Abstract
The Internet of Things as new paradigm is interconnection of computing ,physical and mechanical device together with people with the ability to transfer the data over network. The embedded devices may gather and swap over data with the support of network connectivity, sensors and electronics. The diversified deployment area of IoT are not limited to smart home application, health care industry, education industry and agriculture, etc. It also taking step ahead in developing new products or services in business. With the help of this emerging technology business will have the major impact by improved customer engagement, productivity enhancement, and better access to data, enhanced inventory tracking and security. Whereas the rapid growth rate of IoT network is getting attention of the cyber criminals. In recent advancement, different types of embedded IoT devices are connected together with wireless network and continuously access internet for communication. Cyber criminals are finding vulnerabilities on IoT devices and compromise them to launch massive attacks (e.g. DDoS, Spamming, MITM, RFID Skimming) to destroy the network. IoT devices having default authentication credentials are easy target. This paper highlights that how IoT may introduce the better opportunities in business and challenges of secure IoT connection and while communicating the IoT device. This research also highlights the security aspects of existing technologies and existing technologies and challenges with implementation.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Recent Technology and Engineering (IJRTE)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.