Introduction:The IOT:A smartphone is a multi-purpose pocket computer

Introduction:The internet of things is changing much about the world we live in from the way we drive to how we make purchases and even how we get energy for our homes.Sophisticated sensors and chips are embedded in the physical things that surround us each transmitting valuable data data that lets us better understand how these things work and work together but how exactly do all these devices share such large quantities of data and how do we put that information to work whether we’re improving the production of a factory giving city residents real-time updates on where to park or monitoring our personal health.It’s the common Internet of Things platform that brings us diverse information together and provides the common language for the devices and apps to communicate with each other.The process starts with the devices themselves which securely communicate with an Internet of Things platform this platform integrates the data from many devices and applies analytics to share the most valuable data with applications that address industry specific needs.Architecture:-Generic Architecture-Uses the TCP/IP protocol stack for communication between network hosts.-This communication medium has been there for long .-Semantic Gateway as a Service architecture for IoT Interoperability (Proposed)   -Semantic Gateway as Service architecture allows translation between messaging protocols such as XMPP,CoAP and MQTT via a multi-protocol proxy architecture.-Three and Five Layer Architectures-Its the most basic level architecture-It was developed during the early stages of the IOT.- It includes the perception layer, application layer and the network layer.-Cloud and Fog Based Architectures    -Data processing is done in a centralized manner by Cloud computers.-Cloud is at the center. Applications above the cloud and finally network of smart things below.-Offers high flexibility and scalability.-Representative Architecture  -It is a architecture based on the servers.-It has three layers- Base layer- Component layer- Application layerSecurity Challenges faced by IOT:A smartphone is a multi-purpose pocket computer that stays connected at all times and goes with me whereverWe go and this simple device generates an astounding amount of personal information like pictures and videos my web browsing habits GPS locations financial information and even health information.What happens to all this sensitive data we all know our data is stored locally on our devices but did you know they are also recorded on to third party cloud storage systems where large businesses can learn more about their users, not only is this unfair privacy is also jeopardized as cloud systems have been prone to security attacks and sensitive data leak into the wrong hands every day.Every day ordinary household items and appliances like thermostats refrigerators alarm clocks activity trackers and even light bulbs are being embedded with sensor technology.We are about to enter the age of the Internet of Things and it is predicted in a few years there will be billions of these devices.Front-end Sensors and Equipment-Unauthorized access to data-Threats to the physical sensors-DDOS attacks-Hardware hacks with loopholesNetwork-Unauthorized access to data-Threats to the network-DDOS attacks-Malware and virus attacks-Security of the network compromisedBack-end of IT systems-Operator ReplacementPrivacy Concerns in IOTsPrivacy should be protected in the device, in storage during communication and at processing which helps to disclose the sensitive information .The privacy of users and their data protection have been identified as one of the important challenges which need to be addressed in the IoTs.Privacy in Device-Information can be leaked with hacking of hardware or softwarePrivacy during Communication-Information can be tapped on during its transmission across networks.Privacy in Storage-Servers holding the information can hacked into and the information can be leaked.Proposed solution:-Use of Digital Rights Management (DRM) Systems-It prevents the redistribution of data illegally.-User must be aware of data he/she is distributing. It will reduce the abuse when the user is aware of the data he/ she is transmitting.-Data can be secured during transmission with the help of end to end encryption.-Only the most needed information needs to be stored.Impacts of IOT in the future:-IoT will change the lives of a lot of people, in many different ways, in everything that you do in essence.-You think about when you wake up in the morning, when your alarm goes off will automatically put on the coffee in your kitchen.When your coffee machine goes unit will automatically heat up your car, because it knows that 20 minutes laterYou’re about to take the car to work.You get to work, if you have a hot desk system at all in the office you are going to know where there is a free desk.You are going to have realtime information from your assets that you’re working on in your company and your customers are going to understand how they’re feeling.These are just a few examples of the things that will affect your life.-Over the next three to five years, there will be huge changes, specifically in the home environment.IoT is no longer just something that we’re talking about, it’s actually happening on a day to day basis in our lives.-IOT will make the world a better place.IOT devices will be the future.We can also develop applications for the betterment of the world in terms of global warming.IOT devices can be sets to monitor the pollution levels across the world and combined together with Artificial Intelligence, we may find new solutions to solve the issue of Global Warming.

x

Hi!
I'm James!

Would you like to get a custom essay? How about receiving a customized one?

Check it out