Iot

Surname 1
Name
Professor
Course Number
Date
The Internet of Things: Wireless Sensor Networks
There are steady advancements of Internet of Things (IoT), leading to the introduction of a
number of IoT applications with the aim of making everyday life much easier. Such
applications range from general household items to traditional equipment including Wireless
Sensor Networks (WSNs) (Jing et al. 2481). It is, therefore, apparent that this technology holds
great potential, and it is expected that it will have an even greater influence in the coming years
than it does right now. Nonetheless, this potential poses major challenges especially with
concerning security as IoT is based on the internet (Jing et al. 2481). This paper is focused on
the security issues that come with the application of IoT, especially in WSNs. It also provides
a discussion of the concept of secure localization and proposes several solutions to the
problems presented.
SECURITY STRUCTURE OF IoT
It has been found that the security issue of IoT, mobile communications networks, sensor
networks, and the Internet are common. Moreover, there are challenges that are specific to IoT
including privacy issues, varied authentication and access control network configuration
problems, and data storage and management. Information and privacy protection is one of the
major problems facing IoT users (Jing et al. 2481). There are various means of encrypting
information, including hash chain protocol, hash function, Encrypted identifier, and extract key
from an infinite channel. Access control and ID authentication may control the exchange of
data across both sides and confirm each other’s ID accurately, thereby avoiding disguised
attacks to maintain such aspects as the validity and the authenticity of the information. There
seem to be two main security challenges in the transmission process (Jing et al. 2481). One
threat of the IoT security comes from within the technology itself, whereas the other challenge
is born out of the correlated technology of construction and execution of the network functions.
Since IoT is the integration of multiple heterogeneous networks, it is susceptible to
security problems. For instance, it is hard determining the correlation as the correlation of trust
between nodes that are in a constant path of change. Even though this particular issue may be
resolved by routing protocols and key management, there are many more issues that are
difficult to handle (Abuzneid et al. 813). Such security issues as forgery attack, application risk
of ipv6, DOS attacks, DDOS attacks, heterogeneous network attacks, and WLAN application
problems affect, to a considerable extent, the transport security of IoT. It has been found that
it easy to create network congestion in the core network because it is characterised by the
transmission of large amounts of data at any given moment. It is, therefore, necessary to pay
close attention to the volume and connectivity challenges such as security standards, address
space, and reference network redundancy (Jing et al. 2481). There are also application security
challenges, including user authentication and data access, data privacy, IoT platform stability
and management platform (Gudymenko et al. 281). Destroy and track of data stream may also
be considered to be one of these challenges, though to a lesser extent.
Surname 2
WIRELESS SENSOR NETWORKS
WSNs have a wide scope of applications including various forms of performance monitoring,
military applications, manufacturing machinery, ocean and wildlife monitoring and earthquake
monitoring. As the use of IoT tends to increase over time, the scope of application of WSNs is
also likely to broaden in the coming years (Rouhiainen 10). It is expected that in future, such
fields as health monitoring, building security, and pollution and wildfire control will be
dominated by WSN technology (Abie and Ilangko 47). The most evident among the working
principles of a WSN is that a greater fraction of sensor nodes record information streams and
subsequently channel them to one or multiple aggregation points within the network. The
application of WSNs raises particular issues that affect the network architecture to such an
extent that traditional network security may be considered less efficient if not useless. Sensor
nodes are normally designed in such a way that they are cost as low as possible, consequently
limiting their interaction, computation and energy capabilities (Rouhiainen 11). They are
frequently deployed in an accessible station, making physical tampering of the nodes a risk. A
proximate communication with the physical world and human beings also poses unique
security challenges. A proper example of such challenges is an attacker deliberately feeding
wrong information into the node.
One of the most effective means of achieving industrial automation is by applying IoT
technology (Rouhiainen 11). In fact, some of the sectors of industry are already applying IoT
technology to a considerable extent. Some of the applications of IoT in industry include
assembly line machinery monitoring, employee safety monitoring, production and quality
control, and storage management. Generally, there is a higher application of IoT technology in
static work environments than in the dynamic ones, though there are prospects of a wider
application in the latter in the future (Rouhiainen 11). In the context of this paper, it would be
necessary to discuss at least two examples of WSN technology application in industry.
