Loading

Different Dimensions of IOT Security
Narendra Sharma1, Reitwick Prakash2, E. Rajesh3

1Narendra Sharma, M.Tech(CSE), School of Computer Science and Engineering, Galgotias University, Greater Noida, India.
2Reitwick Prakash, School of Computer Science and Engineering, Galgotias University, Greater Noida, India.
3Dr. E. Rajesh, Associate Professor, School of Computer Science and Engineering, Galgotias University, Greater Noida, India.
Manuscript received on January 02, 2020. | Revised Manuscript received on January 15, 2020. | Manuscript published on January 30, 2020. | PP: 860-863 | Volume-8 Issue-5, January 2020. | Retrieval Number: E5893018520/2020©BEIESP | DOI: 10.35940/ijrte.E5893.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack. The challenges faced by IoT are to stop hackers from stealing data, having unattended access to the device and performing malicious activities. There are many techniques which can be used to secure IoT devices such as using a secure encrypted Wi-Fi network, using digital signature for authenticity, updating to latest patches, installing Intrusion Detection System. We’ll also be assessing various IoT devices and threats associated with them in real time environment and the level of harm these threats can cause to the device if they are not properly mitigated or eradicated. In this paper we’ll also be addressing different types of risks associated with different IOT devices and approaches to solve the security and privacy issues.
Keywords: Internet of Things, Cyber security, IoT Threats.
Scope of the Article: Security, Privacy and Trust in IoT & IoE.