kjvwbvjks

Table of Contents

ISOL 532Telecommunications and Network SecurityResearch Project Submitted toDr. Constance Blanson, ProfessorUniversity of the Cumberlands03/02/2019Submitted by Group 4: Ajay Kumar Nimmagadda Mohan Madadi Sai Vineet Poddila Siddhartha Reddy Sarasani Sharath Kumar Reddy Kuchur Sowmya Tiruchengode Yegyanarayanan Table of ContentsABSTRACT 3INTRODUCTION 4FUTURE PREDICTIONS 4Usage of Blockchain technology in Cryptocurrency……………………………………..4Smart Refrigerator technology……………………………………………………………..5Remote Health Monitoring systems………………………………………………………..6GOOD VS CRIMINAL 6SOCIAL, POLITICAL AND LEGAL ISSUES 7CONCLUSION 8REFERENCES 9 ABSTRACT Today, we are living in a dynamic world of fast moving, growing and evolving next-gen technology which is integrating and embedding itself to become a part of our routine lives. IoT (Internet of Things) is one such futuristic technology which aims to simplify and structure our daily tasks by streamlining complex processes and offering better control. IoT has the potential to create a new era of amazing computing technologies to better the quality of our tedious lives, beyond human imagination. IoT, in technical terms can be defined as the healthy interaction between smart machines and the surrounding appliances, environment, and other digitized data stores to deliver valuable data to the seeker. Also, it has the ability to gathers data, perform analysis and execute user requests/ commands to complete the desired tasks. In this research paper, our primary focus is to elaborate on the smart applications of IoT and the future predictions, especially in specific domains related to Blockchain technology and Fog computing, which helps in validation and verification of online transactions to prevent spoofing and cyber theft.  INTRODUCTION The Internet of Things (IoT), also widely known as the Industrial Internet, is a globally developing technology paradigm which facilitates physical interactions between all those ‘things’ connected via internet. With the exponential development in science and technology with increasing human needs, IoT predicts and promises a future in which digital and physical objects can establish a relationship, leveraging the right kinds of information sources and communication techniques, to offer sophisticated applications and services. The genuine value of this technology can be completely realized, when devices connected to the internet are able to communicate amongst each other and also with the support systems like business intelligence, customer support, inventory management, logistics, data analytics, etc., depending on the ultimate purpose. FUTURE PREDICTIONSUsage of Blockchain technology in CryptocurrencyBlockchain is a secure and decentralized database system created by continuously accumulating and ever-growing data sets. It exploits complex cryptographic algorithms to make it almost impossible to cause consumer data misuse or damage. Several technologists believe that blockchain is the missing golden link in the widespread usage of IoT in order to fulfill the prevailing network security and privacy concerns. It works on the factor of trust where all participating parties must reach consensus to finalize transactions involving cryptocurrency. The graphic below, demonstrates how the blockchain can be used in cryptocurrency. Smart Refrigerator technologyWith upcoming modular kitchen technologies, smart refrigerators play an important role in efficiently storing and preserving food for the family. Integrating smart appliances as such with IoT redefines even the benchmark expectations of a smart refrigerator. One can benefit greatly with the IoT enhanced smart appliance by monitoring their inventory, setting thresholds, creating grocery checklist, checking the expiry of the perishable foods, and even proposing possible recipes based on your refrigerator current produce stock. Moreover, prediction algorithms may be employed for sending suggestions regarding availability of seasonal fruits and vegetables in the usual shopping locations. Remote Health Monitoring systemsAs we all know technological advancement in medicine can’t stop a life from staying or passing, but just delay the process. With IoT, healthcare can be made much easier and accessible even for remote users. Integrating healthcare monitoring systems with IoT can provide unparallel benefits which would significantly improve the quality of diagnosis and effectiveness of the treatment recommended to the patient in need. Real-time monitoring and healthcare mobility solutions when connected to our mobile phones or other smart devices can provide life-saving assistance by sharing irregular body stats and pulse rate consistently with the primary healthcare physician in case of immediate need of attention. One can even expand this scope of remote monitoring especially in older people, using neuro-sensors to monitor the physical and mental activity by integrating