Abstract
Internet of Things is the web of physical devices acquired through the Internet. These devices contain entrenched technology to connect with both internal environment or the external status. Internets of Things (IoT) devices are directly becoming ubiquitous while IoT services are becoming global. Cyber-intruders are not unique to IoT, but as it will be deeply merged in our lives and humankind, it is becoming essential to step up and take cyber protection seriously. With increasing use of it in diverse fields has improved the demands of various parameters, for an excessive degree of security and applications. In this paper, we have compared the variance in security features of new technology like Low-Power Wide Area (LPWA) network technologies: LoRaWAN and NB-IoT. The security features of every technology are specified in a comparison to demonstrate that security won't be the determining aspect while choosing on a LPWA technology. We describe the exceptional contributions that every characteristic makes the general security of a device and emphasize how the security functions may not or might be appropriate in our option of a LPWA technology, based on the designed use case. We consider whether the security functions of each technology are appropriate for a fixed of use cases representing standard deployments for every technology. Based on an assessment of an appropriate feature, we have calculated the performance of the security in each technology and the each use instances. After identifying the security problems in IoTs, this paper suggest answers from present technologies as a start line for establishing a standardized security paradigm in IoTs.
Highlights
The phrase Internet of Things (IOT) has acquired enormous fame with the eruption of wireless sensor networks, home automation devices, wearable electronics and smart meters
In when we review at all the technologies in terms of network investment, uplink and downlink traffic, coverage scenario and network reliability, so obviously we recognize that NB-IOT is the best appropriate technology
The most obvious choice is IP and, where it is used, it can be an enabler for implementation of well-tried and trusted standard security protocols, such as TLS, above the network layer; there is some potential downside as the use of IP may create an attack surface for Internet-borne threats such as botnets, if the device is usable from the social Internet
Summary
The phrase Internet of Things (IOT) has acquired enormous fame with the eruption of wireless sensor networks, home automation devices, wearable electronics and smart meters. Selva Kumar: Improvement of Security in IOT Sensor Network to Overcome Harmful Intruder by Optimizing the Existing Techniques. Technologies under Consideration The illustrated idiosyncratic of a LPWA network is the network which supports devices even at low power in both conditions like transmission power and processing power periodically, there is an objective of a battery span of 10 years or greater. This is generally coupled with a goal of minimizing cost, in the recognize of the wireless module in the deep run devices. The time period NB-IoT encompasses the use of this generation in the LTE bands and includes use of the identical protocols in different, licensed radio spectrum outside the usual LTE bands
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Sensors and Sensor Networks
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.