Investigating different applications of Internet of Things towards identification of vulnerabilities, attacks and threats

Author:

Smail Boussaadi,Sanchez Dr. Domenic T.,Peconcillo Jr. Dr. Larry B.,De Vera Dr. John V.,Horteza Dr. AL D.,Jawarneh Malik,. Dr.Meenakshi

Abstract

The Internet of Things, often known as IoT, is a project whose ultimate objective is to construct, in the not-too-distant future, a global network of linked, networked goods and things that are capable of exchanging data and working together. Through the use of the internet, it will be possible to read, recognise, localise, address, and otherwise control such things. Before widespread usage of the Internet of Things (IoT), consumers and business owners need to have trust in its underlying security architecture. It is essential to provide an explanation of how different devices connected to the Internet of Things may safely and effectively share data with one another and with remote computers. When designing security solutions, new privacy and security issues brought about by the Internet of Things need to be taken into consideration throughout the design process. Establishing trustworthy end-to-end encrypted connections is difficult due to the inherent heterogeneity of Internet of Things (IoT) communications and the vast range of hardware and software capabilities supported by IoT devices. Because of their slow processing rates, high power consumption, and little quantities of memory, the majority of Internet of Things devices have few security choices available. This is as a result of the fact that many traditional security approaches are unable to be deployed on devices that have restricted resources. This article presents an overview of the many uses of the Internet of Things, together with the security threats and operational challenges that each presents.

Publisher

Perpetual Innovation Media Pvt. Ltd.

Reference32 articles.

1. Raghuvanshi, U. K. Singh, P. P. e. 2020. Internet of things: Taxonomy of various attacks. In European Journal of Molecular and Clinical Medicine. pp. 3853–3864.

2. Sastry, S. S. e. a. 2013. Security threats in wireless sensor networks in each layer. Inter- national Journal of Advanced Network Applications Vol.4, No.4, pp. 1657–1671.

3. Almolhis, A. Alashjaee, e. a. 2020. The security issues in iot - cloud: A review. Proceedings of 16th IEEE International Colloquium on Signal Processing and Its Applications. CSPA. Ammar, R. and Crispo. 2018. Internet of things: A survey on the security of iot frameworks,. In Journal Of Information Security And Applications. JISAA, pp. 8–27.

4. B, B. K. 2011. Rfid as an enabler of the internet of things: issues of security and privacy. International Conference on Internet of Things (ithings/CPSCom) and 4th International Conference on Cyber, Physical and Social Computing. pp. 709–712.

5. Zhu, A. J. e. a. 2011. A taxonomy of cyber attacks on scada systems. Proceedings of Internet of Things (Ithings/CPSCom),international conference on and 4th international conference on Cyber. Physical and Social Computing.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3