Abstract

The Internet of Things (IoT) is a quite recent paradigm going a decade back to the past. With the development and deployment of wireless technologies this new advancement has taken the part in the consumers' lives and businesses. In other words, the IoT is a pretty convenient way to correlated devices with each other and make them communicate in such a network. This is feasible using the internet connection and differently saying, all IoT devices forming the IoT asset got their IP addresses. From this perspective, it's quite clear that this technology got a lot of advantages and the users may feel so thankful for being the part of an IoT community. On the other hand, the consumers would spend less time thinking about the possible security concerns being linked to this new improvement. In this paper, we intend to discuss how secure our IoT infrastructure is, what its strategic implications are and why cyber industry should invest more time and effort in order to better research and develop this concept. In addition, we would try to deal a bit more with the IoT crawlers as the tools for investigating the IoT network and being so handy for both - researchers and hacker's groups.

Highlights

  • Two decades back the internet would cope with its global boom

  • Many researchers would tackle the issues being correlated with the Internet of Things (IoT) field and they would undoubtedly give a big contribution to that area

  • The most known and so popular of them are the Shodan and Censys that could get found on the following web locations www.shodan.io and www.censys.io, respectively. These crawlers could represent the convenient way to the security researchers who would want to investigate the vulnerabilities of the IoT network, report them and in such a manner, contribute to the possible improvements of those solutions

Read more

Summary

INTRODUCTION

Two decades back the internet would cope with its global boom. So many people worldwide would become the residents of a global village and it would be quite easy to make a contact with the folks on the other side of the globe in a sub-second period of time. From today’s point of view, we would talk about the Internet of People (IoP) being so popular topic in the 2000s. Some experts would say that once the people stop talking about some topic that means either that area became well-accepted or it went to the history. At this moment, we have the similar situation with the IoT paradigm. The new tendency in the IoT development and deployment would be paying more stage, it’s important to get that defense staffs must be the good thinkers. We hope this brief introduction has given the useful insight into topics we want to discuss through this paper and we believe that the expert’s community could find this effort as a good starting point to some further investigations

THE RELATED WORK
THE INTERNET OF THINGS PARADIGM
THE INTERNET OF THINGS SEARCH ENGINES
THE WAYS TO PROTECT YOUR INTERNET THINGS NETWORK
THE INTERNET OF THINGS AS THE PART OF A CRITICAL INFRASTRUCTURE
THE INTERNET THINGS SECURITY STRATEGIES
THE DISCUSION
THE CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.