Вы находитесь на странице: 1из 7

Database Management : Internet of

Things (IoT)
Putera Al-Amin Shah Bin Ulul Azmi, Faculty of Computer Science and Information
Technology,Universiti Tun Hussein Onn Malaysia,
ai180125@uthm.edu.my

Abstract

Database Management is a systematic system that allows us to store, organize, and retrieve data. There is a
different type of data that will be part of the Internet of Things. In particular, we consider the areas of querying, indexing,
process modelling, transaction handling, and integration of systems. Internet of Things is a kind of “universal global neural
network” in the cloud which associates different gadgets. The Internet of Things is a cleverly associated gadgets and
frameworks that be comprised of smart machines interfacing and interacting with different machines, conditions, items, and
foundations, and the Radio Frequency Identification (RFID) and sensor network technologies will go up to address this new
difficulty. Therefore, an extremely huge in size information are being produced, put away, and that information is being
prepared into helpful activities that can give command and control the things or gadgets to make our lives a lot simpler and
more secure and to lessen our effect on the environment. The objective of this research is to improve database management
in the Internet of Things (IoT).

Keywords – Database management, Internet of Thing, IoT, Data type

1. Introduction
The Internet of Things (IoT) in simple way is to describe is communicate or controlling some device via
internet. The IoT is communicate using the internet and related to Radio-frequency identification (RFID) tagged
an object. More than billions of gadgets, for example tablets, smartphones and vehicles are using the Internet
and apply the concept of database management and Internet of Things (IoT). Certainly, the more gadgets were
created with the Web, the greater dependency for Internet of Things. In a short moment, a huge amount data will
be generated automatically. The number of device are connected to the internet are grow really fast and was
predicted by the year 2020 the number of devices that connected to internet can be more than 50 billion.
Nowadays, people build up their businesses only using the mobile broadband, connectivity and networking. The
primary catalyst of the internet access are the cheap price of communication modules, sensors and technology
devices. When there is too much user doing the Internet-search, the data will be captured by sensors and that
what we can the “Big Data”.
“Big Data” is data that is so large, fast or complex. When the data are too many, it’s hard to manipulate using
usual methods. Accessing and storing a big value of information for analytics has been around a long time.
When involving a large amount of data, the database management should be in notch top level so the accessing
and storing process will be easier. However, Internet of Things (IoT) are using internet to communicate and
keep data which are not secure and hard to organize.
There are a lot of method to maintain and keep the security and performance of a database by using a suitable
architectures, techniques, and tools. Each of architectures, techniques, and tools has different cons and pros.
Also, a topology can effect the database. Database security is a wide and complex topics such as statistical
database security , intrusion detection and privacy preserving data mining. By using a right component, we can
build a secure database for the Internet of Thing (IoT).

2. Types of Data in the Internet of Things

Internet of Thing (IoT) can be separate into a few categories. The data that have been collected can be
discrete, continuous, generated automatically and being input by user. For Internet of Thing, the data is being
categorizes into :

2.1 The RFID (Radio Frequency Identification)


Radio Frequency Identification are using radio waves to identification, tracking and transmit and receive
information. The RFID was created in 1948 as a weapon in World War II. The RFID was used in daily life in
1990 where almost all company try to put the RFID in their product. The tag of RFID is involve combined
circuit that can collect information and receive and transmit signals using an antenna. RFID reader radiate a
radio waves to activate the tag. The reader communicates wirelessly with the tag. When tag was activated, the
reader will receive any information that related from the tag memory store. There is two type of RFID tag that is
active and passive. Active RFID tags have a battery and automatically operate on its own while passive RFID
tags will operate only when RFID reader send a radio wave to them. The example of RFID is passports and road
tolling and stock control.

2.2 Addresses/Unique Identifiers

IoT object are exclusively recognized using an IP addresses. When number of IoT device are increasing days
by days, the Internet Protocol version 6 (IPv6) was created to replace and support other device that recently
using Internet Protocol version 4 (IPv4). IPv4 is suffering IP address depletion, IPv4 addresses now are not
capable to support a lot more device. This reduction is a big crisis to the world of Internet just when Its starting
to grow. As a solution, the Internet Protocol named IPv6 was created. The IPv6 uses a 128-bit address while
IPv4 uses only 32 bits which more larger on IPv6. But IPv6 being used widely yet because IPv4 are still not
reach its limit.

