Abstract

People's lives will be transformed by the Internet of Things (IoT), which connects everything from smart phones and sensors to the cloud to mobile apps and web-based controls. Security concerns are on the rise as the number of heterogeneous devices and data processing grows. Most IoT apps and devices are also well-known for their security flaws, making them vulnerable to many forms of attacks. To further complicate matters, threats have variable consequences on the device's security and quality. Unfortunately, enterprises are having difficulty determining which risks they face from their data assets and how to mitigate them. To better identify IoT security risks, this article has built a taxonomy based on the application domain and the design of the architecture. Servers, clients, IoT development boards, sensors, cloud subscriptions, and other components all play a role in this test setup. Vulnerability and network host scanning technologies are used to obtain raw data relevant to IoT-based smart city projects. This article also includes a mitigation approach for IoT network flaws.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call