Abstract
One of the major needs and challenges of this century is the use of cutting-edge technology considering the industry 4.0 revolution. The Internet of Things (IoT) falls in the category of a cutting-edge example of such innovation in the computing and information industry. In IoT compared to classical networking methods practically; every device we employ is accessible at any time from any location. Nevertheless, IoT continues to encounter several security challenges, and the magnitude of cyber-physical security risks is escalating alongside the widespread use of IoT technologies considering Moore’s laws expected to be 30 billion devices by 2025. IoT will continue to face vulnerabilities and risks unless there is a comprehensive understanding and proactive approach towards tackling its security concerns. To ensure both the cyber and physical security of IoT devices during data gathering and sharing, it is imperative to evaluate security considerations, identify instances of cyber-attacks, and implement effective security protocols at multiple layers for making highly secured IoT. Conventional security measures like data classification, strict access controls, monitoring privileged account access, encrypting sensitive data, security awareness training, network segregation, segmentation cloud security, application security, patch management, and physical security employed in the realm of IoT are inadequate in light of the current security difficulties posed by the proliferation of sophisticated attacks and threats. Utilization of artificial intelligence (AI) techniques, especially machine and deep learning models is becoming a compelling and effective approach to enhance security of the IoT devices. This research article presents a comprehensive review of the key aspects of IoT security, including the challenges, potential opportunities, and AI-driven solutions. The primary goal of this article is to provide technical resources for cybersecurity experts and researchers working on IoT initiatives.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Foundation University Journal of Engineering and Applied Sciences <br><i style="color:black;">(HEC Recognized Y Category , ISSN 2706-7351)</i>
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.