Security Challenges and Measures of IoT Devices and its Networks

Srinivasa Ravi Kiran T.*, Shanthi Priya Dasari**, Salma Begum***
*-*** Department of Computer Science, P. B. Siddhartha College of Arts & Science, Vijayawada, Andhra Pradesh, India.
Periodicity:January - June'2023

Abstract

The Internet of Things (IoT) illustrates physical objects with sensors, processing capabilities, software, and other technologies that attach and swap data with other devices and systems over the Internet or other communication networks. The use of IoT devices is widespread across all domains. In this paper, various types of attacks on IoT devices by intruders or hackers to gain access to IoT devices were discussed. In addition, various measures have been formulated to minimize attacks on IoT Devices. In-depth analysis of the likelihood of security threats and various possibilities to minimize security threat hacking were analyzed in detail, and possible measures are stated to overcome security threats.

Keywords

Security, Threat, Protocol, Attacks, Fuzzy Logic, Network.

How to Cite this Article?

Kiran, T. S. R., Dasari, S. P., and Begum, S. (2023). Security Challenges and Measures of IoT Devices and its Networks. i-manager’s Journal on IoT and Smart Automation, 1(1), 17-22.

References

[4]. Li, Z., & Xin, T. (2013). Threat modeling and countermeasures study for the Internet of Things. Journal of Convergence Information Technology, 8(5), 1163-1171.
[9]. Vignesh, R., & Samydurai, A. (2017). Security on Internet of Things (IoT) with challenges and countermeasures. International Journal of Engineering Development and Research, 5(1), 417-423.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 40 40 300
Online 40 40 300
Pdf & Online 40 40 300

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.