2.3 Objects, processes and systems descriptive data

A great part of the intensity of the IoT will originate from the data or metadata that will be recorded on the
taking an interest object, processes, and systems. Metadata is data fundamental to empower clients to discover
and get to the suitable information. We can recognize data and metadata by the accompanying model. We
differentiate data by using its object for example dog, red or single, while metadata is by its type like colour,
name and gender. Different kinds of metadata might be recorded in an arranged or specially appointed way, for
example, provenance data on why information was caught, who caught it and when. It tends to be seen that there
are different kinds of data and metadata about articles that can be conveniently recorded. Indeed, in one system
a bit of data may be viewed as data and in another system the same bit of data may be viewed as metadata. The
differentiation isn't in every case clear and doesn't generally should be. Contribution of such information, at first
by people, is probably going to be a very work serious assignment. There are look into inquiries on how the
information will be put away, spoke to, and approved, to guarantee greatest proficiency and non-revocation in
its recovery and update.

2.4 Positional data and Pervasive Environmental Data

Positional data gives the area of a specific labelled item either inside a GPS or inside a local positioning
system. GPS is global positioning system that actualized with different satellites radiating signs to a controlling
unit from which objects can discover their location through triangulation. Local positioning systems work
likewise, with minor inclusion. Instances of local technology are cell base stations, Wi-Fi passageways, and TV
towers. Local positioning systems can be utilized in a joint effort with GPS. They can be utilized inside
structures. For example, a room in a house, positional data can emerge out of privately positioned sensors and
transmitters. Different sensors impart signs to a smart object, which would then be able to work out its area or
the area of a teaming up object. Positional data will have a significant role in the IoT given that its parts might
be static or portable. Another kind of data that will be a piece of the new Internet will be unavoidable area data.
This is data about every condition that is unpretentiously accessible, which will upgrade and bolster our
communications with our environmental factors.

2.5 Sensor Data (Multidimensional Time Series Data)

One of the courses by which information enters the IoT is through remote sensor systems. Advances in
hardware have made it moderately simple to set up remote sensor systems for checking a wide range of
ecological wonders, for instance, climate, temperature, and voice. The Zigbee Alliance has created principles to
help the setting up of Wireless Sensor Networks. Different fascinating angles rise up out of this innovation.
Choices should be made on how habitually the information ought to be caught. For example, constantly at
ordinary intervals or just when questioned. Questions emerge on how we guarantee we get a representative
sample in an effective way and the amount of the information catch we should document. Sensors innovation
have made it able to catch huge measures of data rapidly, yet questioning and mining these can be tricky,
especially when its must be accomplished in real-time.
2.6 Historical Data

Petabytes and a greater amount of the information will be caught by sensors in the IoT. The data becomes
historical as time never stop moving. Volume turns into a problem. Application-oriented design decisions
should be made on how the data ought to be held and which data ought to be held. Some will be kept in dynamic
data distribution centres to easily retrieve, and some might be required less often should be archive in less
accessible place. In other case, the time should be caught nearby the data alongside area information,
possession, and technique for catch.

2.7 Physics Models - Models that are Templates for Reality

Physics models should be defined so its accessible and utilized in calculations by the uses of the IoT. Physics
Models are formats for the real world, for example gravity, power and light. Physics models are in boundless
use in the games and PC. Their addition into the IoT will enhance its functionality

2.8 State of Actuators and Command Data for Control

The IoT will be utilized to control remote gadgets. In this way there is a need to have a report of the present
condition of the actuators of the gadgets. The condition of actuators will be a fascinating test, especially the
actual time of the result data a portion of the important applications. A part of data getting into IoT will be able
to manipulate the device because it will act as a command data. For example, one may be suddenly showing up
home in a period of 30 minutes and wish to turn on the air-con for our appearance. This can be done by using
the Internet and also a proper interface. Clients should control gadgets in the IoT and will require a language for
doing this.

