NESNELERİN İNTERNETİNİN GETİRDİĞİ YENİLİKLER VE SORUNLARI

Sabah işe gitmek için uyandınız. Sizin kalktığınızı kahve makinası algıladı. Sevdiğiniz şekilde kahvenizi hazırladı. Kahvenizi içerken günlük gazetelere göz attığınızı bilgisayarınız biliyor. İlgili sitelerdeki haberleri derleyip size otomatik olarak sundu. Hatta bir yapay zekâ yazılımı aracılığıyla hangi haberler daha çok ilginizi çekiyorsa bu haberleri öncelikli listesine dâhil etti. İşe gitmek için evden hareket ettiğiniz anda garajdaki arabanız bunu algıladı. Garajın kapısını açıp kendisini çalışır hale getirdi. Arabanıza bindiğinizde, gitmek istediğiniz yol doğrultusunda trafiğinin yoğun olduğunu tespit edip size alternatif yolları sundu. Nesnelerin İnterneti'nin değiştirdiği yeni hayata hoş geldiniz! Bunlar hayal değil, birçoğu bugün kullanımda ve bir kısmı da çok yakın gelecekte kullanabileceğimiz duruma gelecektir. Tüm bunlar “Nesnelerin İnterneti” (IoT - Internet of Things) adı verilen teknolojiler sayesinde mümkün olmaktadır. Bu çalışma hayatımızı çepeçevre kuşatmaya başlayan ve gelecekte de onlarsız yapamayacağımız pek çok uygulamanın kaynağı haline gelen Nesnelerin İnterneti konusuna odaklanmıştır. Bu çalışmada nesnelerin internetinin mevcut durumu, hayatımızdaki önemi, kullanım alanları, üstünlükleri ortaya koyulurken diğer taraftan hızla yayılan ve gelişen IoT sistemlerinin zayıf yönleriyle beraberinde getirdiği ciddi tehlikeler üzerine durulmaktadır. Bu tehlikelerin kaynaklarının iyi tespit edilerek ortaya koyulması çözüm çalışmalarına hız kazandıracaktır. Bu anlamda çalışma, nesnelerin internetinin özellikle güvenlik sorunlarını analiz etmeye ağırlık vermiştir. Uluslararası alanda ayrıntılı bir araştırma sonucunu sunan bu çalışmanın alana önemli bir katkı sağlayacağı düşünülmektedir. Yakın gelecekte güvenli IoT çözümleri, en çok maliyetlerini düşürmek ve yeni pazarlara açılmak isteyen işletmeler tarafından uygulamaya koyulacaktır. Gelişen hücresel ağ teknolojileri ile IoT aygıtları, bireyler ve kurumlar ile iletişimde olabilecekler ve biz de bu sayede onları her yerden, her zaman gözlemleme ve kontrol edebilme imkânına sahip olacağız. Böylece insanoğlu uzun zamandır hayalini kurduğu “Akıllı ve Güvenli Dünya”ya kavuşmuş olacaktır.

INNOVATIONS AND PROBLEMS COMING WITH INTERNET OF THINGS

You woke up in the morning to go to work. The coffee machine sensed you woke up. It prepared the coffee as you like. Your computer knows that you glance the daily newspaper while drinking the cafe. So it compiled the related news and offered them to you automatically. Even it added the news which most attracted your attention into its preferred list through artificial intelligence software. Our car in the garage sensed that you were ready to go work. It opened the garage door and got ready itself for your trip. When you got in your car, it determined the traffic intensity that your route had and it offered different route options to you. You are welcome to new life which has been changed by Internet of Things (IoT). All this is not a dream. Although most of these are in use, some haven't been in use yet but they will be in use soon after. This study focused on IoT which is the resource of many applications which have begun to surround our life and we can’t do without. The current situation of IoT, its importance for our life, its benefits and usage areas were revealed in this study. The study emphasizes the threats that come with the weaknesses of the IoT systems which have developed and spread very quickly. Identifying well the resources of these threats will accelerate solutions works greatly. In this mean, the study concentrates on analyzing the especially security troubles of IoT. It is thought that this study which presents the results of a detailed study in the international area will contribute to the field a lot. In the near future, secure IoT solutions mostly will be put into practice by businesses who want to reduce their production costs and get into new markets. With developing cellular network technologies, IoT devices will be able to be in contact with individuals and organizations and we will always have the opportunity to observe and control them from anywhere thanks to this. Thus, we will have had a "Smart and Secure World" that human beings have dreamed for a long time.

