Abstract

Recently IoT is an emerging technology in all aspect of social and economical growth including research and technology. Starting from smart city to smart home, from industry monitoring to product evolution, from smart watch to smart health monitoring system, there are enormous aspect where IoT make a significant. But it is not possible to ensure that any system is fully safe and free from vulnerabilities. These vulnerabilities are used by attackers to access into devices and use them for malicious practice that can harm to serious extent. This review paper focuses on strategy adopted and scenarios in how many ways can IoT be attacked. Threats can be related to hardware devices, access level, software etc. This study mainly objected to layer wise security threat alone with possible counter measure and further scope of research.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call