Академический Документы
Профессиональный Документы
Культура Документы
Title of research:
“Development and Implementation of Internet-of-Things (IoTs) Security for Wireless
Communication Systems”
Objectives:
To provide an in-depth overview of the security challenges and requirements for
Internet of Things (IoT) and discuss the privacy/security solutions for the internet-
of-things.
To identify the new security design and infrastructure based on the new technical
standards for developing IoTs.
To discover the various applications areas of internet-of-things (IoTs) including
evaluation, monitoring and control of data, enterprise systems and social amenities.
To prove the vitality and relevance of IoTs in wireless communication systems.
To explain how the wireless communication protocols can be well aligned with IoT
to maximize their benefits in terms of performance, scalability, energy efficiency,
and cost effectiveness
To summarize the latest development in wireless communication protocols for IoTs
and how such development can enable other emerging technologies to be further
integrated with IoT and boost its capabilities.
Development and implementation IoTs security will need the potential privacy risks
associated with the entire data set to be put into consideration. The IoT should be
implemented in a lawful, ethical, socially, and politically acceptable way, where legal
challenges, systematic approaches, technical challenges, and business challenges should be
considered.
This research will focus on technically implementing the design of the IoT security
architecture. Security and privacy issues must be addressed throughout the IoT lifecycle
from the initial design to the services running. The main research challenges in IoT scenario
include the data confidentiality, privacy, and trust, as shown in Figure 1 (Di Pietro et al.,
2014; Furnell,2007; Gaur, 2013; Miorandi et al., 2012; Roman et al., 2013; Weber, 2013).
To well illustrate the security requirements in IoT, the four-layer architecture shall be
modelled which includes; sensing layer, network layer, service layer, and application-
interface layer. Each layer shall be able to provide corresponding security controls, such as
access control, device authentication, data integrity and confidentiality in transmission,
availability, and the anti-virus ability. The “Internet-of-Things” covers a huge scope of
industries and applications. An overview of what makes up IoT systems and devices from
sensors and communication protocols to APIs and machine learning includes the following;
Communication
Backbone
Hardware
Protocols
Software
Data Brokers / Cloud Platforms
Machine Learning
Methodologies:
The main purpose of the research work is to improve on the security and privacy issues of
the IoTs for wireless communication systems and to reach a consensus agreement which
will involve the development of a questionnaire survey. The results of the sample groups
will be used to develop the survey which will then be sent out to a large representative
sample group of telecommunication engineers working in the different contexts of
Telecommunication sectors identified.
Participants will be sent an information sheet and consent form giving full details of the
study. Participants will be sent this information by email and asked to bring a signed copy
on the days of the research.
Please read and complete this form carefully. If you are willing to participate in this
study; ring the appropriate responses, sign and date the declaration at the end. If you
do not understand anything and would like more information, please ask.
1. I have had the research satisfactorily explained to me in written form by the
researcher.
YES / NO
Signature: ………………………………………………………
Name (capital letters)…………………………………………..
Date: ……………………………………………………………
Contact details: (include address, email and telephone number)
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………
………………………………………………………………………