The first instance in many cases of WSN applications in industry is chemical plants and
records management. The chemical inventories of a company play a major role in its supply
chain. Conventionally, records management has been built around manual techniques and hard-
wired computing systems (Mohammed and Roslan 26). It has been determined that these two
techniques are ineffective and inefficient in disseminating data across widely distributed sensor
stations. Particular safety necessities for bulk storage tanks and tank farms may also make
manual monitoring and wiring a risky affair (Mohammed and Roslan 26). A tank management
model that is built around WSN may be advantageous to the company’s supply chain by
offering timely access to inventory information for suppliers and producers alike, enabling both
parties to manage and create a proper timetable to replenish inventory stocks, thereby
maintaining a steady supply of raw materials. This application is modelled in such a manner
that it incorporates the process logic controller to the effect that information from the extra
sensors may be overlaid to input from standing fixed installation (Mohammed and Roslan 27).
The second example of WSN applications in industry is pulp and paper mills. WSNs
may be deployed to monitor machines for diagnostic and maintenance functions (Jain et al.
1218). The rolling equipment used in pulp and paper mills are considerably large in size and
possess quite complex working mechanisms. It has been found that even the slightest change
in temperature, velocity or the alignment of the rollers may have severe effects on the quality
of the operation and the final products. Therefore, WSNs are a suitable solution to assessing
Surname 3
and resolving such instances as unexpected changes in output quality, abnormal vibration,
noise or other pointers of potentially undesirable issues (Jain et al. 1218). Technicians may
attach the needed sensor nodes to relevant points in the equipment process line, and the sensor
nodes will form a link by themselves. This kind of practice is necessary, especially when
measuring speed, vibration, temperature or pressure in a particular point in the machine or in
the entire machine. The nodes, which are equipped with smart I/O system to determine the
sensor types, identify the information to be evaluated and transmit it to a hand-held base station
device wirelessly (Jain et al. 1219; Polk and Sean 148). These overlay systems may be timely
integrated and quickly eliminated once issues are determined and resolved.
SECURE LOCALIZATION
The majority of WSNs possess a large amount of sensor nodes which may be distributed
randomly over the application point. The technique may be for instance a random scattering
from an aircraft. It may be inferred from this argument that WSN protocols may not know
initially which particular nodes will be within communication proximity of each other after
placement (Rouhiainen 15). Additionally, the fact that there is inadequate predetermined
network infrastructure creates a need for the WSNs to establish links and maintain network
connectivity independently. The issue of establishing the geographical location of the node and
its relative position within the WSN is called localization (Rouhiainen 15).
Current direct localization techniques include GPS or manual location pre-
configuration. Integrating GPS receiver into nodes may be considered to be a simple solution
to the issue (Rouhiainen 15). Nonetheless, a GPS-based system is not applicable for indoor
WSN applications, and it has also been found to be quite unreliable when sensors are placed in
surroundings with obstructions, say dense foliage regions. Moreover, despite the fact that GPS
receivers are considerably small in terms of size, there application leads to a substantial battery
drain and raise the expenses incurred for controlled sensor nodes. The pre-configuration of
node positions done, if manually, may also be considered to be a probable solution (Rouhiainen
15). However, it also has its setbacks. It creates substantial hindrances to WSN applications.
The node positions have to be entirely static, and random placement techniques cannot be
employed. Such issues make manual configuration technique very costly with regard to time
consumption. Moreover, this technique scales very poorly, making it inapplicable for large
scale WSNs. The restrictions of sensor nodes and the inappropriateness of manual
configuration has caused many researchers in this field to seek for substitute secure localization
solutions (Miorandi et al. 1502).
Solutions. The indirect localization techniques are built around placing nodes relative to other
nodes which are located at a proximate position. They were developed to resolve the issues of
direct localization techniques, at the same time maintaining the precision of location. A
majority of the indirect localization techniques are built around the application of beacon
nodes. Beacon nodes tend to be aware of their own position and, therefore, assist sensor nodes
in establishing their location (Kozlov et al. 213). They are also few in terms of number as
compared to sensor nodes and are therefore able to use GPS receiver. Furthermore, because of
these properties they can be their position may be configured manually. Nonetheless, this
technique also has its security issues (Kozlov et al. 213). Since the beacon nodes, like the sensor
nodes, are deployed in hostile environments, they are susceptible to physical node capture or
other attacks. The chances of beacon nodes offering false data have to be considered too.
Surname 4
A more suitable solution would be Spotlight, which is dependent on external Spotlight
gadget. This gadget performs all the computations related to localization (Rouhiainen 25). A
laser light source is incorporated into the Spotlight gadget so that the laser light is directed to
the sensor nodes in the known location. The gadget generates restrained events in the location
where sensors are placed. The region of affected sensors is referred as a lightened sensor region.