artificial intelligence technologies. For example, an AI robot can play the role of a nurse or a family member to take care of the older people in need of companionship or medical help by interpreting their thoughts and movements based on the neural activity signals transmitted via integrated IoT device employed. GOOD VS CRIMINALAlthough IoT possesses the inherent potential to make all our lives easy, it can also inadvertently invite the risks associated with unsecured network into our homes, industries and social communities. As we very well know, any device connected to a public network or cloud servers is commonly prone to cyber threats and attacks. But, when that device is integrated with IoT, the impact eventually gets magnified with the compromise of sensitive personal and/or professional data. Several research studies suggest that smart IoT devices like health monitoring systems, smart home, and logistics systems, can easily be hacked to misuse PHI and PII data to potentially endanger the safety and well-being of the respective owners. In today’s automated world, where people enjoy the comfort of getting things done in a single touch or exploiting AI technologies, IoT capable machines can possibly even result in loss of jobs by eliminating the need for manual labor, especially impacting the under-educated workers. ATM, vending and automated checkout machines are wonderful examples of this. SOCIAL, POLITICAL AND LEGAL ISSUESAfter the birth of IoT, we can clearly observe that the political campaign patterns have tremendously changed to adapt and suit the dynamic cultural diversity. The legacy surveys, polling and door-to-door campaigns have been replaced by social media interactions and analysis of characteristic traits and beliefs with the help of sensors built into this marvelous technology. Barack Obama was one of the early politicians to exploit data gathered and analyzed by his team during his 2008 presidential campaign to target his campaign messages and promises towards the right kind of audience, thereby making IoT, a powerful political tool. But on the flip side, this smart technology can also mislead people’s decision by masking the truth. As we know, no technology is perfect. Data breaches are possible in several IoT devices, which can implicate legal complications like compliance and copyright issues, especially at a corporate level. Further, during the event of such an issue, the copyright law allows only the proprietary owners to assume control of their product and imposes liability on those who bypass the process established by the copyright owner.CONCLUSIONThe phenomenal concept called Internet of Things allows the virtual world of information technology to connect with the real world of physical things. Interesting discoveries like RFID, micro-chip, Sensor technologies, etc. make our life less complicated and more convenient. Also, the future of IoT is virtually unlimited due to ever changing human need, rapid growth in technology to match the pace and consumer’s desire and willingness to integrate their personal and work devices such as smart phones, tables and laptops with household machines and miscellaneous appliances. Understanding the fact that any new technology comes with its own fair share of benefits and limitations and with so much data traveling from one device to another, one must understand that it is vital to reinforce concepts of network security using reliable techniques like blockchain and cipher/encryption to protect sensitive data.  REFERENCES[1] Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad hoc networks, 10(7), 1497-1516.[2] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.[3] Retrieved from https://www.mouser.com/applications/iot-reality/[4] Hassan, Q. F. (Ed.). (2018). Internet of Things a to Z: Technologies and Applications. John Wiley & Sons.[5] Retrieved from http://blog.gridconnect.com/blog/general/the-internet-of-things-is-transforming-the-political-landscape[6] Ovidiu Vermesan, P. F. (2013). Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems. River Publishers.[7] Retrieved from https://www.bbvaopenmind.com/en/technology/digital-world/10-predictions-for-the-future-of-iot/[8] Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.[9] Babedi Betty Letswamotse, R. M.-Y. (2018). Software Defined Wireless Sensor Networks (SDWSN): A Review on Efficient Resources, Applications and Technologies. Journal of Internet Technology, 6-10.[10] Watts, S. (2016). The Internet of Things (IoT): Applications, Technology, and Privacy Issues. Nova Science Publishers, Incorporated. [11] Retrieved from https://www.linkedin.com/pulse/securing-internet-things-iot-blockchain-ahmed-banafa?utm_source=datafloq&utm_medium=ref&utm_ campaign=datafloq&trk=mp-author-card[12] Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787-2805.[13] Retrieved from https://www.peerbits.com/blog/internet-of-things-healthcare-applications-benefits-and-challenges.html