z-logo
open-access-imgOpen Access
Chip off IoT Devices: Attacks and Mitigations
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.b1030.0782s419
Subject(s) - firmware , computer security , computer science , internet of things , scope (computer science) , interface (matter) , key (lock) , field (mathematics) , microcode , internet privacy , operating system , mathematics , bubble , maximum bubble pressure method , pure mathematics , programming language
Internet of Things (IoT) is the most emerging field in Information Technology. IoT will make real-world objects into virtual objects and allows them to be sensed remotely. The IoT biological community is changing and getting to be appealing over a more extensive scope of controls, consequently their development in prevalent innovation. Security and protection are the key issues for IoT applications and still face some huge difficulties. Pervasive IoT gadgets have genuine security suggestions as they happen in extensive numbers, are topographically dispersed and can be hard to physically verify. These gadgets may contain touchy or economically profitable information making them appealing to different types of assault. It is discovered that a large portion of the gadgets is defenseless against assaults on hardware, firmware as well as web interface level. In this paper, vulnerabilities due to Insufficient Security Configurability, Insecure Firmware, Security Misconfiguration of IoT devices, recommendations for those vulnerabilities and an approach to reproduce those attacks is explained so as to provide better security to IoT Devices.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here