Cybersecurity In The Internet of Things (IoT)
DOI:
https://doi.org/10.59367/jvcm8s68Keywords:
Computer security, Computer architecture, Internet of Things, Smart devise, Wireless sensor networksAbstract
The advent of the Internet of Things (IoT) has brought about a transformative shift in how we engage with the digital realm. This paradigm shift has been driven by the interconnection of an extensive array of devices to the global network, numbering in the billions. While the promises of this interconnected ecosystem are abundant, it has also ushered in a distinctive and unprecedented challenge – the imperative need for cybersecurity. This research paper is dedicated to an in-depth exploration of the pivotal dimensions of cybersecurity within the context of the IoT, with the dual objectives of furnishing a comprehensive grasp of the present scenario and proffering strategies to bolster security. A central focus of this research lies in the wide spectrum of IoT devices that span numerous domains, and the vulnerabilities that emerge due to their widespread integration into our daily lives. It endeavors to scrutinize the distinctive hurdles posed by the IoT landscape, which include but are not limited to resource-constrained devices, a profusion of diverse communication protocols, and the sheer magnitude of their deployment. In this context, the paper meticulously dissects the potential threats and the various attack vectors that relentlessly target IoT systems, thereby highlighting the pressing demand for the implementation of robust security measures. In sum, the Internet of Things has heralded an era of remarkable technological advancement, but it is imperative to remain cognizant of the attendant risks. This research paper serves as a beacon to navigate the intricate world of IoT cybersecurity, offering a comprehensive understanding of the myriad challenges and recommending effective strategies to ensure enhanced security in an increasingly interconnected digital landscape.
References
Smith, K.J.; Dhillon, G.; Carter, L. User values and the development of a cybersecurity public policy for the IoT. Int. J. Inf. Manag. 2021, 56, 102123. [Google Scholar] [CrossRef]
Furstenau, L.B.; Sott, M.K.; Homrich, A.J.O.; Kipper, L.M.; Al Abri, A.A.; Cardoso, T.F.; López-Robles, J.R.; Cobo, M.J. 20 years of scientific evolution of cyber security: A science mapping. In Proceedings of the International Conference on Industrial Engineering and Operations Management, Dubai, United Arab Emirates, 10–12 March 2020; pp. 314–325
Laskurain-Iturbe, I.; Arana-Landín, G.; Landeta-Manzano, B.; Uriarte-Gallastegi, N. Exploring the influence of industry 4.0 technologies on the circular economy. J. Clean. Prod. 2021, 321, 128944. [Google Scholar]
Khatkar, M.; Kumar, K.; Kumar, B. An overview of distributed denial of service and internet of things in healthcare devices. In Proceedings of the International Conference on Research, Innovation, Knowledge Management and Technology Application for Business Sustainability (INBUSH), Greater Noida, India, 19–21 February 2020; pp. 44–48. [Google Scholar] [CrossRef]
C. Warren Axelrod, "Enforcing security, safety and privacy for the Internet of Things," in Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, Farmingdale, NY, USA.
NICOLE PERLROTH VINDU GOEL. (2016, Dec) http://www.nytimes.com. [Online]. http://www.nytimes.com/2016/12/14/technology/yahoo-hack.html?_r=
(2014, Feb) http://architectcorner.yolasite.com
Ter Louw, M.; Lim, J.S.; Venkatakrishnan, V.N. Enhancing web browser security against malware extensions. J. Compute. Viral. 2008, 4, 179–195. [Google Scholar] [CrossRef]
https://www.geeksforgeeks.org/what-is-data-encryption/
Lowlesh Nandkishor Yadav, “Predictive Acknowledgement using TRE System to reduce cost and Bandwidth”IJRECE VOL. 7 ISSUE 1 (JANUARY- MARCH 2019) pg no 275-278
K. M. Patel, L. N. Yadav, V. M. Rakhade, “Collection and Analysis of Data in Smarts Home Automation System”. vol 11, issue 5, DOI:10.17148/IJARCCE.2022.115148.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.