Internet of Things (IoT): Vulnerabilities and Remediation Strategies

5Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Iot being a transformative approach for imparting countless services raises consequential security flaws as well. These flaws germinate from the embedded vulnerabilities in IoT devices. The market is flooded with these vulnerable smart devices, which are easy to play with to remotely enter into an IoT system. This becomes more serious as communication protocols and Internet technologies were not devised to support IoT. In this paper, we mainly focus on the evolving vulnerabilities in IoT that can affect its sustenance in the long run. We also elaborated on the remediation strategies to be incorporated to lessen the fertility of the ground to launch numerous attacks. Finally, we conclude with the challenges and recommendations.

Cite

CITATION STYLE

APA

Anand, P., Singh, Y., & Selwal, A. (2021). Internet of Things (IoT): Vulnerabilities and Remediation Strategies. In Lecture Notes in Electrical Engineering (Vol. 701, pp. 265–273). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-8297-4_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free