Author:
Smail Boussaadi,Sanchez Dr. Domenic T.,Peconcillo Jr. Dr. Larry B.,De Vera Dr. John V.,Horteza Dr. AL D.,Jawarneh Malik,. Dr.Meenakshi
Abstract
The Internet of Things, often known as IoT, is a project whose ultimate objective is to construct, in the not-too-distant future, a global network of linked, networked goods and things that are capable of exchanging data and working together. Through the use of the internet, it will be possible to read, recognise, localise, address, and otherwise control such things. Before widespread usage of the Internet of Things (IoT), consumers and business owners need to have trust in its underlying security architecture. It is essential to provide an explanation of how different devices connected to the Internet of Things may safely and effectively share data with one another and with remote computers. When designing security solutions, new privacy and security issues brought about by the Internet of Things need to be taken into consideration throughout the design process. Establishing trustworthy end-to-end encrypted connections is difficult due to the inherent heterogeneity of Internet of Things (IoT) communications and the vast range of hardware and software capabilities supported by IoT devices. Because of their slow processing rates, high power consumption, and little quantities of memory, the majority of Internet of Things devices have few security choices available. This is as a result of the fact that many traditional security approaches are unable to be deployed on devices that have restricted resources. This article presents an overview of the many uses of the Internet of Things, together with the security threats and operational challenges that each presents.
Publisher
Perpetual Innovation Media Pvt. Ltd.
Reference32 articles.
1. Raghuvanshi, U. K. Singh, P. P. e. 2020. Internet of things: Taxonomy of various attacks. In European Journal of Molecular and Clinical Medicine. pp. 3853–3864.
2. Sastry, S. S. e. a. 2013. Security threats in wireless sensor networks in each layer. Inter- national Journal of Advanced Network Applications Vol.4, No.4, pp. 1657–1671.
3. Almolhis, A. Alashjaee, e. a. 2020. The security issues in iot - cloud: A review. Proceedings of 16th IEEE International Colloquium on Signal Processing and Its Applications. CSPA. Ammar, R. and Crispo. 2018. Internet of things: A survey on the security of iot frameworks,. In Journal Of Information Security And Applications. JISAA, pp. 8–27.
4. B, B. K. 2011. Rfid as an enabler of the internet of things: issues of security and privacy. International Conference on Internet of Things (ithings/CPSCom) and 4th International Conference on Cyber, Physical and Social Computing. pp. 709–712.
5. Zhu, A. J. e. a. 2011. A taxonomy of cyber attacks on scada systems. Proceedings of Internet of Things (Ithings/CPSCom),international conference on and 4th international conference on Cyber. Physical and Social Computing.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献