Abstract it improve efficiency, accuracy and instance data deliver

 

 

Abstract

Internet of Thing   has been a considerable attention from last
few years. It was first proposed by kelvin Aston in 1990. This paper is general
survey of security and privacy issue and their standardization that end user
may face.    This survey paper focus on layer
of Security issue on data transmission in Iot.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

1.   
INTRRODUCTION

In
last decay, the iot has become trending through representative application (e.g.
intelligent transportative , green house monitoring, telemedicine monitoring).
The term internet of things refers to the network of physical devices, machine,
home appliance, vehicles and other item which embedded with network and
electronics, which put up the data from their sensors to the cloud and other
structural representative software through a network. The Iot allows to
sense  or remotely access the object
through network infrastructure. That give us sophisticated technology between physical
world and computer system and it improve efficiency, accuracy and instance data
deliver through network parameter. Term 
“Thing” in the IoT refer to the wide variety of devices like camera
streaming and control, automobile with built in sensors, biochip, DNA analysis
. Legal scholars suggest regarding “Things” as an “intertricable mixture of
hardware, software, data & service”. The word “The internet of things” was
proposed by kelvin Ashton of procter & Gamble (P & G), later  MIT’s Auto – ID center in 1999.

2.  
EVOLUTION

Before doing
investigation of the IoT in depth, It is Worthwhile to know the evolution of
the internet. In the late 1960s the computer communication between two computer
was made possible through a computer network. Later in 1980s , the TCP/IP stack
was comes in the light. After that commercial use of the internet comes. Later the
world wide web (WWW) become at more popular in 1991 which help internet to gain
more popularity and rapid growth. After uses of www, user was going ore
forwarded and connect internet to mobile and form mobile internet. Later on the
invention of internet the next step to connect object around us to each other
(e.g.  M2M) and interchange data via
internet.

IoT helps in
creating the world where all object may easily connect to each other via
Internet. The final goal is to create “a better world for human being” where
object around us know what we like and what we need, and they act accordingly
without less human interaction3.

By the mid of
1990s , web servers were allowed to added in embedded product. These
manufacturers were rapidly integrating internet connected system into the high
value asset tracks, fleet management. They like it for more than 15 years.
However it is getting easier to integrate M2M machine system as more powerful
processor are in incorporated into the end nodes 4. And these processors
support high level operating system (OSes).

 

 

                                                                 

Fig. 1 (a) Evolution of Internet of Things

 

3.  
APPLICATION

Later on 2010 a
survey were done by IOT-I project which identified IoT’s application 4. Which
were grouped in 14 domains viz; transport, smart home 6, smart city 7,
lifestyle, retail, agriculture, smart factory, supply chaine, emergency, health
care 5 and energy. This survey paper was based on 270 response from 31 countries.

 

3.1.          
IoT IN MEDICAL APPLICATION

Due to rapid
growth of population and population aging. There are arising of challenges to
equally serve the health treatment. Because, some rural areas has no health
care center. So they are usually suffer from big problem regarding their health
issue.

·        
There
is a serious shortage problem with medical staff, specially in rural area, lack
of medical instrument kit, low lwvwl of treatment.

·        
Inadequate
disease prevention & early detctio capability.

 

 

 

 

 

 

 

·        
The
imperfect diseases prevention system cannot meet the national strategy
requirements to safeguard the health of the citizen becoming heavy burden on
economy, individuals, families and state.

To
overcome these issue, remote monitoring & management platform of healthcare
, information (RMMO-HI) 5 can easily monitoring and managing of these
lifestyle diseses. So we can easily prevent from these disease.

Fig.2(a). Framework of healthcare
service 5

Regardless
of restrictions of location, time and human activity state, RMMP-HI can collect
the body medical information timely through variety of sensors. Which are
loaded in the human body. These informative data sent to the nearby data
sharing center. Where doctors can easily handle more than one area of people at
one place. It also analysis these data them self and notify real time , when
suspicious result will found. IT also useful to maintain the nation record of
people medical information for higher research and development in  medical field. Body medical sensors are
responsible for register and delete, constituting Medical Body Area Network

(MBAN)
automatically 3. As we can see in fig. short-range wireless communication
sensors module can easily transmit human information to mobile phone or home
gateway. This medical information is uploaded to datacenter and processing
timely. Then the important result will be send back to the respective
person.First-aid notification is delivered to nearby health care center and
then they deliver emergency service to the patient.

