Abstract

The advent of the twenty-first century has seen a myriad of amazing technological advancements. The Internet of Things (IoT) is a prime example of technological capabilities at its finest. The IoT is a series of interconnected devices capable of sending and receiving data over existing network infrastructure, but why does this matter? Technology is becoming a conventional commodity, while the uses are endless, technological advancement constitutes a very serious risk. Any device that is connected to the Internet poses a heightened security risk. These risks have the potential of compromising the device and its users. Therefore, the understanding of device-level security is critical to protect the users from various security threats. To provide a holistic view of IoT security, the investigated devices are broken down with respect to different domains (e.g., healthcare, commerce, and home). Specifically, this paper presents a survey of frequently used devices with a common vulnerability scoring system (CVSS) for each investigated IoT domain. This will be an attempt to identify the pivotal device vulnerabilities and determine which attack vectors are predominately exploited in IoT networks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call