2017
DOI: 10.14569/ijacsa.2017.080768
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT

Abstract: Abstract-Internet of Things referred as a pervasive network architecture which provides services to the physical world by processing and analyzing data. In this modern era Internet of Things has been shown much significance and rapidly developing by connecting heterogeneous devices with various technologies. By this way interconnectivity of large number of electronic devices connected with the IoT network leads the risk of security and confidentiality of data. This paper analyzes different security issues, the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
34
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(34 citation statements)
references
References 62 publications
0
34
0
Order By: Relevance
“…This great problem needs to be solved to take advantage of the services of the Internet of things to the fullest. Therefore, a secure infrastructure that identifies problems and explores the best protection methods is needed [5]. Given the various literature related to the Internet of Things architecture.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This great problem needs to be solved to take advantage of the services of the Internet of things to the fullest. Therefore, a secure infrastructure that identifies problems and explores the best protection methods is needed [5]. Given the various literature related to the Internet of Things architecture.…”
Section: Literature Reviewmentioning
confidence: 99%
“…IoT is essential in our lives to take effective action to protect the privacy/confidentiality and security of the user. [ 13 ]. The study in [ 14 ] has tried to establish anonymity in IoT networks by classifying the networks into coverage and the technologies deployed in IoT.…”
Section: Related Workmentioning
confidence: 99%
“…Ahemd et al [5] In this paper, the authors have evaluated the security challenge in all the layers of the IoT architecture and their respective solutions proposed. Not just that, different important security techniques like encryption are also analysed in the IoT context along with the countermeasures.…”
Section: Related Workmentioning
confidence: 99%