z-logo
open-access-imgOpen Access
Vulnerabilities, Attacks and their Mitigation: An Implementation on Internet of Things (IoT)
Author(s) -
Sanjay Sharma,
Manoj Manuja,
Kshav Kishore
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.f3761.0881019
Subject(s) - computer security , computer science , firmware , internet of things , cloud computing , analytics , field (mathematics) , data science , mathematics , pure mathematics , computer hardware , operating system
IoT is much-hyped technology in today’s world still it helps us to achieve the goals of ubiquitous computing. Although, there are many challenges in adoption and implementation of IoT based solutions. One of the major challenges is security of IoT products and services. Day after day exposures like Insecure Firmware, Data Protection, Identity Thefts and DoS/DDoS Attack in the field of IoT are being oppressed with malicious objectives so we need to focus on these security issues. A framework of IoT may use many services on a single platform to give a specific applicability to the applications. These services can be sensor fields, cloud computing and data analytics so the security architecture should ensure its measures on each level such as physical access, remote access and secured data access. This paper presents the study on existing attacks and mitigation in IoT Services which enables for finding and patching security vulnerabilities. With the help of machine learning and data analytics, IoT services and security can be made proactive rather than reactive

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here