3.2.          
IoT IN SMART HOME

In recent years, people
have higher and higher requirement not only on the automation an information of
housing and accommodation, but also on the flexible control of house hold
appliance and the accessibility of acquiring the external information along
with the rapid development of network technology 6 and

communication
technology and for meeting the need of the “Well-off society”. Thus a well
improved smart home network is demanded to establish. In the smart home system,
So that home life become more comfortable, safer, and more effective through
the overall management.

At
present, all kind of low transmission rate data such as sensors, lighting,
entrance guard, and equipment switch with a small data capacity have been
maturely monitored and controlled through existing zigbee technology solution.
However, there have been no related research on the collection and the
transmission solution of the voice, image and video data. In most related
researchs at home and abroad, the advantage of applying zigbee technology to
smart home network have been proven. In the domestic furniture system the
application of the traditional sensors such as temperature, humidity, gas,
smoke and CMOS camera to implementing the collection of image information in
the home network is mainly researched, The different control methods such as
relay control, infrared control, serial port control, and EIB control are
mainly discusses in term of network structure, the  network structure is designed as a star
structure in most researches.

 

 

4.    PAY
ATTENTION TO SECURITY IN Iot

The information
security and network may be catogeries with some properties like
identification, confidentiality, integrality and underiability. Different from
other technology , IoT deals with our private data such as health information,
home camera surveillance , home light system etc. Thus security must higher in
availability and dependability.

 

A.    
SECURE ARCHRTECTURE

       Generally IoT have been catogerous in
four key level   .

Fig. 4. Security Archrtecture

The
third layer will be support platform for the application layer, through this
support platform all data will be organized through network grid and cloud. It
combining application layer upward and network layer downward. The terminal
level is application layer which is at top most. This gives user to customize
services according to their need. User can access internet of things through
application layer interface using television,, personal computer or mobile
device.

4.1 SECURITY AND PRIVACY CONCERNS IN
IoT

Internet of things is a virtual network
between real world and computer with real-time interaction. At initial stage of
development of IoT is M2M, having deployment contexts and subscription.
Unapproachable operation is done without human interaction by the wireless area
network (WAN) or WLAN. As the improvement in social efficiency it arising of
new problem concerning security and privacy breach. 3

4.1.1.    
FRONT-END SENSORS AND EQUIPMENT

Front end perceptual layer send data from
different sensors and RFID reader to different modules of M2M device, This
methodology involves the machines security with business implementation &
node connectivity 5 .

 

Perception nodes are generally catogarious
in the absence of monitoring sensors. An intruder may be easily get access and
damage these devices and their data, and denial of services attack.

4.1.2.    
NETWORK

Network plays
an important role providing a more comprehensive interconnection capability,
effectualness and thriftiness of connection, as well as authentic quality of
service in IoTs. Since a large number of machines sending data to network
congestion, large number of nodes and groups exist in lOTs may be resulted in
denial of service attacks2.

 

4.1.3 BACK-END OF IT SYSTEM

Back-end
IT systems form the gateway, middleware, which has high security requirements,
and gathering, examining sensor data in real time or pseudo real-time to
increase business intelligence. The security of IoT system has seven major
standards viz; privacy protection, access control, user authentication,
communication layer security, data integrity, data confidentiality and
availability at any time.

5.  
STANDARDIZATION:ADDRESSING THE IOT
CHALLENGES THROUGH ADEP AND ANALYTICS

 

·        
Fragmentation!

1.      
Connectivity
standards

2.      
Operating
systems

3.      
Topologies

4.      
 Security

 

·        
Expect
diverse solutions, so

1.      
Software
abstraction (APIs) needed at each node

2.      
Multi
tenant environment needed for security.

3.      
Always
use Https instead of http.

 

 

6.  
Conclusion

Through this paper we have surveyed all the security
issue and their standardization existing in the internet of things. We
identified several loophole related to the security and privacy that

Should
be addressed by manufacturer   to meke
best and  made a best secure plateform
for  delivering the

    Future IoT.                                                   

·        
Simplified application collaboration
through

Standardized interfaces of the     application

development ecosystem.

·        
Autonomous and smart behavior    through

 analytics capability and standardized    data

exchange format and interface.

·        
Processes, procedures and
interface        to

ensure that privacy and confidentiality   of

user is maintained.

·        
Expand
the applicable    device   ecosystem

and
reduce deployment      time            with

standards-compliant
devices and application

requiring
little or no  customization.

·        
Provide
an ecosystem   that    readily  
allows

applications
to share   information          and

experiences.

·        
Assures
a secure communication environment

 for user privacy and confidentiality.