:
IoT is the networking of daily use objects. These objects are commonly known as constrained devices.
Constrained devices works with low memory, low storage, and low computation power. Implementing security algorithms
in these devices is challenging. The researchers take these challenges as opportunity.
The diverse and heterogeneous structure of the IoT phenomenon introduces a variety of new security risks and
challenges. Many threats such as botnets, home intrusion, remote control of the IoT devices, and man-in-the-middle attack
are threatening the IoT environment. Hence it needs a stronger security implementation to protect IoT devices from being
compromised.
The authors surveys different kinds of networking technologies under an IoT environment, security challenges on them
and possible countermeasures for these challenges to form a more secure IoT environment for trustful adoptation of
services through industrial or personal use.
In this paper, the authors presented the study of numerous networking technologies along with possible threats and their
countermeasures.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.