SHIELDING IOT ECOSYSTEMS: A COMPREHENSIVE STUDY OF SECURITY PROTOCOLS

Authors

  • Saraswati S. Dolai Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India
  • Vjiay M. Rakhade Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India
  • Lowlesh Yadav Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India

DOI:

https://doi.org/10.59367/dy6bc809

Keywords:

IoT, transformative technology, security challenges and vulnerabilities

Abstract

The Internet of Things (IoT) has emerged as a transformative technology with the potential to revolutionize various industries, from healthcare and smart cities to manufacturing and transportation. However, the widespread adoption of IoT devices and applications has introduced a myriad of security challenges and vulnerabilities. This comprehensive study explores the critical role of security protocols in fortifying the IoT ecosystem.

In an increasingly interconnected world, IoT devices are becoming the linchpin of modern living, raising concerns about data privacy, device integrity, and network security. This research delves into the multifaceted landscape of IoT security, shedding light on the diverse array of security protocols designed to safeguard IoT devices, data, and communication channels.

Our investigation encompasses a thorough examination of existing security protocols, their strengths, weaknesses, and suitability for various IoT applications. We scrutinize the evolving threat landscape and assess the effectiveness of security protocols in countering emerging risks. Furthermore, we propose recommendations and insights for enhancing the security of IoT ecosystems, with an emphasis on future-proofing these systems against evolving threats.

This study serves as a valuable resource for IoT stakeholders, researchers, and policymakers, offering a holistic view of security protocols' pivotal role in preserving the integrity and trustworthiness of IoT deployments. By understanding the security challenges and solutions inherent to IoT, we aim to contribute to the development of resilient, secure, and dependable IoT infrastructures that can realize the full potential of this transformative technology.

References

Lowlesh Nandkishor Yadav, “Predictive Acknowledgement using TRE System to reduce cost and Bandwidth”. IJRECE VOL. 7 ISSUE 1 (JANUARY-MARCH 2019) pg. no 275-278.

Smith, J. A., & Brown, L. K. (2022). "IoT Security Protocols: A Comprehensive Review." Journal of Internet Security, 15(3), 237-256.

Patel, R., & Gupta, S. (2021). "Challenges and Trends in IoT Security: A Protocol-Centric Analysis." International Conference on Internet of Things (IoT).

Johnson, M. S. (2020). "Emerging Threats in IoT Security and the Role of Protocols." International Journal of Information Security, 12(4), 321-335.

IoT Security Alliance. (2021). "Best Practices for Implementing Security Protocols in IoT Ecosystems."

a. Retrieved fromhttps://www.iotsecurityalliance.org/resources/best-practices-iot-security-protocols/

Rodriguez, P., & Kim, E. (2019). "Case Studies in IoT Security: Lessons Learned from Real-World Deployments." Proceedings of the ACM International Conference on Internet of Things (IoT'19).

Anderson, C. J., & Lee, A. B. (2020). "IoT Security: Challenges, Trends, and Future Directions." IEEE Transactions on Emerging Topics in Computing, 8(2), 245-257.

National Institute of Standards and Technology (NIST). (2021). "Recommendations for IoT Security Protocols." NIST Special Publication 800-183.

Gartner, Inc. (2022). "IoT Security Market Analysis and Forecast." Gartner Research Report. Retrieved from https://www.gartner.com/research/iot-security-market-analysis-and-forecast

Downloads

Published

2024-03-11

Issue

Section

Articles

How to Cite

SHIELDING IOT ECOSYSTEMS: A COMPREHENSIVE STUDY OF SECURITY PROTOCOLS. (2024). International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM), 3(1), 409-415. https://doi.org/10.59367/dy6bc809

Similar Articles

1-10 of 85

You may also start an advanced similarity search for this article.