Using specific time events generated by a particular sensor node and spatio-temporal properties
of the perceived events, spatial data corresponding to the sensor node may be established.
Another effective solution is Radio Interferometric Positioning System (RIPS). The
system works by employing a couple of external radio transmitters to form an interference
signal (Rouhiainen 25). The transmitters are positioned on various locations and form a signal
with varied frequencies. Two or more sensor nodes would be needed in order to determine the
phase offset of the perceived signals. The relative phase offset is a function of the relative
locations between the pair of transmitters, the carrier frequency and the receivers. This data
may be used to establish the relative positions of a pair of sensor nodes (Rouhiainen 25). In
some instances, if the position of the radio source is known, this data may also be used to
determine the exact positions of the sensor nodes.
Moore’s algorithm has also been established as one of the suitable solutions.
Researchers have demonstrated that distributed localization algorithm may perform well
without employing GPS r any form of beacon nodes. This technique also performs well in noisy
distance measurements (Rouhiainen 25). This technique employs, to a great extent, robust
quadrilateral, which is an entirely linked quadrilateral, whose sub-triangles (four in number)
are robust. The algorithm has three phases, the first of which is known as the cluster localization
phase. This phase starts by each node assuming the centre of the cluster and determining the
distance from its one-hop neighbours. This data is then relayed to the neighbours. For both
clusters, each node work out the entire set of robust quadrilaterals. Location approximations
for a local coordinate system are worked out for various nodes. This is achieved by employing
the overlap graph created from relayed data of overlapping clusters. The second of this phases
may be referred to as the cluster optimization phase (Rouhiainen 25). This is normally achieved
by employing numerical optimization. The third and final phase is referred to as the cluster
transformation phase. Here, nodes work out a transformation between the local coordinate
system of linked clusters. The transformation works out the rotation, translation and probable
reflection that most effectively aligns the nodes of a pair of local coordinate systems
(Rouhiainen 25).
CONCLUSIONS
From examining various literature and research, it may be concluded that the applications of
Internet of Things are yet to grow in range. It has been projected that in future, the use of IoT,
particularly Wireless Sensor Network technology will have a hold in many sectors of industry.
Unfortunately, there are many challenges that come with the application of such technologies,
most prominently, security problems. Nonetheless, researchers have been working extra hard
to come up with practicable solutions to such problems, some of which have been discussed in
this paper (Miorandi et al. 1508). The future is bright for WSN technology and any other branch
of IoT.
Surname 5
Works Cited
Abie, Habtamu, and Ilangko Balasingham. "Risk-based adaptive security for smart IoT in
eHealth." Proceedings of the 7th International Conference on Body Area Networks. ICST
(Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering),
2012.
Abuzneid, Abdel-shakour, Tarek Sobh, and Miad Faezipour. "An enhanced communication
protocol for anonymity and location privacy in WSN."Proceedings of the IEEE Wireless
Communications and Networking Conference, New Orleans, LA, USA, country. Vol. 912. 2015.
Gudymenko, Ivan, Katrin Borcea-Pfitzmann, and Katja Tietze. "Privacy implications of the
Internet of Things." Constructing Ambient Intelligence. Springer Berlin Heidelberg, 2012.
280-286.
Jain, Deeksha, P. Venkata Krishna, and Vankadara Saritha. "A Study on Internet of Things
based Applications." arXiv preprint arXiv:1206.3891(2012).
Jing, Qi, et al. "Security of the Internet of Things: perspectives and challenges." Wireless
Networks 20.8 (2014): 2481-2501.
Kozlov, Denis, Jari Veijalainen, and Yasir Ali. "Security and privacy threats in IoT
architectures." Proceedings of the 7th International Conference on Body Area Networks. ICST
(Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering),
2012.
Miorandi, Daniele, et al. "Internet of things: Vision, applications and research challenges." Ad
Hoc Networks 10.7 (2012): 1497-1516.
Mohammed, Farah Hussein, and Roslan Esmail. "Survey on IoT Services: Classifications and
Applications."
Polk, Tim, and Sean Turner. "Security challenges for the internet of things."Workshop on
Interconnecting Smart Objects with the Internet, Prague. 2011.
Rouhiainen, Aki. "Internet of Things Security Survey: Solutions, Standards and Open Issues."
(2014).

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.