NESNELERİN İNTERNETİNİN GETİRDİĞİ YENİLİKLER VE SORUNLARI
Sabah işe gitmek için uyandınız. Sizin kalktığınızı kahve makinası algıladı. Sevdiğiniz şekilde kahvenizi hazırladı. Kahvenizi içerken günlük gazetelere göz attığınızı bilgisayarınız biliyor. İlgili sitelerdeki haberleri derleyip size otomatik olarak sundu. Hatta bir yapay zekâ yazılımı aracılığıyla hangi haberler daha çok ilginizi çekiyorsa bu haberleri öncelikli listesine dâhil etti. İşe gitmek için evden hareket ettiğiniz anda garajdaki arabanız bunu algıladı. Garajın kapısını açıp kendisini çalışır hale getirdi. Arabanıza bindiğinizde, gitmek istediğiniz yol doğrultusunda trafiğinin yoğun olduğunu tespit edip size alternatif yolları sundu. Nesnelerin İnterneti'nin değiştirdiği yeni hayata hoş geldiniz! Bunlar hayal değil, birçoğu bugün kullanımda ve bir kısmı da çok yakın gelecekte kullanabileceğimiz duruma gelecektir. Tüm bunlar “Nesnelerin İnterneti” (IoT - Internet of Things) adı verilen teknolojiler sayesinde mümkün olmaktadır. Bu çalışma hayatımızı çepeçevre kuşatmaya başlayan ve gelecekte de onlarsız yapamayacağımız pek çok uygulamanın kaynağı haline gelen Nesnelerin İnterneti konusuna odaklanmıştır. Bu çalışmada nesnelerin internetinin mevcut durumu, hayatımızdaki önemi, kullanım alanları, üstünlükleri ortaya koyulurken diğer taraftan hızla yayılan ve gelişen IoT sistemlerinin zayıf yönleriyle beraberinde getirdiği ciddi tehlikeler üzerine durulmaktadır. Bu tehlikelerin kaynaklarının iyi tespit edilerek ortaya koyulması çözüm çalışmalarına hız kazandıracaktır. Bu anlamda çalışma, nesnelerin internetinin özellikle güvenlik sorunlarını analiz etmeye ağırlık vermiştir. Uluslararası alanda ayrıntılı bir araştırma sonucunu sunan bu çalışmanın alana önemli bir katkı sağlayacağı düşünülmektedir. Yakın gelecekte güvenli IoT çözümleri, en çok maliyetlerini düşürmek ve yeni pazarlara açılmak isteyen işletmeler tarafından uygulamaya koyulacaktır. Gelişen hücresel ağ teknolojileri ile IoT aygıtları, bireyler ve kurumlar ile iletişimde olabilecekler ve biz de bu sayede onları her yerden, her zaman gözlemleme ve kontrol edebilme imkânına sahip olacağız. Böylece insanoğlu uzun zamandır hayalini kurduğu “Akıllı ve Güvenli Dünya”ya kavuşmuş olacaktır.
INNOVATIONS AND PROBLEMS COMING WITH INTERNET OF THINGS
You woke up in the morning to go to work. The coffee machine sensed you woke up. It prepared the coffee as you like. Your computer knows that you glance the daily newspaper while drinking the cafe. So it compiled the related news and offered them to you automatically. Even it added the news which most attracted your attention into its preferred list through artificial intelligence software. Our car in the garage sensed that you were ready to go work. It opened the garage door and got ready itself for your trip. When you got in your car, it determined the traffic intensity that your route had and it offered different route options to you. You are welcome to new life which has been changed by Internet of Things (IoT). All this is not a dream. Although most of these are in use, some haven't been in use yet but they will be in use soon after. This study focused on IoT which is the resource of many applications which have begun to surround our life and we can’t do without. The current situation of IoT, its importance for our life, its benefits and usage areas were revealed in this study. The study emphasizes the threats that come with the weaknesses of the IoT systems which have developed and spread very quickly. Identifying well the resources of these threats will accelerate solutions works greatly. In this mean, the study concentrates on analyzing the especially security troubles of IoT. It is thought that this study which presents the results of a detailed study in the international area will contribute to the field a lot. In the near future, secure IoT solutions mostly will be put into practice by businesses who want to reduce their production costs and get into new markets. With developing cellular network technologies, IoT devices will be able to be in contact with individuals and organizations and we will always have the opportunity to observe and control them from anywhere thanks to this. Thus, we will have had a "Smart and Secure World" that human beings have dreamed for a long time.