___

  • Akaslan, D., Taşkın, S. & Oğuz, Y., The Extensible Analogy for Supporting the Aspects of Smart Cities: Demander and Supplier, the 5th International Istanbul Smart Grid and Cities Congress and Fair (ICSG), 20-21 April 2017, Istanbul, Turkey
  • Alramadhan M. & Sha K. (2017). An overview of access control mechanisms for in-ternet of things, in: Proceedings of the 26th International Conference on Computer Communications and Networks (ICCCN 2017).
  • Amin, M. & Bruce,W. (2005). Toward a smart grid: power delivery for the 21st century, IEEE Power Energ. Mag., 3 (5), 34–41.
  • Ashton, K. (2009). That ‘internet of things’ thing. RFiD Journal, 22(7), 97-114.
  • Atzori A.L.L. & Morabito, G. (2010). The internet of things: A survey, Comput. Netw, 54 (15) , 2787–2805.
  • Boyer, S. (2009). SCADA: Supervisory Control and Data Acquisition, International Society of Automation.
  • Bozuklu, M. (2016). Çevresel veriler ile gerçek zamanlı nesnelerin interneti uygulaması. Yayınlanmamış Yüksek Lisans Tezi. Gaziosmanpaşa Üniversitesi.
  • D’Orazio, C. & Choo, K.-K.R. A. (2017). technique to circumvent ssl/tls validations on ios devices, Future Gener. Comput. Syst., 74, 366–374.
  • Do, Q., Martini, B. & Choo, K.-K.R. (2017). Is the data on your wearable device secure?An Android Wear smartwatch case study, Softw. Pract. Exper., 47 (3), 391–403.
  • Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M. & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols and applications. IEEE Communications Surveys Tutorials, 99.
  • GhaffarianHoseini, A. et al. (2013). The essence of future smart houses: From em-bedding ict to adapting to sustainability principles, Renewable Sustainable Energy Rev., 24 (1), 593–607.
  • Greengard, S. (2015). Smart transportation networks drive gains, Commun. ACM, 58 (1), 25–27.
  • Gubbi, J., et al. (2013). Internet of Things (iot): A vision, architectural elements, and future directions, Future Gener. Comput. Syst., 29 (7) , 1645–1660.
  • Han, Q., Wen, H., Feng, G., Wu, B. & Ren, M. (2016). Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks, Peer-to-Peer Netw. Appl., 9 (6), 1020- 1030.
  • Lin, C. & Wu, G. (2013) Enhancing the attacking efficiency of the node capture attack in wsn: a matrix approach, J. Supercomput., 66 (2),989–1007.
  • Ling, Z., Luo, J., Xu,Y., Gao, C., Wu, K., Fu, X. (2017). Security vulnerabilities of internet of things: A case study of the smart plug system, IIEEE Int.-of-Things (IoT) J., 99, 1–1.
  • Liu, Z., Choo, K-K.R. & Zhao, M. (2017). Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future re-search directions, Comput. Secur., 69, 97–113.
  • Pan, G. et al. (2015). Trace analysis and mining for smart cities: issues, methods, and applications, IEEE Commun. Mag., 121 (6), 120–126.
  • Romkey, J. (2017). “Toast of the IoT: The 1990 Interop Internet Toaster”, IEEE Consumer Electronics Magazine, 6(1), 116-119
  • Sha, K., Wei, W., Yang, A. & Shi, W. (2016). Security in internet of things: Opportunities and challenges, in: Proceedings of International Conference on Identification, Information & Knowledge in the Internet of Things (IIKI 2016).
  • Sha, K., Wei, W., Yang T.A., Wang, Z. & Shi, W. (2018). On security challenges and open issues in Internet of Things, Future Generation Computer Systems, 83, 326–337.
