Finding Security Gaps and Vulnerabilities in IoT Devices

Author:

Singh Khushwant1,Yadav Mohit2ORCID,Singh Yudhvir1,Barak Dheerdhwaj3

Affiliation:

1. Maharshi Dayanand University, India

2. University Institute of Sciences, Chandigarh University, India

3. Vaish College of Engineering, India

Abstract

The internet of things (IoT) and wireless sensor networks (WSNs) have become important innovations, offering unparalleled connectivity and pervasive data access for a variety of uses. They have combined to cause a paradigm change in the way we see and engage with our environment. But as connection has increased, new difficulties have emerged, largely concentrated around protecting the integrity of these networked systems. The cheap cost, long-term autonomy, and unsupervised operating capabilities of WSNs and IoT are the main reasons for their adoption. An enormous amount of data is now available for internet access due to the convergence of internet-enabled devices and sensor-driven data collecting, which has been facilitated by this integration. Users and network administrators are worried about the intrinsic security holes and vulnerabilities in these networks notwithstanding these advancements. WSNs and the internet of things are more susceptible to a wide range of threats because they lack a centralised security architecture. It becomes imperative to guarantee the confidentiality, integrity, and accessibility of data (CIA), particularly in applications where these characteristics are vital. In addition to the issues already listed, security risks are made worse by the intricacies brought about by the ever-changing dynamics of IoT ecosystems and the vast quantity of networked devices. New attack vectors appear as these systems develop, underscoring the need of carefully looking into any possible weaknesses. The significance of providing a thorough analysis of security risks, including both established and emerging attacks on WSNs and IoT, is emphasized in this study. This kind of analysis is necessary to classify and understand various assault types. Moreover, it underscores the need of addressing the intricate problems presented by WSN-IoT integration, including safeguarding communication protocols, overseeing extensive networks, and preserving data integrity over diverse devices and platforms. Establishing trust, reliability, and popular acceptance of these important technologies depends on recognizing those threats and safeguarding these linked systems from future assaults.

Publisher

IGI Global

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3