Open Access
Different Dimensions of IOT Security
Author(s) -
Narendra Sharma*,
Reitwick Prakash,
E. Rajesh
Publication year - 2020
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.e5893.018520
Subject(s) - computer security , computer science , bluetooth , hacker , internet of things , encryption , vulnerability (computing) , cloud computing , popularity , botnet , the internet , internet privacy , wireless , world wide web , telecommunications , psychology , social psychology , operating system
IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack. The challenges faced by IoT are to stop hackers from stealing data, having unattended access to the device and performing malicious activities. There are many techniques which can be used to secure IoT devices such as using a secure encrypted Wi-Fi network, using digital signature for authenticity, updating to latest patches, installing Intrusion Detection System. We’ll also be assessing various IoT devices and threats associated with them in real time environment and the level of harm these threats can cause to the device if they are not properly mitigated or eradicated. In this paper we’ll also be addressing different types of risks associated with different IOT devices and approaches to solve the security and privacy issues.