Abstract
AbstractIn recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resilience and responsiveness in the face of dangers if peers are willing to share information proactively. Internet of Things (IoT) is the buzz word which integrates almost all the technology concerning computation and communication. Before the IoT goal can be fully realized, some barriers must be addressed, with security and privacy being two of the most essential. When IoT devices connect to an IoT gateway or other edge device, the sensor data they gather is either transmitted to the cloud for analysis or processed locally. Based on the received information, they act and it can expose a device as well as its data. Insufficient or no device authentication and authorization are common problems, as is poor or no encryption. Due to restricted energy supplies and low processing power, IoT security and privacy are complex, especially for resource‐constrained devices. In this article, IoT‐CS security problems and associated threats are discussed. The overarching goals were identifying assets and exploring possible threats, assaults, and vulnerabilities encountered by the IoT in the sectors like healthcare, transportation, utilities, safety, and environmental health that might be significantly improved with IoT‐CS deployment in smart cities. The predominant challenges in the deployment of the IoT related technologies had been studied in the aspects of cyber security and mitigation strategies had been discussed.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.