Internet of Things: Architectures, Applications, and Challenges

Internet of Things: Architectures, Applications, and Challenges

DOI: 10.4018/978-1-6684-8145-5.ch023
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With the internet of things (IoT) growing steadily, a wide range of application fields are being offered. These include monitoring health, weather, smart homes, autonomous vehicles, and so on. The result is the incorporation of solutions in various commercial and residential areas and the eventual emergence of them as ubiquitous objects in everyday life. Due to such circumstances, cybersecurity would be essential to mitigate risks, such as data exposure, denial of service efforts, malicious system exploitation, etc. A large majority of entry-level IoT consumer devices lack adequate protection systems, which makes them susceptible to a wide range of malicious attacks. The chapter discusses IoT architectures in depth, along with an analysis of potential applications. A detailed and thorough analysis of challenges in the IoT domain is provided, emphasizing flaws in current commercial IoT solutions and the importance of designing IoT solutions with security and privacy in mind.
Chapter Preview
Top

Introduction

Internet of Things (IoT) refers to an interconnected network of intelligent devices (Bhat et al., 2007). It is now possible for a wide array of devices to gather, transmit, record, analyze, and store large amounts of data, which can include autonomous vehicles, integrated platforms, and intelligent monitoring systems, among others (Cirani, 2019). The advent of IoT has made it possible for every industry to rely on them, from food production to medicine, transportation and defense. Using IoT, physical objects can be converted into smart objects that can sense their surroundings, communicate with the rest of the smart objects, perform reasoning, and respond to changes in their environment as they occur (Tripathy, 2018). Users could benefit from using these devices in a variety of ways by integrating them into their lives. Some of these smart gadgets people have in their homes include smart cameras that alert them on their smartphone when there is movement during atypical hours, automatic doors that open remotely, smart fridge that notify them if milk is running low etc. It is predicted that smart meters will soon be installed in every home to monitor and control energy consumption, heating, and lighting, if they do not already exist there. As convenient as the Internet of Things is, it also comes with new security risks and privacy concerns that must be taken into account (Mahmoud et al., 2016). Failure to pay attention to these concerns regarding security and privacy can have serious consequences on every aspect of people's lives, from how they live in their homes, to how they drive to work, and even their physical and mental health.

Due to the fact that traditional IoT infrastructures contain a great deal of confidential and proprietary information, cybercriminals are interested in them because the potential for monetary gain is enormous. There is no doubt that safeguarding such massive amounts of data can be challenging in an IoT infrastructure ecosystem with extensive information sets and multiple repositories (Rani et al., 2021). Managing and analyzing data privacy can be complicated given the large volume of diverse information contained in this type of data (Tawalbeh et al., 2020). Dispersed infrastructure and the size of the IoT network are among the most prevalent concerns associated with IoT. The identifying, acquiring, and maintaining of accurate data records is a critical component of IoT and big data research (Wang et al., 2019). Criminals might exploit IoT equipment and networks to gain an advantage over competitors by exploiting IoT equipment and networks. In order to prevent this, IoT and big data analysis require a high level of security. Detecting cybersecurity vulnerabilities can be carried out effectively by combining data analysis and cybersecurity protection policies. Therefore, it is critical to have reliable and high-quality cybersecurity monitoring solutions (Rani et al., 2021).

Complete Chapter List

Search this Book:
Reset