Internet of Things (IoT)
Abstract
Devices, systems and people get connected to IoT daily and therefore, become exposed to dangers and risks. Security cases are regularly reported and expert's fear that the control of the situation will be lost. However, the evolution of technology is on its toes to facilitate internet of things and solve security problems. In this research proposal, internet of things (IoT) usage in home security is explored, scrutinized and plans for the security issue mitigations bestowed based on the current research.
This research is being looked at interviews with engineers and IT security experts.
Introduction
Internet of things is modern paradigm common in research and organizations. The key idea or the internet is to offer timeless communication services through a connection of RFID systems, mobile phones, sensors among others. IOT allows sensing of gadgets that are remotely connected to an existing network and therefore providing a right use of the real world into a technological world. This has led to accuracy, efficiency, improved, economy and security. However, this research paper analyzes the fundamental techniques of IoT to solve problems on home security.
Purpose
How can one reap benefits of IoT without being involved into risks? Due to the rise of IoT, security should be taken into consideration. The goal of this research proposal is to explore and scrutinize the usage of the IOT in home security and proposals for the safety problem mitigations made based on the current research.
Literature review
People lose their precious lives due to weak walls and roofing in local areas (villages) due to excess moisture. Internet of things (IOT) is accountable for sensory systems. Sensors can be used to determine the lifespan of the structure and for how long it will be safe to live. Sensors should be installed in the buildings to detect smoke in case of fire outbreak. At this stage, automated water will sprinkle endlessly and effectively to avoid damage and losses. The national energy grid is required to supply the electricity in the villages. These automatic sensors are expected to turn off all the electrical appliances when they are not in use (KRANZ, 2017). Also, automated keypads, locks and security alert gadgets should be developed in rural areas to improve security. Research methodology The aim of this proposal is theoretical, and therefore, no exams have been conducted. However, a lot of research has been done through internet, books, and journals as well as theorizing diverse data to finalize the proposal. This method was selected since it provides both logical and natural structure of the research project. Additionally, interviews were conducted with IT experts and construction engineers to find a broader and realistic discernment of the existing situation (GREENGARD, 2015). Interview sessions have been cited and printed and are open to all the readers. Research problem Just like any other student, a Ph.D. student will be faced with challenges when making a research proposal.
The problems encountered includes:
1. Choice of the correct topic
The topic is crucial and should be chosen carefully. One can do nothing if the topic is not figured out correctly. I was challenged while developing, reading and finding the theoretical basis to support the topic.
2. Choosing the correct methodology
After choosing the topic, a methodology was required to move to the next step. I was forced to formulate the question wisely which was not a simple task. I had to use the answers to give me the guidance along the proposal. I also use a lot of time to complete this plan.
3. Getting study participants
Finding a team to work with can be very challenging and demoting. I choose to work with the university chairman, but he was not available. It was a challenge to find a team who would help me to conduct the study.
4. Sorting data
This is the final problem that I faced. The problem here is distinguishing which data collected makes sense and which does not. I was forced to go back to methodology, employ technology, and listen to data gathered.
References
CHAOUCHI H. (2013). The Internet of Things: Connecting Objects. London, Wiley. http://public.eblib.com/choice/publicfullrecord.aspx?p=1124652.
EVDOKIMOV, S. FABIAN B. & GUNTHER O. (2011). RFID and the Internet of Things: Technology, Applications, and Security Challenges. Hanover, Now Publ.
GENG, H. (2016). Internet of Things and Data Analytics Handbook. [Place of publication not identified], John Wiley & Sons.
GREENGARD, S. (2015). The internet of things.
KOCOVIC P. BEHRINGER R. RAMACHANDRAN, M & MIHAJLOVIC, R. (2017). Emerging trends and applications of the Internet of things. http://services.igiglobal.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-2437-3
KRANZ M. (2017). Building the internet of things: implement new business models, disrupt competitors, and transform your industry.
MCEWEN A. & CASSIMALLY, H. (2014). Designing the Internet of things. Chichester, West Sussex, United Kingdom, Wiley.
MUKHOPADHYAY S. C. (2014). Internet of Things Challenges and Opportunities. Cham, Imprint: Springer.
UCKELMANN D. HARRISON M. & MICHAHELLES F. (2011). Architecting the Internet of Things. Berlin, Springer. http://public.eblib.com/choice/publicfullrecord.aspx?p=763242.
Internet of Things (IoT). (2019, Oct 26). Retrieved from https://papersowl.com/examples/internet-of-things-iot/