Chip off IoT devices: Attacks and mitigations

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet of Things (IoT) is the most emerging field in Information Technology. IoT will make real-world objects into virtual objects and allows them to be sensed remotely. The IoT biological community is changing and getting to be appealing over a more extensive scope of controls, consequently their development in prevalent innovation. Security and protection are the key issues for IoT applications and still face some huge difficulties. Pervasive IoT gadgets have genuine security suggestions as they happen in extensive numbers, are topographically dispersed and can be hard to physically verify. These gadgets may contain touchy or economically profitable information making them appealing to different types of assault. It is discovered that a large portion of the gadgets is defenseless against assaults on hardware, firmware as well as web interface level. In this paper, vulnerabilities due to Insufficient Security Configurability, Insecure Firmware, Security Misconfiguration of IoT devices, recommendations for those vulnerabilities and an approach to reproduce those attacks is explained so as to provide better security to IoT Devices.

Cite

CITATION STYLE

APA

Raju, G. E. K., & Lakshmy, K. V. (2019). Chip off IoT devices: Attacks and mitigations. International Journal of Recent Technology and Engineering, 8(2 Special Issue 4), 164–168. https://doi.org/10.35940/ijrte.B1030.0782S419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free