___
- Akaslan, D., Taşkın, S. & Oğuz, Y., The Extensible Analogy for Supporting the Aspects of Smart
Cities: Demander and Supplier, the 5th International Istanbul Smart Grid and Cities
Congress and Fair (ICSG), 20-21 April 2017, Istanbul, Turkey
- Alramadhan M. & Sha K. (2017). An overview of access control mechanisms for in-ternet of things,
in: Proceedings of the 26th International Conference on Computer Communications and
Networks (ICCCN 2017).
- Amin, M. & Bruce,W. (2005). Toward a smart grid: power delivery for the 21st century, IEEE
Power Energ. Mag., 3 (5), 34–41.
- Ashton, K. (2009). That ‘internet of things’ thing. RFiD Journal, 22(7), 97-114.
- Atzori A.L.L. & Morabito, G. (2010). The internet of things: A survey, Comput. Netw, 54 (15) ,
2787–2805.
- Boyer, S. (2009). SCADA: Supervisory Control and Data Acquisition, International Society of
Automation.
- Bozuklu, M. (2016). Çevresel veriler ile gerçek zamanlı nesnelerin interneti uygulaması.
Yayınlanmamış Yüksek Lisans Tezi. Gaziosmanpaşa Üniversitesi.
- D’Orazio, C. & Choo, K.-K.R. A. (2017). technique to circumvent ssl/tls validations on ios devices,
Future Gener. Comput. Syst., 74, 366–374.
- Do, Q., Martini, B. & Choo, K.-K.R. (2017). Is the data on your wearable device secure?An Android
Wear smartwatch case study, Softw. Pract. Exper., 47 (3), 391–403.
- Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M. & Ayyash, M. (2015). Internet of things:
A survey on enabling technologies, protocols and applications. IEEE Communications
Surveys Tutorials, 99.
- GhaffarianHoseini, A. et al. (2013). The essence of future smart houses: From em-bedding ict to
adapting to sustainability principles, Renewable Sustainable Energy Rev., 24 (1), 593–607.
- Greengard, S. (2015). Smart transportation networks drive gains, Commun. ACM, 58 (1), 25–27.
- Gubbi, J., et al. (2013). Internet of Things (iot): A vision, architectural elements, and future
directions, Future Gener. Comput. Syst., 29 (7) , 1645–1660.
- Han, Q., Wen, H., Feng, G., Wu, B. & Ren, M. (2016). Self-nominating trust model based on
hierarchical fuzzy systems for peer-to-peer networks, Peer-to-Peer Netw. Appl., 9 (6), 1020-
1030.
- Lin, C. & Wu, G. (2013) Enhancing the attacking efficiency of the node capture attack in wsn: a
matrix approach, J. Supercomput., 66 (2),989–1007.
- Ling, Z., Luo, J., Xu,Y., Gao, C., Wu, K., Fu, X. (2017). Security vulnerabilities of internet of things:
A case study of the smart plug system, IIEEE Int.-of-Things (IoT) J., 99, 1–1.
- Liu, Z., Choo, K-K.R. & Zhao, M. (2017). Practical-oriented protocols for privacy-preserving
outsourced big data analysis: Challenges and future re-search directions, Comput. Secur., 69,
97–113.
- Pan, G. et al. (2015). Trace analysis and mining for smart cities: issues, methods, and applications,
IEEE Commun. Mag., 121 (6), 120–126.
- Romkey, J. (2017). “Toast of the IoT: The 1990 Interop Internet Toaster”, IEEE Consumer
Electronics Magazine, 6(1), 116-119
- Sha, K., Wei, W., Yang, A. & Shi, W. (2016). Security in internet of things: Opportunities and
challenges, in: Proceedings of International Conference on Identification, Information &
Knowledge in the Internet of Things (IIKI 2016).
