Security Risk Analysis of the Internet of Things
An Early Cautionary Scan
DOI:
https://doi.org/10.18034/ra.v5i3.650Keywords:
IoT, Risk Analysis, Security ThreatsAbstract
The Internet of Things is assisting in developing a new and more intelligent world in which everything will fall under its purview. The issue of security is by far the most critical concern and component regarding the Internet of Things. With billions or trillions of connected devices, it will be difficult for future generations to find solutions to the security concerns we face today. The Internet of Things (IoT) paves the way for various entities and applications that benefit humanity. Although it is the most significant accomplishment of the decade, it has also given rise to catastrophic scenarios due to security concerns such as threats, vulnerabilities, and attacks on connected and interconnected devices and objects. Despite this, it is still the most significant achievement of the decade. Businesses and organizations are backing the current paradigm shift by providing financial assistance to researchers and academics. The industry expected to have the most growth over this decade is the Internet of Things, which will connect trillions of different devices. It is anticipated that IoT will alter the method by which we communicate. The Internet of Things poses many significant dangers, including physical attacks, network attacks, encryption attacks, software attacks, authorization, surveillance, identity theft, vandalism, and secure communication. The findings of this research show that none of the IoT security architectures include a security layer.
Downloads
References
Alberto M. C. Souza, Joseé R. A. Amazonas, An Outlier Detect Algorithm using Big Data Processing and Internet of Things Architecture, Procedia Computer Science, Volume 52, 2015.
Lin, C., G. Wu, Enhancing the attacking efficiency of the node capture attack in win: a matrix approach, J. Supercom-put. 66 (2) (2013) 989–1007.
Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. Retrieved from https://4ajournal.com/article/view/76
Qian, J., H. Xu and P. Li, "A Novel Secure Architecture for the Internet of Things," 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), Ostrawva, 2016, pp. 398–401. doi: 10.1109/INCoS.2016.36.
Sha, K., W. Wei, A. Yang, W. Shi, Security in the Internet of Things: Opportunities and challenges, in Proceedings of International Conference on Identification, Information & Knowledge in the Internet of Things (IIKI 2016), 2016.
Singh, D., G. Tripathi and A. Jara, "Secure layers-based architecture for the Internet of Things," 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, 2015, pp. 321–326. doi 10.1109/WF-IoT.2015.7389074.
Vashi, S., J. Ram, J. Modi, S. Verma, and C. Prakash, "Internet of Things (IoT): A vision, architectural elements, and security issues," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics, and Cloud) (I-SMAC), Palladam, 2017, pp. 492–496. doi 10.1109/I-SMAC.2017.8058399.
Zhang, W., Qu, B. "Security Architecture of the Internet of Things Oriented to Perceptual Layer," International Journal on Computer Consumer and Control (IJ3C), vol. 2, no. 2, 2013.
Downloads
Published
Issue
Section
License
Copyright (c) 2017 Mounika Mandapuram
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ABC Research Alert is an Open Access journal. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal the right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of their work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal. We require authors to inform us of any instances of re-publication.