Vulnerabilities, attacks and their mitigation: An implementation on internet of things (IoT)

6Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

IoT is much-hyped technology in today’s world still it helps us to achieve the goals of ubiquitous computing. Although, there are many challenges in adoption and implementation of IoT based solutions. One of the major challenges is security of IoT products and services. Day after day exposures like Insecure Firmware, Data Protection, Identity Thefts and DoS/DDoS Attack in the field of IoT are being oppressed with malicious objectives so we need to focus on these security issues. A framework of IoT may use many services on a single platform to give a specific applicability to the applications. These services can be sensor fields, cloud computing and data analytics so the security architecture should ensure its measures on each level such as physical access, remote access and secured data access. This paper presents the study on existing attacks and mitigation in IoT Services which enables for finding and patching security vulnerabilities. With the help of machine learning and data analytics, IoT services and security can be made proactive rather than reactive.

Cite

CITATION STYLE

APA

Sharma, S., Manuja, M., & Kishore, K. (2019). Vulnerabilities, attacks and their mitigation: An implementation on internet of things (IoT). International Journal of Innovative Technology and Exploring Engineering, 8(10), 146–150. https://doi.org/10.35940/ijitee.F3761.0881019

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free