Security Issues in IoT

Authors(1) :-Afreen Fatima Mohammed

The Internet of things (IoT) is the network of various interconnected physical devices, vehicles, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to collect and exchange data. It connects devices embedded in various systems to the internet. When devices/objects can represent themselves digitally, they can be controlled or accessed from anywhere. The connectivity then helps to capture more data from more places, ensuring more ways of increasing efficiency and improving safety and IoT security. Data privacy, confidentiality, data integrity is at potential risk when these devices are connected. As more and more IoT devices are coming in the market, securing IoT systems represents a number of challenges. This paper discusses about various vulnerabilities and threats against IoT and what actions could be taken to provide a more secure IoT.

Authors and Affiliations

Afreen Fatima Mohammed
Department of IT Stanley College of Engineering & Technology, Hyderabad, Telangana, India

Malware attacks, Sniffing, Spoofing, Cross-site scripting, Botnet enslaving, Encryption, Data Leakage

  1. www.networkworld.com/article/3166106/internet-of-things/4-critical-security-challenges-facing-iot.html
  2. https://heimdalsecurity.com/blog/internet-of-things-security/
  3. Muhammad Usman , Irfan Ahmed† , M. Imran Aslam† , Shujaat Khan and Usman Ali Sha ,"SIT: A Lightweight Encryption Algorithm for Secure Internet of Things",IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 1, 2017
  4. R. Want and S. Dustdar, "Activating the internet of things [guest editors’ introduction]," Computer, vol. 48, no. 9, pp. 16–20, 2015.
  5. T. Karygiannis, B. Eydt, G. Barber, L. Bunn, and T. Phillips, "Guidelines for securing radio frequency identification (rfid) systems," NIST Special publication, vol. 80, pp. 1–154, 2007.
  6. M. A. Simplicio Jr, M. V. Silva, R. C. Alves, and T. K. Shibata, "Lightweight and escrow-less authenticated key agreement for the internet of things," Computer Communications, 2016.
  7. L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
  8. F. Xie and H. Chen, "An efficient and robust data integrity verification algorithm based on context sensitive," way, vol. 10, no. 4, 2016.
  9. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of things (iot): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013.
  10. S. Wang, Z. Zhang, Z. Ye, X. Wang, X. Lin, and S. Chen, "Application of environmental internet of things on water quality management of urban scenic river," International Journal of Sustainable Development & World Ecology, vol. 20, no. 3, pp. 216–222, 2013.
  11. http://iotdesign.embedded-computing.com

Publication Details

Published in : Volume 3 | Issue 8 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 933-940
Manuscript Number : IJSRSET1738251
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Afreen Fatima Mohammed, " Security Issues in IoT, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 8, pp.933-940, November-December-2017. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET1738251

Article Preview