Om A Secured Framework for Enhanced and Efficient Communication in IoT Ecosystem
IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT) ecosystem. IoT affords internet connectivity amid various inter related devices. It presents a unique identification and automates data transfer within the network. There are possibilities for severe vulnerabilities for the devices which are allowed with internet connection. Back to back COVID -19 pandemic periods are challenging for various industries related to healthcare, retail, automotive and manufacturing.
However, IoT technology played a very important role in meeting the needs of business and customers. All the industries are evolved as smart because of the arrival of IoT. This integrated Artificial Intelligence technology and big data applied to tackle mass flooding of data in this 21st century. Various IoT devices and data centers are connected together to form IoT as an intelligent network. IoT devices are considered as connected devices which provide data analysis by making use of sensors.
Number of sensors is massive and they rely on power consumption and connectivity. There are possibilities for security and privacy breaches in IoT ecosystem as more amount of confidential and sensitive information is shared. Most of the IoT devices are independent and works with less human intervention. Few IoT devices are built with exclusive authentication-based identification. Primary feature of IoT device is minimal energy consumption which affords data collection and sharing in remote areas.
IoT utilization is increased in AI, cloud computing, big data and smart systems like smart cities, smart offices and smart homes. A typical IoT system is defined with three primary steps which are data collection, data transfer and data analysis. First step is referred as physical layer where sensors and microcontrollers are used for collecting and diffusing data. IoT network components like hub or gateway are utilized for data transfer in second step. In third step, data analysis is implemented by consisting user interface and cloud like back end system. Violation occurrences in any of these three steps will reveal sensitive information of connected IoT devices. Several vulnerable exploitations are implied towards IoT devices because of its poor encryption and authentication system.
Vis mer