3. Database Issues in the Internet of Things

In this section, there some weakness in database that need to point out especially in data management where
some of the Iot device are still using the traditional database.
3.1 Security
Security of the IoT is the top priority in its products and services. Since IoT are using the Internet to receive and
send data, Its are not be surprise if it can have a security problem. The seller of the IoT devices lack sometimes
are greedy with money so they sell an IoT device without perfect security that can ensure them that they will not
being attacked by the hackers. Beside, almost all of data collected by IoT devices are usually are store in the
cloud. More than 100 million can be obtain by attacking a single cloud.
Frequently you catch wind of cyber assaults in the news. These cyber-attacks regularly hijacking gadgets or
device, which have practically zero security to direct DDoS (Distributed Denial of Service) attack against
whatever objectives the digital hijacker wish to attack, regardless of whether it's governments or an
organizations.
In the Era of IoT, it's crucial to search out merchants who follow best practices and apply structure of security
into IoT gadgets.
3.2 ZigBee technology
The ZigBee technology carry a significant job in the development of Wireless sensor network (WSN) arrange
due to focal points, for example, minimal cost, high unwavering quality, not too complex and multiple function
in the IoT condition. The upsides of this innovation are the self-governance, adaptability, versatility and
minimal effort of the gadgets. However, countless security threats are aligned against certain information
transmission technology.
A part of the known security threats is the unapproved traffic gathering, decoding the packet and data control.
The unapproved access to a sensor hub inside a ZigBee offers access to the mystery key of the network and in
this way the traffic inside the system. Notwithstanding known dangers, new dangers show up, for example, the
damage of terminal gadgets in the ZigBee.
3.3 Malware attack
In 2016, the biggest malware case have occur involving the IoT which giving a bad effect to the Internet. This
malware case is called MIRAI

