Different Dimensions of IOT Security

  • et al.
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack. The challenges faced by IoT are to stop hackers from stealing data, having unattended access to the device and performing malicious activities. There are many techniques which can be used to secure IoT devices such as using a secure encrypted Wi-Fi network, using digital signature for authenticity, updating to latest patches, installing Intrusion Detection System. We’ll also be assessing various IoT devices and threats associated with them in real time environment and the level of harm these threats can cause to the device if they are not properly mitigated or eradicated. In this paper we’ll also be addressing different types of risks associated with different IOT devices and approaches to solve the security and privacy issues.

Cite

CITATION STYLE

APA

Sharma*, N., Prakash, R., & Rajesh, Dr. E. (2020). Different Dimensions of IOT Security. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 860–863. https://doi.org/10.35940/ijrte.e5893.018520

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free