IoT Security Techniques and Security Threats: A Survey
Abstract
New inventions in technology have made us digitally dependent as we obtain maximum benefit and comfort from it. Internet of Things (IoT) is a technology where the internet interacts with objects. IoT devices have been in continuous use and have become a fundamental part of our modern society. Usage of IoT in various fields includes home security, medical industry, military, agriculture, transportation, etc. Such devices enable our living spaces to be more autonomous, adaptive, efficient, and convenient. However, security and privacy are the biggest concerns while using these digitally equipped spaces. The dramatic increase in the number of IoT network-connected devices has increased the malware attacks. IoT security and privacy thus aim to protect the IoT devices and harden the IoT system architecture using firewalls, video surveillance, intrusion detection system, and other techniques. In accordance, many security techniques designed and developed create secure usage Iot at least to some extent. This paper presents some of the security techniques and solutions that have been in use to overcome IoT security issues. Also, the various security threats and security attacks are mentioned, along with the respective security solutions.
Keywords
Full Text:
PDFReferences
Indrajit Patil, Saurabh Jaiswal, Pallavi Sakhare, Mohammad Shoaib, Asst. Prof. Poonam Gupta “A Survey on IOT Based Security System” IJARCEE Vol 5, Issue 11, November 2016
Nishikawa, Dr. Kamna Solankib , Dr. Sandeep Dalalc “ Security Techniques in Internet of Things (IoT)” (ICIoTCT) 2018
Shinsuke Tanaka Kenzaburo Fujishima Nodoka Mimura, Dr. Eng. Tetsuya Ohashi Mayuko Tanaka “IoT System Security Issues and Solution Approaches” Hitachi Review Vol. 65 (2016)
Charles Wheelus and Xingquan Zhu “IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework” October 2020
Norharyati binti Harum, Mohanad Faeq Ali, Nurul Azma Zakaria, Syahrulnaziah Anawar “Smart Surveillance System using Background Subtraction Technique in IoT Application” IJACSA Vol. 9, No. 12, 2018
Sundaraj “Real-Time Face Detection using Dynamic Background Subtraction” Issue 11, Volume 5, November 2008
Wen-Tsai Sung1 and Sung-Jung Hsiao “IoT Network Security and Applications via Long Range Technology” Vol. 32, No. 1 (2020)
Derek Johnson, Mohammed Ketel “IoT: Application Protocols and Security” April 2019
R. Shantha Mary Joshitta, L. Arockiam “Security in IoT Environment: A Survey” IJITME Vol.2 Issue. 7, July- 2016
Suad Mohammed Othman, Fasl Mutaher Ba-Alwi, Nabeel T.Alsohybe, Amal Y. Al-Hashida “Intrusion detection model using machine learning algorithm on Big Data environment” September 2018
S. R. Vijaylakshmi, S. Muruganand “Smoke detection in video images using background subtraction method for early fire alarm system” 2017
Sidra Ijaz, Munam Ali Shah, Abid Khan, Mansoor Ahmed “Smart Cities: A Survey on security concerns” Vol 7, No 6, 2016
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.