. Figure 1
The attacker is attacking the DSN provider by using a humongous distributed denial-of-service
(DDoS). Until now the malware is still updating itself to keep its distribution efforts. MIRAI Linux-based
internet-of-things evil software which find an unprotected IoT devices force them to become a botnet network
and also to launch DDoS attacks. Its expanse over Telnet.
3.4 Privacy
The maximum capability of the Internet of Things relies upon human techniques in protection over all
possibilities the data flow and client particularity managed by IoT gadgets can open fantastic and exceptional
value to IoT clients, yet worries about privacy and potential damages may detain the Internet of Things. The
meaning of this is privacy rights and respect for client privacy protection desires are fundamental to
guaranteeing so the client will have their trust to the Internet, device and the system.
For sure, the Internet of Things is rethinking the discussion about privacy problem, when the number of
employments can significantly change the manners and the flow in which individual data is gathered, examined,
utilized, and protected. For instance, IoT enhances worries about the potential for expanded surveillance and
tracking, the trouble in having the option to out of specific data compilation, and the quality of accumulating
IoT data flow to paint an accurate digital representation of clients. While these are significant issues, they are
not impossible. So as to recognize the chances, techniques should be created to control user privacy over all
possibilities, as yet keep on the advancement in new innovation and technology. There are many new industries
that join forces with their traditional customary Standards Developing Organizations (SDOs) so they can
improve the evaluate, create, change, or blend gauges and conventions identified with IoT. This incorporates,
for instance, long-standing SDOs, for example, the IETF, ITU, and IEEE.
4 Countermeasures
Basically, different layers of authoritative, specialized and physical controls are utilized to secure hierarchical
resources against danger. This makes a sorted-out barrier that is extraordinary and solid. Responsibility and
backing from senior administration are significant for higher success guarantee and also for security structure.
To bring the IoT into the maximum level 0f security, it’s just needed an extremely consideration from team
project.
4.1 Design proses
Producers and merchants must remember to include security. Into the system. When building the system, we
must prioritize the most fundamental thing such as device manufacture, connectivity, platform, application,
service, security and the privacy. The best system for making sure about IoT is to concentrate on the essentials.
The expert should cooperate to complete this. It is basic for every one of the individuals who partake in creating
IoT to include security highlights during the structure period of their IoT arrangement improvement. The best
endeavours to forestall assaults are combining planning for security, installing firewall highlights to include an
extra layer of resistance, giving encryption abilities and including alter identification capacities. On the off
chance that makers don't completely test their gadgets, client trust and privacy might be in danger. Its really
necessary to ensure that security is running within each component of the device that is running a specific item,
administration or device of Internet of Thing. When building an IoT, sellers ought to consistently utilize great
practice and focus on privacy, trustworthiness and accessibility. The distinction of IoT security contrasted with
conventional IT security is the quantity of gadgets, the objective behind use and the state of being of the
gadgets. Furthermore, the fundamental issue is that IoT gadget producers don't think about their gadgets as PCs.
4.2 Testing
Testing can give confirmation that the gadget and its conventions can adapt to the environment of the IoT by
creating market-acknowledged test specifications. The time that it takes helps to get the maximum limit of a
device and this can assists how the gadgets can work with other IoT objects. Developing security configurability
depend upon testing IoT web interface administration, checking on the flow of network, breaking down the need
of physical plug-in, and evaluating confirmation and connection of gadgets with the cloud and versatile
applications.
4.3 Network security
Network security can be guaranteed by portioning an Iot devices. So does creating IoT security rules that
cooperate, yet in addition guarantee security and protection. Ports that are not in use must be closed down and
shut, as these systems administration ports can open the gadget to extra assault vectors. It is critical to shut down
a needless administration because it can be undetectable and permitting a stranger to use them without worries
and put user in great a danger. It is likewise important to create validation between gadgets with the goal that
only gadgets that registered can trade information. A strong secret key administration device to deal with
various IoT passwords should likewise be set up.
4.4 Encryption
Client information should be fixed and encrypted to stay safe. The whole correspondence channel from the
sensors to the specialist co-ops must be perfectly safe. A few different ways to address the tremendous hole in
security incorporate in guaranteeing privacy by giving scrambled correspondence flow, nail down honesty by
giving encoded information memory and utilizing hash uprightness checkers, giving verification strategies so
the gadgets are interacting with known and registered substances also giving security refreshes for patches and
bug fixes.
4.5 GDPR (General Data Protection Regulation)
Guidelines will demand producers and merchants to focus on security and give rules on the desire from IoT
engineers and makers. IoT guidelines will give a degree of straightforwardness to customers that can mirror the
degree of security of the IoT gadget. It is basic to make a essential lawful system and build up the innovation in
view of security and protection. Guideline will demand makers to update and secure their items. IoT
applications need to have some thought for the EU General Data Protection Regulation (GDPR) because its
presented a general required notice management in case of individual information leak. Information controllers
are mandatory to state the individual information breaks to their administrative specialists less than 72 hours
after that happen and also required to report such breaks to involved people. Information controllers utilizing the
IoT need to guarantee that they are in a situation to distinguish and respond to security penetrates in a way that
agrees to the necessities of the GDPR.
4.5 Update and monitoring
Normal firmware updates and support help secure the origin system and the capacity of the IoT to deal with
essentially all practical activities. It should be conceivable to get updates of the firmware either the OS or the
particular rationale on fixed and portable IoT gadgets. This requires upkeep interfaces to get to the application
runtime condition and the security settings for the applications themselves.
It is essential to have checking frameworks set up when an occasion happens. When the occasion has been
distinguished, a responsive activity must be activated to forestall any malevolent utilization of the gadget. A
back-end application ought to have usefulness set up that can log variations from the norm in the information it
is accepting. Upkeep programming are basic to limiting the effect of any gadget personal time because of
programming bugs or some other potential issues.
Conclusion
To guaranteeing the security, unwavering quality, flexibility, and soundness of Internet applications and
administration is basic to advancing trust and utilization of the Internet. As clients of the Internet, we have to
have a high level of trust that the Internet, its applications, and the gadgets connected to it are sufficiently secure
to do the sorts of work we need to do online according to the hazard resilience related with those work. The
Internet of Things is the same thing and security in IoT is in a general sense connected to the capacity of clients
to confide in their condition. On the off chance that individuals don't accept their associated gadgets and their
data are sensibly secure from abuse or damage, the subsequent disintegration of trust makes a hesitance using
the Internet.
This has worldwide outcomes to electronic business, specialized development, free discourse, and for all
intents and purposes each other part of online task. In fact, guaranteeing security in IoT items and
administrations ought to be viewed as a top need for the part. As we progressively associate gadgets to the
Internet, new chances to misuse potential security vulnerabilities develop. Ineffectively made sure about IoT
gadgets could fill in as section focuses for cyberattack by permitting malevolent people to re-program a gadget
or cause it to breakdown. Ineffectively planned gadgets can open client information to robbery by leaving
information streams deficiently ensured. Coming up short or breaking down gadgets additionally can make
security vulnerabilities.
These issues are similarly as enormous or bigger for the little, modest, and pervasive keen gadgets in the
Internet of Things as they are for the PCs that have customarily been the endpoints of Internet availability.
Serious expense and specialized requirements on IoT gadgets challenge makers to sufficiently plan security
highlights into these gadgets, possibly making security and long haul practicality vulnerabilities more noticeable
than their customary PC partners. Alongside potential security plan inadequacies, the sheer increment in the
number and nature of IoT gadgets could expand the chances of assault.
At the point when combined with the profoundly interconnected nature of IoT gadgets, each ineffectively
made sure about gadget that is associated online possibly influences the security and strength of the Internet
internationally, not simply locally. For instance, an unprotected fridge or TV in the US that is tainted with
malware may send a great many destructive spam messages to beneficiaries overall utilizing the proprietor's
home Wi-Fi Internet connection. To entangle matters, our capacity to work in our day by day task without
utilizing gadgets or frameworks that are Internet-empowered is probably going to diminish in a hyperconnected
world. Actually, it is progressively hard to buy a few gadgets that are not Internet-associated in light of the fact
that specific sellers just make associated items. Maybe we could unplug our Internet-associated TVs on the off
chance that they get traded off in a digital assault. Step by step, we become progressively associated and subject
to IoT gadgets for basic administrations, and we need the gadgets to be secure, while perceiving that no gadget
can be completely secure.

