Author : Sanjay Kumar Gupta 1
Date of Publication :20th March 2021
Abstract: Internet of Things (IoT) is a platform that integrates the internet with the rudimentary devices. This technology catalysts the growth of Internet-connected devices in our daily activities. This provides numerous benefits to the end user; however, it also brings with itself new challenges related to security and privacy issues. The number of devices connected along with the ad-hoc nature of the system further exacerbates the situation. Therefore, security and privacy has emerged as a significant challenge for the IoT. This research paper analyses various security aspects of IoT setup and proposes security solutions for mitigation of the concerns.
Reference :
-
- C. Kolias, G. Kambourakis, A.Stavrou, J.Voas,(2017) “DDoS in the IoT: Mirai and other Botnets.”, IEEE Computer Journal, Vol. 50, No. 7, pp 80-84.
- F. Meneghello, M. Calore, D. Zucchetto, M. Polese, A. Zanella(2019) “ IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices”, IEEE IoT Journal Vol.6, No. 5, pp 8182-8201.
- N. Neshenko, E. Bou-hard, J. Crichigno, G. Kaddoum, N. Ghani (2019) “Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Emperical Look on Internet-scale IoT Exploitations”, IEEE Communications Survey & Tutorials Vol.21, No. 3,pp 2702-2733.
- Online Resource available at https://www.gartner.com/newsroom/id/3598917 Accessed in June 2020.
- H. Saha, S. Auddy, A. Chaterjee, S. Pal, S. Sarkar, R. Singh, (2017) “IoT Solutions for Smart Cities”,Proceedings of 8th Annual Industrial Automation and Electro-mechanical Engineering Conference, pp 16-25.
- W. Ejaz, A. Anpalagan (2018) “IoT for Smart Cities Technologies, Bigdata and Security”. Springer Briefs in Electrical & Computer Engineering.
- D. Yin, L. Zhang, K. Yang (2018) “A DDoS Attack Detection & mitigation with Software-defined IoT Framework”, IEEE Access Vol.6,
- T. Pering, K. Farrington, T. Dahm(2018) “Taming the IoT-Operational Testing to Secure Connected Devices”, IEEE Computer Journal Vol.51, No. 6, pp 90-94.
- J.W. Jones (2018) “Security Review on the IoT”, Proceedings of 3rd International Conference on Fog and Mobile Edge Computing, pp 23-26.
- Online Resource available at https://www.conduiraonline.com/index.php/detail/36 8- what-is-a-smart-city
- Y. Mehmood, F. Ahmad, I. Yaqoob, A. Adnane, M. Imran, S. Guizani (2017) “Internet of Things based Smart Cities: Recent Advances and Challenges”, IEEE Communications Magazine, Vol.55, No.9, pp16-24.
- A. Sajid, H. Abbas, K. Saleem (2016) “CloudAssisted IoT Based SCADA Systems Security: A Review of the State of the Art & Future Challenges”, IEEE Access, Vol 4, pp 1375-1384.
- C.P. Oflynn (2011) “Message Diluation and Alteration on IEEE 802.15.4”, Proceedings of New Technology Mobility and Security, pp 1-5.
- T. Gopal, M. Merolla, G. Jyotsana, P. Eswari, E. Mangesh (2018) “Mitigating Mirai Malware Spreads in IoT Environment”, Proceedings of International Conference on Advances in Computer, Communications and Informatics
- Online Resource available at https://www.kaspersky.com/about/pressreleases/2019_iot-under-fire-kaspersky-detectsmore-than-100-million-attacks-on-smart-devices-inh1-2019
- B. Javed, M. Iqbal, H. Abbas (2017) “IoT design considerations for Developers and Manufacturers”, Proceedings of IEEE International Conference on Communications Workshop, pp 21-25.