UPDATE: Zenodo migration postponed to Oct 13 from 06:00-08:00 UTC. Read the announcement.

Journal article Open Access

Exploration of Various Attacks and Security Measures Related to the Internet of Things

Debajit Datta; Dheeba J

Sponsor(s)
Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)

In this era of technological advances, it will be impractical to think of a day without the usage of gadgets. Development and popularity of the Internet of Things have helped mankind a lot in several ways, but at the same time, there has also been an increase in attacks invading the underlying security. Advances in studies have resulted in the development of evolved algorithms that can be used in order to reduce the attacks and threats to the Internet of Things. With several advancements in studies and research works, the security measures on various Internet of Things based components and protocols are developing with time, but concurrently more advanced threats and attacks on these components are also evolving. These attacks are not only harmful to the components, but rather they also affect the users and applications that are associated with it, by breaching data, increase in inconsistency and inaccuracy, and many more. This work deals with the study of several attacks that are associated with the Internet of Things and also the approaches to secure the IoT systems. This work will also help in coming up with further up-gradation in the currently implemented security protocols and also in predicting the possible attacks that can be developed against the IoT protocols.

Files (286.7 kB)
Name Size
B3353079220.pdf
md5:b5f5179d4238a988d6e5ac634ebd20b5
286.7 kB Download
32
28
views
downloads
Views 32
Downloads 28
Data volume 8.0 MB
Unique views 29
Unique downloads 27

Share

Cite as