Security Threats and Mitigation Approaches in IoT based Applications

Authors

  • Dr.A.P. Nirmala Associate Professor, Dept. of MCA, New Horizon College of Engineering, Bengaluru, India Author

DOI:

https://doi.org/10.61841/p0dtbf81

Keywords:

Internet of Things, Protocols, Architecture, Security Threats, Healthcare, Home Appliances, Smart Phones

Abstract

The Internet of Things (IoT) as a budding technology has modernized the global network comprising people, smart devices, intelligent objects, information, and data. There is a huge opportunity for IoT to make the world more available, integral, accessible, confidential, interoperable, and scalable. IoT can be exercised in domains such as healthcare, transportation, entertainment, power grids, and smart buildings. IoT is likely to work as a catalyst for future technological innovations, and its use is presumed to grow rapidly. Various devices that we use on a daily basis can connect with each other via the internet; this has been made possible by IoT. There remain security concerns due to the connection of numerous devices to the internet and the massive data associated with it. Protection and integration of heterogeneous smart devices and information communication technologies (ICT) are the significant factors of the paradigm. The security threats that the users face in the environment of IoT and countermeasures to mitigate them are discussed in this paper. 

Downloads

Download data is not yet available.

References

[1] S. Naik and V. Maral, Cyber security — IoT, 2017 2nd IEEE International Conference on Recent Trends in

Electronics, Information & Communication Technology (RTEICT), Bangalore, pp. 764-767, 2017.

[2] B. Usmonov, A. Iskhakov, A. Shelupanov, A. Iskhakova, and R. Meshcheryakov, The cybersecurity in

development of IoT embedded technologies, Int. Conf. Inf. Sci. Commun. Technol., pp. 1–4, 2017

[3] Annamalai, Lakshmanan and Selvakumar Manickam, A Literature review on cybersecurity in the field of

IoT—Internet of Things, Technical Report, April, 2018.

[4] Yang Lu and Li Da Xu, Internet of Things (IoT) Cybersecurity Research: A Review of Current Research

Topics, IEEE Internet of Things Journal, September 2018

[5] H. He C. Maple T. Watson A. Tiwari J. Mehnen Y. Jin B. Gabrys, The Security Challenges in the IoT

enabled Cyber-Physical Systems and Opportunities for Evolutionary Computing & Other

Computational Intelligence, Evolutionary Computation pp. 1015-1021, 2016

[6] Kebande, Victor R., Nickson M. Karie, Antonia Michael, Semaka MG Malapane, and H. S. Venter, How

an IoT-enabled smart refrigerator can play a clandestine role in perpetuating cyber- cybercrime. IST - Africa

Week Conference (IST-Africa), pp. 1-10. IEEE, 2017.

[7] M.H. Khan M.A. Shah, Survey on Security Threats of Smartphones in Internet of Things, Automation and Computing (ICAC) 22nd International Conference, 2016.

[8] Gupta, Krishna Kanth, and Sapna Shukla. Internet of Things: Security challenges for next-generation networks. International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), pp. 315-318. IEEE, 2016.

[9] Burhan, M.; Rehman, R.A.; Khan, B.; Kim, B.-S. IoT Elements, Layered Architectures, and Security Issues: A Comprehensive Survey. Sensors 18, 2796. 2018,

[10] Kumar, Sathish Alampalayam, Tyler Vealey, and Harshit Srivastava, Security in Internet of Things:

Challenges, Solutions and Future Directions, IEEE 49th Hawaii International Conference on System

Sciences (HICSS), pp. 5772-5781, 2016

[11] John A. Stankovic, Research Directions for the Internet of Things, IEEE Internet of Things Journal, Vol. 1,

Feb. 2014.

[12] Hi Suo, Jiafu, Caifeng Zoua, Jianqia, and Wan. Security in the Internet of Things—A Review, International

Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 648–651, 2012

[13] Xu Xiaohui. Study on Security Problems and Key Technologies of The Internet of Things, Fifth

International Conference on Computational and Information Sciences (ICCIS)), pp. 407–410, 2013

[14] Sathish J. Kumar and Dhiren R. Patel. Article: A Survey on the Internet of Things: Security and Privacy Issues.

International Journal of Computer Applications 90(11):20-26, March 2014.

[15] K. Fazal, H. Shehzad, A. Tasneem, A. Dawood, Z. Ahmed, A Systematic Literature Review on the Security Challenges of Internet of Things and their Classification, IJTNRR, pp. 40-48, 2017

[16] W. Zhou, Y. Jia, A. Peng, Y. Zhang, P. Liu, The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved, IEEE Internet Things J. 12, 1–1, 2018.

[17] I. Yaqoob, E. Ahmed, I.A.T. Hashem, A.I.A. Ahmed, A. Gani, M. Imran, and M. Guizani, Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges, IEEE Wireless Communications, vol. 24, no. 3, pp. 10–16, June 2017.

Downloads

Published

31.07.2020

How to Cite

A.P. , N. (2020). Security Threats and Mitigation Approaches in IoT based Applications. International Journal of Psychosocial Rehabilitation, 24(5), 6948-6954. https://doi.org/10.61841/p0dtbf81