Abstract
Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied in anything, from cellphones, coffee makers, cars, body sensors to smart surveillance, water distribution, energy management system, and environmental monitoring. However, the rapid growth of IoT has brought new and critical threats to the security and privacy of the users. Due to the millions of insecure IoT devices, an adversary can easily break into an application to make it unstable and steal sensitive user information and data. This paper provides an overview of different kinds of cybersecurity attacks against IoT devices as well as an analysis of IoT architecture. It then discusses the security solutions we can take to protect IoT devices against different kinds of security attacks. The main goal of this research is to enhance the development of IoT research by highlighting the different kinds of security challenges that IoT is facing nowadays, and the existing security solutions we can implement to make IoT devices more secure. In this study, we analyze the security solutions of IoT in three forms: secure authentication, secure communications, and application security to find suitable security solutions for protecting IoT devices.
Highlights
The rise of the Internet of things (IoT) is one of the inventions that have a special significance in the world of communication technology
This paper provides an overview of different kinds of cybersecurity attacks against Internet of Things (IoT) devices as well as an analysis of IoT architecture
This study presents a general survey of different kinds of cybersecurity attacks against IoT devices as well as an analysis of IoT architecture
Summary
The rise of the Internet of things (IoT) is one of the inventions that have a special significance in the world of communication technology. If we do not take necessary precautions against those vulnerabilities, malicious hackers will take advantage of these poorly secured IoT devices to disrupt communications or even physically harm people. Since IoT is a distributed system, it will transmit most of its data wirelessly which makes it vulnerable to wireless security attacks such as eavesdropping, denial of service, spoofing, message injection, and jamming [4]. To overcome these security challenges, we need to come with security solutions that use low overhead protocols and inexpensive computational algorithms and can provide strong encryption and authentication to IoT devices.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.