Vulnerabilities, attacks and their mitigation: An implementation on internet of things (IoT)

11Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.
Get full text

Abstract

IoT is much-hyped technology in today’s world still it helps us to achieve the goals of ubiquitous computing. Although, there are many challenges in adoption and implementation of IoT based solutions. One of the major challenges is security of IoT products and services. Day after day exposures like Insecure Firmware, Data Protection, Identity Thefts and DoS/DDoS Attack in the field of IoT are being oppressed with malicious objectives so we need to focus on these security issues. A framework of IoT may use many services on a single platform to give a specific applicability to the applications. These services can be sensor fields, cloud computing and data analytics so the security architecture should ensure its measures on each level such as physical access, remote access and secured data access. This paper presents the study on existing attacks and mitigation in IoT Services which enables for finding and patching security vulnerabilities. With the help of machine learning and data analytics, IoT services and security can be made proactive rather than reactive.

References Powered by Scopus

The internet of things vision: Key features, applications and open issues

1182Citations
N/AReaders
Get full text

Internet of Things - New security and privacy challenges

1160Citations
N/AReaders
Get full text

On the features and challenges of security and privacy in distributed internet of things

1144Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Horizoning recent trends in the security of smart cities: Exploratory analysis using latent semantic analysis

14Citations
N/AReaders
Get full text

Adoption of industry 4.0 in different sectors: a structural review using natural language processing

12Citations
N/AReaders
Get full text

AI in HRM: Unveiling Areas and Future Trajectories for Organizational Transformation

4Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Sharma, S., Manuja, M., & Kishore, K. (2019). Vulnerabilities, attacks and their mitigation: An implementation on internet of things (IoT). International Journal of Innovative Technology and Exploring Engineering, 8(10), 146–150. https://doi.org/10.35940/ijitee.F3761.0881019

Readers over time

‘19‘20‘21‘22‘23‘24‘25036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 8

67%

Professor / Associate Prof. 2

17%

Lecturer / Post doc 1

8%

Researcher 1

8%

Readers' Discipline

Tooltip

Computer Science 12

75%

Engineering 2

13%

Design 1

6%

Business, Management and Accounting 1

6%

Save time finding and organizing research with Mendeley

Sign up for free
0