Abstract

Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, or people on the World Wide Web (WWW). All these different devices have a unique identity in the IoT and must convey data across the network automatically. If computers are not adequately secured, allowing them to connect to the Internet exposes them to a range of serious vulnerabilities. Because the consequences of IoT failures are severe, it is necessary to observe and analyze security issues related to IoT. The prime goal of IoT security is to protect personal safety, while also guaranteeing and ensuring accessibility. In the context of IoT technology, the present study conducts a systematic literature review that analyzes the security problems associated with commercial and educational applications of home automation and details the technical possibilities of IoT with respect to the network layer. In this systematic review, we discuss how current contexts result in the inability of designers of IoT devices to enhance their cyber-security initiatives. Typically, application developers are responsible for training themselves to understand recent security advancements. As a result, active participation on the ridge scale with passive improvement can be achieved. A comparative analysis of the literature was conducted. The main objective of this research is to provide an overview of current IoT security research in home automation, particularly those using authentication methods in different devices, and related technologies in radio frequency identification (RFID) on network layers. IoT security issues are addressed, and various security problems in each layer are analyzed. We describe cross-layer heterogeneous integration as a domain of IoT and demonstrate how it can provide some promising solutions.

Highlights

  • In recent years, the Internet of ings (IoT) has expanded rapidly as network technology device access and related analytical systems have improved

  • Other comparable methods of utilization based on different input data have been evaluated, and the results suggest that improving transit maintenance could produce positive economic effects [5, 9]. e IoT assists farming by allowing them to deploy embedded sensors to track their food, monitor their crops, and control the thermal properties of their soil [10, 14]

  • We described a lack of innovation as one of the IoT security concerns. erefore, downloading all software updates improves your interface and prevents attackers from infiltrating your devices in novel ways [97]

Read more

Summary

Introduction

The Internet of ings (IoT) has expanded rapidly as network technology device access and related analytical systems have improved. It typically refers to engines, network devices, and other objects that are all digitally integrated; these items are interlinked with different sensor technologies to provide improved accessibility on a given platform. Based on this interconnectedness, it is possible to collect and share data and information among these machines [2]. E Open Web Application Security Project (OWASP) focused on the three levels of an IoT device: technology, data communications, and communication protocols [49]. Each layer of the IoT has its own set of security concerns based on the equipment and devices that assist each layer [50]:

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call