Cybersecurity In The Internet of Things (IoT)

Authors

  • Yuvraj R. Satpute Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India
  • NeehalB. Jiwane Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India
  • Vijay M. Rakhade Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India

DOI:

https://doi.org/10.59367/jvcm8s68

Keywords:

Computer security, Computer architecture, Internet of Things, Smart devise, Wireless sensor networks

Abstract

The advent of the Internet of Things (IoT) has brought about a transformative shift in how we engage with the digital realm. This paradigm shift has been driven by the interconnection of an extensive array of devices to the global network, numbering in the billions. While the promises of this interconnected ecosystem are abundant, it has also ushered in a distinctive and unprecedented challenge – the imperative need for cybersecurity. This research paper is dedicated to an in-depth exploration of the pivotal dimensions of cybersecurity within the context of the IoT, with the dual objectives of furnishing a comprehensive grasp of the present scenario and proffering strategies to bolster security. A central focus of this research lies in the wide spectrum of IoT devices that span numerous domains, and the vulnerabilities that emerge due to their widespread integration into our daily lives. It endeavors to scrutinize the distinctive hurdles posed by the IoT landscape, which include but are not limited to resource-constrained devices, a profusion of diverse communication protocols, and the sheer magnitude of their deployment. In this context, the paper meticulously dissects the potential threats and the various attack vectors that relentlessly target IoT systems, thereby highlighting the pressing demand for the implementation of robust security measures. In sum, the Internet of Things has heralded an era of remarkable technological advancement, but it is imperative to remain cognizant of the attendant risks. This research paper serves as a beacon to navigate the intricate world of IoT cybersecurity, offering a comprehensive understanding of the myriad challenges and recommending effective strategies to ensure enhanced security in an increasingly interconnected digital landscape.

References

Smith, K.J.; Dhillon, G.; Carter, L. User values and the development of a cybersecurity public policy for the IoT. Int. J. Inf. Manag. 2021, 56, 102123. [Google Scholar] [CrossRef]

Furstenau, L.B.; Sott, M.K.; Homrich, A.J.O.; Kipper, L.M.; Al Abri, A.A.; Cardoso, T.F.; López-Robles, J.R.; Cobo, M.J. 20 years of scientific evolution of cyber security: A science mapping. In Proceedings of the International Conference on Industrial Engineering and Operations Management, Dubai, United Arab Emirates, 10–12 March 2020; pp. 314–325

Laskurain-Iturbe, I.; Arana-Landín, G.; Landeta-Manzano, B.; Uriarte-Gallastegi, N. Exploring the influence of industry 4.0 technologies on the circular economy. J. Clean. Prod. 2021, 321, 128944. [Google Scholar]

Khatkar, M.; Kumar, K.; Kumar, B. An overview of distributed denial of service and internet of things in healthcare devices. In Proceedings of the International Conference on Research, Innovation, Knowledge Management and Technology Application for Business Sustainability (INBUSH), Greater Noida, India, 19–21 February 2020; pp. 44–48. [Google Scholar] [CrossRef]

C. Warren Axelrod, "Enforcing security, safety and privacy for the Internet of Things," in Systems, Applications and Technology Conference (LISAT), 2015 IEEE Long Island, Farmingdale, NY, USA.

NICOLE PERLROTH VINDU GOEL. (2016, Dec) http://www.nytimes.com. [Online]. http://www.nytimes.com/2016/12/14/technology/yahoo-hack.html?_r=

(2014, Feb) http://architectcorner.yolasite.com

Ter Louw, M.; Lim, J.S.; Venkatakrishnan, V.N. Enhancing web browser security against malware extensions. J. Compute. Viral. 2008, 4, 179–195. [Google Scholar] [CrossRef]

https://www.geeksforgeeks.org/what-is-data-encryption/

Lowlesh Nandkishor Yadav, “Predictive Acknowledgement using TRE System to reduce cost and Bandwidth”IJRECE VOL. 7 ISSUE 1 (JANUARY- MARCH 2019) pg no 275-278

K. M. Patel, L. N. Yadav, V. M. Rakhade, “Collection and Analysis of Data in Smarts Home Automation System”. vol 11, issue 5, DOI:10.17148/IJARCCE.2022.115148.

Downloads

Published

2024-03-11

Issue

Section

Articles

How to Cite

Cybersecurity In The Internet of Things (IoT). (2024). International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM), 3(1), 491-497. https://doi.org/10.59367/jvcm8s68

Similar Articles

1-10 of 62

You may also start an advanced similarity search for this article.