Abstract

In the present scenario, the significance of the Internet of Things (IoT) in different application domains is not easy to avoid. Human beings are receiving services very effectively and efficiently from the IoT in smart decision-making through machine-to-machine (M2M) communication from different locations. The IoT field sensors play an essential function in sensing the smart object/things and making an impact decision. The IoT applications are very much demanding in all the sectors. But until now, all the privacy and security attributes for IoT applications are not adequately implemented. Due to the use of unsecured applications, users may face different types of difficulties and can even face life-threatening situations. Thus, implementation of privacy and security for IoT applications is one of the major concerns of the researchers. In this paper, we discuss about the risks and the threats of IoT. There are different security techniques in the TCP/IP network model, but they are not perfectly suitable in IoT architecture. Therefore, to explain this, we provide a layer-wise comparison of the different technologies or protocols used in the TCP/IP network model and IoT architecture. Here, we emphasize that the security solution based on Internet protocol is not sufficient for IoT enabled applications. Here, we will also discuss different threats and attacks at different layers of IoT stack.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call