Abstract

In the past, only mobiles and computers were connected to the internet but in the new era with the advent of new technologies other things like security cameras, microwaves, cars and industrial equipment's are now connected to internet. Internet of things (IoT), there are over several billion electronic equipment de- vices already on the internet, and within a decade these number is expected to scale above 20 billion devices. Smartphones and computers have various software security solutions to defend and protect them from most of threats and attacks, although there are indiscernible security solutions to take care of the rest of the IoT [1]. Lately, as a strong example, several thousands of security cameras were breached to proceed DOS and DDOS attacks that caused the Twitter down. Solutions in the IoT are not exclusively software but the entire physical environment of hardware, World Wide Web (WWW), Software, Cloud and mobile interfaces involved. The IoT ecosystem services are young and not very fully developed yet for these reasons there are main primarily concerns fact around IoT adoption due to security threats/attacks. IoT Top Security Concerns: Secure constrained devices, Secure communication, Keeping IoT hardware updated, Distributed Denial of Service (DDoS), Authorize and authenticate devices, Ensure data privacy and integrity. This research reviews the achievements of mitigation IoT security challenges and the key viewpoint is for authors to clearly dene adversary goals, assumptions and dependencies.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.