Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Survey on the Various Security Issues Associated with the Internet of Things


Affiliations
1 Department of Information Science and Engineering, Rashtreeya Vidyalaya College of Engineering, Bangalore, India
     

   Subscribe/Renew Journal


The Internet of Things (IoT), is characterized as the system of physical articles—gadgets, vehicles, structures and different things—inserted with hardware, programming, sensors and system availability that empowers these items to gather and trade information. IoT has changed the world as far as mechanization and this is the reason IoT is in incline now a days. IoT empowers heap applications running from smaller scale to full scale and from the paltry to the basic. The usage of IoT has seen a significant growth in the previous years and will continue with a faster rate in the upcoming years. Since the number of devices connected to the Internet is also growing exponentially, more and more information flow takes place. The information may be sensitive such as financial records or personal confidential data. If security in IoT devices is not ensured, then the sensitive information is definitely vulnerable to attacks. Hence it is important to scrutinize the parameters that pose a threat to security in IoT. This paper discusses the broad categorization of the security challenges encountered in IoT and methods adopted to overcome in order to maintain information integrity and privacy.


Keywords

Security, IoT, Privacy, Sensors, Vulnerability.
User
Subscription Login to verify subscription
Notifications
Font Size

  • https://www.lifewire.com/introduction-to-the-internet-of-things-817766
  • Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, and A. Selcuk Uluagac, “A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications”, in Cryptography and Security (cs.CR), arXiv:1802.02041v1 [cs.CR]
  • “Mems accelerometer hardware design flaws (updatea),”https://ics-cert.us-cert.gov/alerts/ICS- ALERT-17-073-01A, accessed: 2017-5-30.
  • J. M. Kizza, Guide to Computer - Network Security. Springer, 2013.
  • Mohamed Abomhara and Geir M. Køien, “Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks”, 2015, Journal of Cyber Security, Vol 4, Pg 65-88
  • I.Naumann and G. Hogben, “Privacy features of european eid card specifications,”Network Security, vol.2008, no. 8, pp. 9–13, 2008.
  • Tuhin Borgohain, Uday Kumar and Sugata Sanyal, “Survey of Security and Privacy Issues of Internet of Things”
  • Shen, Guicheng, and Bingwu Liu. "The visions,technologies, applications and security issues of Internet of Things." E-Business and E-Government (ICEE), 2011 International Conference on. IEEE, 2011.
  • https://blog.atlasrfidstore.com/7-types-security-attacks-rfid-systems
  • https://devopedia.org/iot-operating-systems

Abstract Views: 189

PDF Views: 3




  • Survey on the Various Security Issues Associated with the Internet of Things

Abstract Views: 189  |  PDF Views: 3

Authors

Nidhi Kulkarni
Department of Information Science and Engineering, Rashtreeya Vidyalaya College of Engineering, Bangalore, India
Sudha S. Chikkaraddi
Department of Information Science and Engineering, Rashtreeya Vidyalaya College of Engineering, Bangalore, India
N. Sushmitha
Department of Information Science and Engineering, Rashtreeya Vidyalaya College of Engineering, Bangalore, India

Abstract


The Internet of Things (IoT), is characterized as the system of physical articles—gadgets, vehicles, structures and different things—inserted with hardware, programming, sensors and system availability that empowers these items to gather and trade information. IoT has changed the world as far as mechanization and this is the reason IoT is in incline now a days. IoT empowers heap applications running from smaller scale to full scale and from the paltry to the basic. The usage of IoT has seen a significant growth in the previous years and will continue with a faster rate in the upcoming years. Since the number of devices connected to the Internet is also growing exponentially, more and more information flow takes place. The information may be sensitive such as financial records or personal confidential data. If security in IoT devices is not ensured, then the sensitive information is definitely vulnerable to attacks. Hence it is important to scrutinize the parameters that pose a threat to security in IoT. This paper discusses the broad categorization of the security challenges encountered in IoT and methods adopted to overcome in order to maintain information integrity and privacy.


Keywords


Security, IoT, Privacy, Sensors, Vulnerability.

References