
Counterfeiting Threats in IoT
Author(s) -
Kayiram Kavitha,
R. V. S. Lalitha,
T.V. Suneetha,
D Vinitha Sree
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.a9121.119119
Subject(s) - computer security , malware , computer science , internet of things , safeguard , compromise , internet privacy , the internet , schedule , block (permutation group theory) , world wide web , business , social science , geometry , mathematics , sociology , international trade , operating system
With the advent of digitalization the entire world is greatly connected to the digital world. The modern gadgets are equipped with Internet-connectivity encouraging web browsing. Due to rapid mobility of devices numerous applications are launched while these come with lot of advantages and wide spread of information they are prone to attacks too. These attacks on IoT devices compromise the security & privacy of the user. The attackers get entry and invade through the data, inject malware, or schedule attacks on neighborhood. In this paper, we present the attacks and the vulnerabilities in IoT, along with the preventive and counter measures to be adapted to safeguard from attacks. We compiled a brief outline of the security breaches and the latest block chain application to implement security in IoT devices as work for future direction.