Affiliation:
1. Department of Computer Science, Jamia Millia Islamia University, New Delhi, India
Abstract
IoT is the networking of daily use objects. These objects are commonly known as constrained
devices. Constrained devices work with low memory, low storage, and low computation power.
Implementing security algorithms in these devices is challenging. The researchers take these challenges
as an opportunity.
The diverse and heterogeneous structure of the IoT phenomenon introduces a variety of new security
risks and challenges. Many threats such as botnets, home intrusion, remote control of the IoT devices,
and man-in-the-middle attacks are threatening the IoT environment. Hence, it needs stronger security
implementation to protect IoT devices from being compromised.
The authors survey different kinds of networking technologies under an IoT environment, security challenges
on them, and possible countermeasures for these challenges to form a more secure IoT environment
for trustful adaptation of services through industrial or personal use.
In this paper, the authors presented the study of numerous networking technologies, along with possible
threats and their countermeasures.
Publisher
Bentham Science Publishers Ltd.
Subject
Electrical and Electronic Engineering,Control and Optimization,Computer Networks and Communications,Computer Science Applications
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献