  • Sweeney, L. (2002). k-anonymity: a model for protecting privacy, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10 (5), 557–570.
  • Qi, J. et al. (2014). Security of the internet of things: Perspectives and challenges, Wirel. Netw., 20 (8), 2481–2501.
  • Wang, R. (2004). The magic of RFID, ACM Queue, 2 (7),41-48.
  • Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information Systems Engineering, 57(3), 221-224.
  • Yan, Z., Zhang, P., Vasilakos, A.V. (2015). A survey on trust management for internet of things, J. Netw. Comput. Appl., 42 (4), 120–134.
  • Yu, T., Sekar,V., Seshan, S., Agarwal, Y., Xu, C. (2015) Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things, in: Proceedings of the 14th ACM Workshop on Hot Topics in Networks.
  • Russon, M.-A Hackers turning millions of smart cctv cameras into botnets for ddos attacks, http://www.ibtimes.co.uk/hackers-turning-millions-smart-cctv-cameras-into-botnets-ddos- attacks-1525736, online; (Erişim Tarihi: 12.04.2018).
  • T. Fox-Brewster, How hacked cameras are helping launch the biggest attacks the internet has ever seen, https://www.forbes.com/sites/thomasbrewster/ 2016/09/25/brian-krebs-overwatch- ovh-smashed-by-largest-ddos-attacks-ever/#705007235899, online; (Erişim Tarihi: 24.06.218).
  • KrebsOnSecurity.com, Hacked cameras, dvrs powered todays massive inter-net outage, https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive- internet-outage/, online; (Erişim Tarihi: 24.06.2018).
  • Baby monitor hacker still terrorizing babies and their parents. URL http://www.forbes.com/sites/kashmirhill/2014/04/29/baby-monitor-hacker-still-terrorizing- babies-and-their-parents/#5b91ff7717e2. (Erişim Tarihi: 24.06.2018).
  • Previous next black hat usa 2015: The full story of how that Jeep was hacked. https://blog.kaspersky.com/blackhat-jeep-cherokee-hack-explained (Erişim Tarihi: 02.03.2018).
  • How hackable are your smart home gadgets? https://edition.cnn.com/2013/08/02/tech/innovation/hackable-homes/index.html (Erişim Tarihi: 25.03.2018)
  • Channel Futures (2018). IoT Past and Present: The History of IoT, and Where It's Headed Today http://www.channelfutures.com/msp-501/iot-past-and-present-history-iot-and-where-its- headed-today?page=1 (Erişim Tarihi: 20.06.2018)
  • Cisco (2014). The cisco connected learning experience strategies for higher education. White Paper. https://www.cisco.com/c/dam/en_us/solutions/industries/docs/education/learning- experience-whitepaper.pdf (Erişim Tarihi: 01.06.2018).
  • Gartner (2016). Gartner's 2016 hype cycle for emerging technologies identifies three key trends that organizations must track to gain competitive advantage. http://www.gartner.com/newsroom/id/3412017 (Erişim Tarihi: 15.07.2018).
  • Gartner (2017). Top trends in the gartner hype cycle for emerging technologies, 2017. https://www.gartner.com/smarterwithgartner/top-trends-in-the-gartner-hype-cycle-for- emerging-technologies-2017/ (Erişim Tarihi: 15.07.2018).
  • ITU (2005). The internet of things. ITU Internet Reports. https://www.itu.int/net/wsis/tunis/newsroom/stats/The-Internet-of-Things-2005.pdf (Erişim Tarihi: 12.07.2018).