Summary
The Internet of Things is a rising subject of specialized, social, and monetary criticalness. User items, tough
products, vehicles and trucks, modern and utility segments, sensors, and other ordinary item are being joined
with Internet network and amazing information scientific capacities that guarantee to change the manner in
which we work, live, and play.
Projections for the effect of IoT on the Internet and economy are amazing, with some envisioning upwards of
100 billion associated IoT gadgets and a worldwide financial effect of more than $11 trillion by 2025. As the
Internet are spreading around the world, the Iot are following closely from behide. They advance at the same
speed and effected by the same cause.
Nonetheless, the Internet of Things raises critical difficulties that could disrupt the general flow of
understanding its latent capacity benefits. News headlines is all about the hacking of Internet-associated gadgets,
observation concerns, and security fears as of now have caught everyone consideration. Technical challenges
are still present and new challenges, laws and developments are emerging.
We infer that some fascinating database explore aftereffects of late years could demonstrate valuable in creating
the advancements required for data management in the IoT, for example techniques for questioning semi-
organized data, data gushing, testing consistent data, furthermore, data mining. Such methodologies would
should be adjusted to the specific necessities of the IoT. The significant need is finding reasonable strategies for
store data, indexing, accessing, security, and enabling self-description of trillions of data easily and that will be
the best IoT.
This report is intended to help the Internet Society people group explore the Internet of Things considering the
expectations about its guarantees and hazards. The Internet of Things draws in a wide arrangement of thoughts
that are mind boggling and entwined from alternate points of view.
Reference
Antar Shaddad Abdul-Qawy, Pramod P. J E. Magesh, T. Srinivasulu .(2007) . The Internet of Things (IoT): An Overview

Ulf T. Mattsson (2009). Database Encryption - How to Balance Security with Performance

Saleh, S. H., Ismail, R., Ibrahim, Z., & Hussin, N. (2018). Issues, Challenges and Solutions of Big Data in Information
Management: An Overview. International Journal of Academic Research in Business and Social Sciences, 8(12), 1382–
1393.

Ahmed K. Elmagarmid (1998). The Kluwer International Series on Advances In Database Systems.

Mustafa Utku KALAY, (2012) Computer Engineering Department, Yıldız Technical University, 34220, Istanbul, Turkey,
Database System Suggestions For The Internet Of Things (Iot) Systems.

Joshua Cooper, Anne E. James (2009), Challenges for Database Management in the Internet of Things.

Cooper, J. and James, (2013).A Challenges for database management in the internet of things.

Ayyub Ali1 , Dr.Mohammad Mazhar Afzal (2017), Department of Computer Science and Engineering, Glocal University,
Saharanpur, Database Security: Threats and Solutions.

Suwimon Vongsingthong1, Sucha Smanchat (2015), A Review of Data Management in Internet of Things

Sombir, Kamna Solanki (2018) Literature Review On Security Of Iot.

AmathulHadiShakara, Md. TareqHasan, (2017), Solutions of common challenges in IoT.

AmathulHadiShakara, Md. TareqHasan,

NadiaAkter, (2018), Solutions of common challenges in IoT.

Karen Rose, Scott Eldridge, Lyman Chapin, (2015), The Internet Of Things:An Overview

Ali Balapour, Hamid Reza Nikkhah, Rajiv Sabherwal, (2020) Mobile application security: Role of perceived privacy as the
predictor of security perceptions.

Zulaikha Asyiqin Nur Azri, Ishkrizat Taib, Azmahani Sadikin, Sofian Mohd Muhammad Sufyan Amir Paisa, (2018)
Comparative Analysis on Flow over Cylinder between Commercial Code and Open Source Algorithm.

Hany F. Atlam, Robert John Walters, (2018) Internet of Things: State-of-the-art, Challenges, Applications, and Open issues

Вам также может понравиться