- Sha, K., Wei, W., Yang T.A., Wang, Z. & Shi, W. (2018). On security challenges and open issues in
Internet of Things, Future Generation Computer Systems, 83, 326–337.
- Sweeney, L. (2002). k-anonymity: a model for protecting privacy, Int. J. Uncertain. Fuzziness
Knowl.-Based Syst., 10 (5), 557–570.
- Qi, J. et al. (2014). Security of the internet of things: Perspectives and challenges, Wirel. Netw., 20
(8), 2481–2501.
- Wang, R. (2004). The magic of RFID, ACM Queue, 2 (7),41-48.
- Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information Systems
Engineering, 57(3), 221-224.
- Yan, Z., Zhang, P., Vasilakos, A.V. (2015). A survey on trust management for internet of things, J.
Netw. Comput. Appl., 42 (4), 120–134.
- Yu, T., Sekar,V., Seshan, S., Agarwal, Y., Xu, C. (2015) Handling a trillion (unfixable) flaws on a
billion devices: Rethinking network security for the internet-of-things, in: Proceedings of
the 14th ACM Workshop on Hot Topics in Networks.
- Russon, M.-A Hackers turning millions of smart cctv cameras into botnets for ddos attacks,
http://www.ibtimes.co.uk/hackers-turning-millions-smart-cctv-cameras-into-botnets-ddos-
attacks-1525736, online; (Erişim Tarihi: 12.04.2018).
- T. Fox-Brewster, How hacked cameras are helping launch the biggest attacks the internet has ever
seen, https://www.forbes.com/sites/thomasbrewster/ 2016/09/25/brian-krebs-overwatch-
ovh-smashed-by-largest-ddos-attacks-ever/#705007235899, online; (Erişim Tarihi:
24.06.218).
- KrebsOnSecurity.com, Hacked cameras, dvrs powered todays massive inter-net outage,
https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-
internet-outage/, online; (Erişim Tarihi: 24.06.2018).
- Baby
monitor
hacker
still
terrorizing
babies
and
their
parents.
URL
http://www.forbes.com/sites/kashmirhill/2014/04/29/baby-monitor-hacker-still-terrorizing-
babies-and-their-parents/#5b91ff7717e2. (Erişim Tarihi: 24.06.2018).
- Previous next black hat usa 2015: The full story of how that Jeep was hacked.
https://blog.kaspersky.com/blackhat-jeep-cherokee-hack-explained
(Erişim
Tarihi:
02.03.2018).
- How
hackable
are
your
smart
home
gadgets?
https://edition.cnn.com/2013/08/02/tech/innovation/hackable-homes/index.html
(Erişim
Tarihi: 25.03.2018)
- Channel Futures (2018). IoT Past and Present: The History of IoT, and Where It's Headed Today
http://www.channelfutures.com/msp-501/iot-past-and-present-history-iot-and-where-its-
headed-today?page=1 (Erişim Tarihi: 20.06.2018)
- Cisco (2014). The cisco connected learning experience strategies for higher education. White Paper.
https://www.cisco.com/c/dam/en_us/solutions/industries/docs/education/learning-
experience-whitepaper.pdf (Erişim Tarihi: 01.06.2018).
- Gartner (2016). Gartner's 2016 hype cycle for emerging technologies identifies three key trends that
organizations
must
track
to
gain
competitive
advantage.
http://www.gartner.com/newsroom/id/3412017 (Erişim Tarihi: 15.07.2018).
- Gartner (2017). Top trends in the gartner hype cycle for emerging technologies, 2017.
https://www.gartner.com/smarterwithgartner/top-trends-in-the-gartner-hype-cycle-for-
emerging-technologies-2017/ (Erişim Tarihi: 15.07.2018).
- ITU
(2005).
The
internet
of
things.
ITU
Internet
Reports.
https://www.itu.int/net/wsis/tunis/newsroom/stats/The-Internet-of-Things-2005.pdf (Erişim
Tarihi: 12.07.2018).