9. 9. The middleware is a software layer or a set of sub-layers interposed between the technological and the application levels, it is gaining more and more importance in the last years due to its major role in simplifying the development of new services and the integration of legacy technologies into new ones Roman, Zhou, & Lopez, 2013 Miorandi, Sicari, De Pellegrini, & Chlamtac, 2012 Describes some security issues and represent some attacker models. There are some malicious in IoT, which categorized by threats: (i) denial of service (DoS), (ii) physical damage, (iii) eavesdropping, (iv) node Capture, and (v) controlling
  10. 10. Zuech, Khoshgoftaar, & Wald, 2015 This research will be addressed and answered it. - Solve the challenges, - A mediator or middleware for the integrating - Study case at Air quality monitoring control. security data across heterogeneous sources issued
  11. 11. Security & Privacy Issues Rolf H. Weber, 2015 Describes the challenges issues for privacy regulations in the IoT Confirms, the new legal approaches for the protection of privacy need to be developed. Weinberg, Milne et al. 2015 They main concern with the data, privacy, security and hacking Privacy and security are arguably the most prominent issues; they are at the heart of trust, relation-ship building, and exchange. Sicari, Rizzardi et al. 2015 IoT security requirements: authentication, confidentiality and access control Suitable solutions need to be designed and deployed, which are independent from the exploited platform and able to guarantee: confidentiality, access control, and privacy for users and things
  12. 12. Drawbacks existing Vučinid et al., 2015 Neisse, Steri, Fovino, & Baldini, 2015 They created new architecture for end-to-end security in the IoT. It is based on the concept of object security that relates security with the application payload. 1. They concern an architecture for end-to-end security in the IoT 2. Propose a Model-based Security Toolkit, which is integrated in a management framework for IoT devices, without discuss the main issues in communication between devices. 3. They did not testing experiments in real-time and used heterogeneous devices in IoT environment They propose a Model-based Security Toolkit, which is integrated in a management framework for IoT devices
  13. 13. Drawbacks existing Avelar et al., 2015 Heterogeneity raises a high level of complexity for networks. New characteristics must be managed and more aspects need to be considered, intensifying existing security vulnerabilities on networks or producing new ones. 1. They addressed to solve interconnection between heterogeneous without discussed the security & privacy data 2. They method is not concern in middleware to connected the mesh node 3. They did not testing experiments in real-time and used heterogeneous devices in IoT environment
  14. 14. Smart City