Students
Teachers
Graduates
Faculties
JThe concept (Internet of Things) is the new, advanced and growing generation in the Internet that increases the capacity of physical things (various tools and devices that are characterized by a dedicated IP address It) connects to the Internet and organizes the process of understanding between physical objects that are interconnected with each other and connected via the Internet Protocol.
In recent years, the Internet of Things has received great attention in the research and academic community, especially after the tremendous industrial development in manufacturing and development "Things – Things" which have the ability to "identify themselves within the network" and the ability to "communicate via the Internet" and the ability to "interact with other things connected to the Internet." strong>
This communication between smart devices is called communications (M2M Machine To Machine), which intelligently connects humans and devices throughout the network.< /p>
Reports issued by leading companies in the field of information technology indicate that the number of these “things” will reach approximately 50 billion things connected and interacting on the Internet in 2020, making the Internet a network of these heterogeneous things. And interacting with each other on the one hand and with humans on the other hand, and from this standpoint, the scientist Kevin Ashton coined the term “Internet of Things - Internet of Things - IoT” in 1999, or what we began to call today the term “Network of Everything - Internet of Things.” Everythings – IoE” too. They all aim to create a better environment for human life.
"Things" represents any electronic device that can be identified on the Internet by assigning an IPv6 Internet address to it. Today, it has become possible to connect things that We use it in our daily lives via the Internet, such as the car, washing machine, refrigerator, alarm clock, television, garage door, sensors, sensors, and others. It is also possible for a person himself to become something if he or those around him are assigned a specific Internet address, such as assigning an Internet address to his glasses, watch, bracelet, clothing, or medical devices or equipment on or inside his body.
The things that can be connected to networks expand to include animal collars (on breeding farms, reserves, and at sea), and even trees, forest elements, and the list goes on to include everything else.
Many IT companies today are working on developing integrated support environments Integrated Support Environment to enable things to be able to connect to the Internet of Things network.
“Things” can be connected to the Internet through the use of one of the modern technologies for connecting to networks, such as Bluetooth technology, ZigBee technology, Wifi, 4G technology or other, and the radical transformation that these technologies have brought about in building wireless sensor networks (Wireless Sensor Networks - WSNs< /span> )which supports the operation of the Internet of Things network.
Simply put, all companies and institutions in the world today must prepare to receive the Internet of Things as an inevitable solution and part of their infrastructure by working on
All institutions today face two choices: Either adopt the Internet of Things and allocate budgets and competencies to adopt it from now on, or lose in the rapidly changing and evolving labor market. There is no way to survive in tomorrow's world without investing in the Internet of Things. Examples of this include:
Networks are the foundation: The fifty billion things that will be connected to each other in 2020 will produce billions upon billions of gigabytes of data. How will they be dealt with and how will they be exchanged to improve From making decisions and interacting between people to improve their lives and businesses?
The answer to all of this is by using the computer networks that we currently use, but on a much larger scale, as networks will be the basis and basis on which the Internet of Things will be based.
So Internet of Things is a combination of different types of smart devices that can communicate with each other, By sending and receiving data without human intervention, using several technologies, including: Wireless Sensor Network (WSN), Radio Frequency Identifier (RFID), through the infrastructure of physical and sensory networks.
Security issues related to Internet of Things technologies:
The process of exchanging data between smart devices may affect the privacy of individuals, and may also affect other sensitive issues related to security and protection. From a technological standpoint in general, and to the security of users and their personal information in particular, these issues include:
Failure to properly monitor devices containing sensors, as well as intentional interference; Which some people do with the aim of disrupting the communication systems between these smart devices illegally and for the motives of sabotage and tampering, as well as studying the threats to which the Internet of Things (IoT) is exposed, as well as the mechanisms and techniques used to cause a defect and searching for loopholes in the layers of the Internet of Things (IoT), The infrastructure and file records in the Internet of Things (IoT) will also be studied
Often We deal with the security and protection of information as something that exists alone. We do not take it into account during the planning stage of building the network infrastructure, whether wired or Wireless, but we start thinking about it after completing the planning stage, and we usually place an external firewall to protect the entire internal network; Whether the software is loaded on a server device, or as a separate, tangible piece of hardware, this method gives good performance and efficiency, but sometimes it is considered a weak point in the protection system, as all devices of different types within a single network must be protected by themselves in order to obtain a protection system. It works very efficiently and with a high degree of security. Otherwise, the system will be vulnerable to hacking and available to any external attack.
