Abstract

Internet of Things (IoT) technology has been widely adopted by the vast majority of businesses and is influencing every aspect of the world. However, the nature of the internet, communication means, embedded OS, and backend recourses make IoT objects vulnerable to cyber-attacks. For example, the Mirai botnet attack used the IoT to perform the DDoS attack that took down many popular websites. In addition, most standard and conventional security solutions designed for enterprise systems are not applicable to IoT devices. As a result, we are facing a big IoT security and protection challenge, and there is an urgent need to analyze current IoT-specific cyber-attacks and to design suitable and efficient security mechanisms.

Highlights

  • Internet of Things (IoT) technology has been widely adopted by the vast majority of businesses and is influencing every aspect of the world

  • The Mirai botnet attack used the IoT to perform the DDoS attack that took down many popular websites

  • Most standard and conventional security solutions designed for enterprise systems are not applicable to IoT devices

Read more

Summary

Introduction

Internet of Things (IoT) technology has been widely adopted by the vast majority of businesses and is influencing every aspect of the world. In the article ‘‘Security, privacy and trust for smart mobileInternet of Things (M-IoT): A survey,’’ by Sharma et al, the authors describe the concept and ideology of smart M-IoT networks including their applications, advances, challenges, characteristics, technologies, and standards.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call