Abstract

The invention of IoT devices brings innovation to solve and control house hold devices. The demand of IoT devices like Google and Amazon Echo family has increased after their invention. New inventions may leave a lot of security flaws that must be resolved or addressed. Invention of IoT devices especially devices made for household become, pre vulnerable to many cyber-attacks leading to the leak of privacy. Recent literature revealed that IoT devices have both positive and negative sides. Leakage of privacy and protection lea people into troubles due to the Denial of Service (DDoS) attacks.

Highlights

  • A day’s devices are becoming more popular to assist daily routine activities of everyday life

  • Invention of IoT devices especially devices made for household become, pre vulnerable to many cyber-attacks leading to the leak of privacy

  • This research will answer the following question: who is responsible for the security of IoT devices? Which type of protocol can give best security? Which type of attacks can occur in IoT devices? How we secure our IoT device which are using in smart home and smart city? Which type of attack is most dangerous for IoT?

Read more

Summary

Introduction

A day’s devices are becoming more popular to assist daily routine activities of everyday life. When we install any app to control any equipment, sometimes spyware or adware get installed automatically with that application which later helps hacker or crackers to hack the information or damage the data It is a crucial issue for cyber security professionals in order to protect these devices from attacks. 16 Zohaib Maqbool et al.: Internet Security Issues in Smart City Environments application, application and application It just works like a spy and get information from the conversation between the two parties. If hacker personally login the targeted account using hacked information can check targeted account detail and daily activities of the targeted people on internet If they have account details and credit card number of a person can transfer money from his account without his/her permission. This research will answer the following question: who is responsible for the security of IoT devices? Which type of protocol can give best security? Which type of attacks can occur in IoT devices? How we secure our IoT device which are using in smart home and smart city? Which type of attack is most dangerous for IoT?

Purpose of IOT
Lack of compliance
Lack of Users Awareness
Device Updating Management
Data integrity threats in Healthcare
Network Layer Attacks
Block Chain
Preventing from Spoofing
Blockchain to Prevent Unauthorized Access
Fog Computing
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call