Updated date:

A Research Paper: Challenges and Countermeasures of Internet of Things

Ian is a teacher and an experienced social worker. My role as a man in the society.

Internet of Things

Internet of Things

Introduction

The growth and application of the IoT applications have established a myriad of domain applications, including business growth, development, operations, smart education, transportation, and communications. Several others aver that the IoT application has posited influence on industrial application and business organization purposes leveraging services efficiency and operations (Makhdoom et al. 2018).

Similarly,(Atac and Akleylek (2019) post significant vulnerabilities and threats, posting underscoring challenges in the IoT application in industrial operations and manufacturing industries, business operations, and daily activities. Therefore, as the group members, identifying setbacks in the IoT applications through a comprehensive review and providing possible countermeasures of the challenges is necessary for the researchers' composition.

Abstract

Current decade have witnessed development and application of the Internet of Things in multiple application domains. Cybercriminals' advancement methods and methods to access confidential and privacy information for own manipulation affect daily business organization and institutions' information governance and privacy concerns. In the paper, group members provide enriched research on the IoT challenges on the digital era and practical countermeasures for robust applications, realizing the IoT applications' full benefits.

Background

The IoT describes a paradigm coined by the RFID community in 1999 and acclaims significant application in the digital era due to mobile devices' development and deployment, ubiquitous communication platforms, cloud computing, and big data analytics concepts (Patel and Sunil, 2016). The definition of the IoT accommodates three fundamental aspects, including individuals to individuals, individuals to machines, and machines to things interaction via the internet.

Literature Review

Remarkably, many authors and researchers pay attention to the new creation of challenges resulting from daily and interconnect application of the IoT in manufacturing industries, business organizations, healthcare settings, smart grid, and overall connectivity relating to data privacy and security concerns. According to the authors (Atac and Akleylek,2019), a survey on the IoT application post significant security threats including lacking authentication and authorization mechanism in information governance, insufficient application of cryptographic technologies, cybersecurity, and cyber-attacks, human factors, software and firmware concerns.

Furthermore, the Internet of Things concerns with security and vulnerabilities posit underscoring challenges amid application limit performance and deliverability. The authors (Chen et al. 2018) conduct a systematic review to summarize vulnerabilities, threats, and challenges facing the IoT applications.

Consequently, several authors investigate security concerns in the IoT frameworks and application for effective and comprehensive data management and security achievement.

Similarly, in a study, the authors (Patel and Sunil, 2016) suggest possible future IoT development challenges and deployment within organizations. The research provides an important meeting of challenges in the IoT development and deployment for effective management of challenges and countermeasures.

Discussion

Challenges

Setbacks such as inefficient access control strategies, unsuitable cryptographic techniques applications, cyber-attacks, privacy a, human factors, and software and firmware- related issues are undying pitfalls in the IoT security threats in digital errors (Atac and Akleylek, 2019).

Cyber-attack, human factors, and lack of access control measures pose security challenges in the IoT domain application, leading to security and privacy breach in contemporary society. According to the group members, risk factors such as inefficient access control strategies, unsuitable cryptographic techniques applications, cyber-attacks, privacy a, human factors, and software and firmware concerns post significant security challenges in the IoT application.

Lacking robust data management and information governance within the IoT applications in industries and business organizations has known effects, positing challenges to privacy issues.

Similarly, according to the findings, factors such as occasional updating obligations, automation issues, password, remote access, lacking precise authentication and authorization, considerable numbers of third party application and weak controlling devices leads to privacy and safety challenges (Tawalbeh et al. 2020).

Therefore, the project offers practical challenges in IoT security and privacy concerns that require solid and practical countermeasures.

Countermeasures

Countermeasures such as establishing security mechanisms in the IoT commination and network devices, protecting security threats and intruders, disenabling platforms that would reduce interference with security architecture, and studying and deploying different security protocols and network devices applicable in the IoT for multiple domains applications.

Strategies create effective access control systems, cryptographic analysis, privacy, and security for the IoT challenges countermeasure. Similarly, the IoT access control measures consist of a multi-layered approach, including identification, transmission, verification, validation, and reporting layers, offering a robust solution to security and privacy threats and vulnerabilities.

Conclusion

Privacy and security challenges post underscoring effects on the performance, deliverables, and user’s safety and data management. The research offers possible countermeasures such as the IoT access control measures consist of a multi-layered approach, including identification, transmission, verification, validation, and reporting layers, offering a robust solution to security and privacy threats and vulnerabilities.

References

I Makhdoom, M Abolhasan, J Lipman… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org


A Cihan, S Akleylek - Avrupa Bilim ve Teknoloji Dergisi, 2019 - dergipark.org.tr


KK Patel, SM Patel - International journal of engineering science and …, 2016 - ostadr.ir


L Tawalbeh, F Muheidat, M Tawalbeh, M Quwaider - Applied Sciences, 2020 - mdpi.com

This article is accurate and true to the best of the author’s knowledge. Content is for informational or entertainment purposes only and does not substitute for personal counsel or professional advice in business, financial, legal, or technical matters.

© 2020 Ian Muiruri