A. Disabling the network by illegal means: As is the case with WSN, the most common attacks here are network denial attacks, which prevent the identification cards from doing their job, as the EPC inside them is no longer able to give the tag reader correct information about the network. Its unique global code, which gave attackers the opportunity to access and manipulate these identification cards remotely.
B. Unlawful cloning: Attackers will clone the electronic product code (EPC) and perform fraud to bypass security measures through it, by passing through the card reader as one of the trusted terminals within the network. This is similar to forging a person’s passport and traveling using it, and all of this happens in If these attackers gain access to the ID cards illegally.
C. Unlawful tracking: Attackers can track the identification cards of some customers, due to the need for the customer to give some of his confidential information, such as his residential address and etc.Show it to some concerned parties, and this may lead to a violation of the customer’s privacy if attackers are able to obtain such information.
Dr. Illegal reuse replay attacks: Here, attackers intercept and record information during the communication process between the ID card and the card reader, and then the attackers reuse the information they recorded with the card reader at a later time.
Most people are concerned about disclosing their personal information, and they have many concerns, such as what type of data will be collected about them, who will collect this data, what is the purpose behind it, and what technologies are used to collect it and to Where will this data be sent?
To answer all these questions and to make users feel comfortable that their data will be transmitted in a secure manner between sensitive sensors from User A to User B, in this case it must be ensured that there is a reliable sensor in the perception layer, and a secure data path between Two nodes - two end devices.
The data carried by the sensor must be attached to the correct user according to the identity of the sensor or gateway device for that user. In addition, the gateway must implement some algorithms to encrypt the data, because most sensors do not have the ability to encrypt data. . Therefore, the data must be encrypted during the transmission process to ensure the integrity of the data, and finally, it must be ensured that the only people who can access the data are those who are authorized to do so and who obtain this authority through the application that stores this data.
Since the beginning of the computing revolution, the most important issue has been data management and maintaining its security, which requires a lot of storage space to deal with a large number of communication devices on the Internet. This number of devices reached billions in a short time after the emergence of the Internet of Things, which makes it very difficult to provide storage space for all of these devices, because they need to communicate with each other directly and without human intervention and thus require a higher storage space.
Hence the need for log files has become a high priority, which helps to correct and monitor the system, so that the task has become more difficult to provide more storage space, a higher level of security, and maintain the integrity of these records. As we mentioned earlier, technology is growing rapidly and requires more storage space for communication devices, which leads to the need for more new hardware specifications, especially in cache - secondary memory, where file history is stored. It is also known that file logs are very useful in intrusion detection system, reviewing system performance, correcting errors and help in making decisions based on log history. One of the additions that the Internet of Things has added is the production and storage of records in real time for easy retrieval of file records. Categorizing file records in order to get rid of all irrelevant records is a way to maintain adequate records and storage space. This makes the troubleshooting process easier for developers and researchers. Some of the popular file log tools are TIBCO, Loggly, WhatsUpGold, Splunk, etc.
The communication method was built through prepared software platforms, as these platforms receive requests from devices via the Internet or an internal network connecting these devices to each other and deal with them, and the data that is collected is also relied upon to facilitate decision-making processes.
Health: Intel has provided an integrated software platform, (Health Application Platform) (HAP), to facilitate the process of collecting medical data to send it to the doctors following the case or the hospitals concerned to analyze it and provide a diagnosis or service. Medical follow-up without the patient having to leave home. As for people who suffer from heart disease, the (AliveCor) service can be used to detect irregular heartbeats.
Smart Home: It is the development of homes capable of performing many smart tasks by relying on sensors. For example, you find some currently existing applications for homes in which the room lights up only if you enter it or say a specific word, and there are also Homes where devices communicate based on commands set by the manufacturer.
Smart watches: such as Apple watches and Samsung smart watches, but placing these devices on this list means that there are those working to make these watches capable of carrying out some tasks automatically without human intervention.
Smart city networks: Internet of Things technology will enable the development of electrical and water networks, as well as traffic regulation networks in smart cities, so that they are able to report damages automatically and operate them at the highest efficiency.
Smart cars: help to report any damage, or to reportFor any accident immediately after it occurs.
Finally We can say that the companies that will adopt Internet of Things technologies will have a chance to withstand the challenges
The market is larger than the companies that will not adopt these Technology, and in return, can develop and create many services that aim to create a better environment for human life by employing the Internet of Things network, to the extent that human ability to create and innovate, which requires the participation of systems integration bodies as well as the information and communications technology sector.
Dean of the College
Dr. Muhammad Ibrahim Al-Muhammad
Students
Teachers
Graduates
Faculties