Abstract

The Internet of Things (IoT) envisions a network of pervasive, connected, and intelligent nodes that interact autonomously and provide a variety of services. IoT objects were a perfect target for cyber assaults because of their wide dispersion, openness, and relatively high processing power. Furthermore, because many IoT nodes collect and process personal or private data, they are becoming a goldmine of information for cybercriminals. As a result, security, particularly the ability to detect compromised nodes, as well as the collection and preservation of evidence of an attack or malicious activity, emerge as a top priority in the effective deployment of IoT networks. Key words: Information Security, IoT, Privacy Preserving, Cyber Security, Cyber Criminals

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call