Affiliation:
1. Maharshi Dayanand University, India
2. University Institute of Sciences, Chandigarh University, India
3. Vaish College of Engineering, India
Abstract
The internet of things (IoT) and wireless sensor networks (WSNs) have become important innovations, offering unparalleled connectivity and pervasive data access for a variety of uses. They have combined to cause a paradigm change in the way we see and engage with our environment. But as connection has increased, new difficulties have emerged, largely concentrated around protecting the integrity of these networked systems. The cheap cost, long-term autonomy, and unsupervised operating capabilities of WSNs and IoT are the main reasons for their adoption. An enormous amount of data is now available for internet access due to the convergence of internet-enabled devices and sensor-driven data collecting, which has been facilitated by this integration. Users and network administrators are worried about the intrinsic security holes and vulnerabilities in these networks notwithstanding these advancements. WSNs and the internet of things are more susceptible to a wide range of threats because they lack a centralised security architecture. It becomes imperative to guarantee the confidentiality, integrity, and accessibility of data (CIA), particularly in applications where these characteristics are vital. In addition to the issues already listed, security risks are made worse by the intricacies brought about by the ever-changing dynamics of IoT ecosystems and the vast quantity of networked devices. New attack vectors appear as these systems develop, underscoring the need of carefully looking into any possible weaknesses. The significance of providing a thorough analysis of security risks, including both established and emerging attacks on WSNs and IoT, is emphasized in this study. This kind of analysis is necessary to classify and understand various assault types. Moreover, it underscores the need of addressing the intricate problems presented by WSN-IoT integration, including safeguarding communication protocols, overseeing extensive networks, and preserving data integrity over diverse devices and platforms. Establishing trust, reliability, and popular acceptance of these important technologies depends on recognizing those threats and safeguarding these linked systems from future assaults.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献