Open Access Open Access  Restricted Access Subscription or Fee Access

Survey on the Various Security Issues Associated with the Internet of Things

Nidhi Kulkarni, Sudha S. Chikkaraddi, N. Sushmitha

Abstract


The Internet of Things (IoT), is characterized as the system of physical articles—gadgets, vehicles, structures and different things—inserted with hardware, programming, sensors and system availability that empowers these items to gather and trade information. IoT has changed the world as far as mechanization and this is the reason IoT is in incline now a days. IoT empowers heap applications running from smaller scale to full scale and from the paltry to the basic. The usage of IoT has seen a significant growth in the previous years and will continue with a faster rate in the upcoming years. Since the number of devices connected to the Internet is also growing exponentially, more and more information flow takes place. The information may be sensitive such as financial records or personal confidential data. If security in IoT devices is not ensured, then the sensitive information is definitely vulnerable to attacks. Hence it is important to scrutinize the parameters that pose a threat to security in IoT. This paper discusses the broad categorization of the security challenges encountered in IoT and methods adopted to overcome in order to maintain information integrity and privacy.


Keywords


Security, IoT, Privacy, Sensors, Vulnerability

Full Text:

PDF

References


https://www.lifewire.com/introduction-to-the-internet-of-things-817766

Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, and A. Selcuk Uluagac, “A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications”, in Cryptography and Security (cs.CR), arXiv:1802.02041v1 [cs.CR]

“Mems accelerometer hardware design flaws (updatea),”https://ics-cert.us-cert.gov/alerts/ICS- ALERT-17-073-01A, accessed: 2017-5-30.

J. M. Kizza, Guide to Computer - Network Security. Springer, 2013.

Mohamed Abomhara and Geir M. Køien, “Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks”, 2015, Journal of Cyber Security, Vol 4, Pg 65-88

I.Naumann and G. Hogben, “Privacy features of european eid card specifications,”Network Security, vol.2008, no. 8, pp. 9–13, 2008.

Tuhin Borgohain, Uday Kumar and Sugata Sanyal, “Survey of Security and Privacy Issues of Internet of Things”

Shen, Guicheng, and Bingwu Liu. "The visions,technologies, applications and security issues of Internet of Things." E-Business and E-Government (ICEE), 2011 International Conference on. IEEE, 2011.

https://blog.atlasrfidstore.com/7-types-security-attacks-rfid-systems

https://devopedia.org/iot-operating-systems


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.