Counterfeiting threats in IoT

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the advent of digitalization the entire world is greatly connected to the digital world. The modern gadgets are equipped with Internet-connectivity encouraging web browsing. Due to rapid mobility of devices numerous applications are launched while these come with lot of advantages and wide spread of information they are prone to attacks too. These attacks on IoT devices compromise the security & privacy of the user. The attackers get entry and invade through the data, inject malware, or schedule attacks on neighborhood. In this paper, we present the attacks and the vulnerabilities in IoT, along with the preventive and counter measures to be adapted to safeguard from attacks. We compiled a brief outline of the security breaches and the latest block chain application to implement security in IoT devices as work for future direction.

Cite

CITATION STYLE

APA

Kavitha, K., Lalitha, R. V. S., Suneetha, T. V., & Usha Sree, D. (2019). Counterfeiting threats in IoT. International Journal of Innovative Technology and Exploring Engineering, 9(1), 2990–2992. https://doi.org/10.35940/ijitee.A9121.119119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free