A Study on Internet of Things (IoT) Threats

  • Authors

    • Vikas Reddy.S
    • Chandrashekara. S.N
    2018-12-13
    https://doi.org/10.14419/ijet.v7i4.39.23819
  • arduino, wireshark
  • Abstract

    This paper is mainly related to the threats that are trending on the Internet due to many objects being connected. There are many threats which are discussed in this paper and the main one would be privacy invasion, that is attacking the data by the attackers on the Internet. The solutions would be using authentication keys on both the ends using technologies such as arduino, wireshark, secure databases and secure protocols. The different applications of Internet of Things (IoT) are in health-care management and in our daily activities. Hence we apply security measures so that all the data will be secured and the users can happily interact.

     

     

  • References

    1. [1] Covington, Carskadden (2013). Threat Implications of the Internet of Things. 5th International conference on cyber Conflict.pp.1-5,9-10

      [2] Nurse, Erola, Agrafiotis, Goldsmith, Creese, Cyber Security Centre. (2015). Smart Insiders: Exploring the Threat from Insiders using the Internet-of-Things. International Workshop on Secure Internet of Things.

      [3] Jonathan Charity, Jian Hua (2016). Smart World of Internet of Things (IoT) and It's Security Concerns. 2016 IEEE International Conference on Internet of Things and IEEE Green Computing and Communications and IEEE Cyber, Physical and Social Computing and IEEE Smart Data.

      [4] Lokulwar, R. Deshmukh (2017) . Threat Analysis and Attacks Modeling in Routing Towards IoT. International conference on I-SMAC .

      [5] Swamy, Jadhav, Kulkarni (2017). Security Threats in the Application layer in IOT Applications. International conference on I-SMAC.

      [6] Mario FRUSTACI, Pasquale PACE, Gianluca ALOI(2017). Securing the IoT world: issues and perspectives. 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

      [7] Swapnil Naik,Vikas Maral. Cyber Security – IoT. 2017 2nd IEEE International Conference On Recent Trends in Electronics Information & Communication Technology (RTEICT), May 19-20, 2017, India.

      [8] Nasser S. Abouzakhar, Andrew Jones, Olga Angelopoulou (2017). Internet of Things Security: A Review of Risks and Threats to Healthcare Sector.(2017)E International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

      [9] Sulabh Bhattarai and Yong Wang.End-to-End Trust and Security for Internet of Things Applications. EEE COMPUTER SOCIETY.

      [10] Badr Alsamani, Husam Lahza. (2018).A Taxonomy of IoT: Security and Privacy Threats .2018 International Conference on Information and Computer Technologies.

  • Downloads

  • How to Cite

    Reddy.S, V., & S.N, C. (2018). A Study on Internet of Things (IoT) Threats. International Journal of Engineering & Technology, 7(4.39), 109-111. https://doi.org/10.14419/ijet.v7i4.39.23819

    Received date: 2018-12-12

    Accepted date: 2018-12-12

    Published date: 2018-12-13