Security Risk Analysis of the Internet of Things

An Early Cautionary Scan

Authors

  • Mounika Mandapuram Cognizant Technology Solutions, Teaneck, New Jersey, USA

DOI:

https://doi.org/10.18034/ra.v5i3.650

Keywords:

IoT, Risk Analysis, Security Threats

Abstract

The Internet of Things is assisting in developing a new and more intelligent world in which everything will fall under its purview. The issue of security is by far the most critical concern and component regarding the Internet of Things. With billions or trillions of connected devices, it will be difficult for future generations to find solutions to the security concerns we face today. The Internet of Things (IoT) paves the way for various entities and applications that benefit humanity. Although it is the most significant accomplishment of the decade, it has also given rise to catastrophic scenarios due to security concerns such as threats, vulnerabilities, and attacks on connected and interconnected devices and objects. Despite this, it is still the most significant achievement of the decade. Businesses and organizations are backing the current paradigm shift by providing financial assistance to researchers and academics. The industry expected to have the most growth over this decade is the Internet of Things, which will connect trillions of different devices. It is anticipated that IoT will alter the method by which we communicate. The Internet of Things poses many significant dangers, including physical attacks, network attacks, encryption attacks, software attacks, authorization, surveillance, identity theft, vandalism, and secure communication. The findings of this research show that none of the IoT security architectures include a security layer.

Downloads

Download data is not yet available.

References

Alberto M. C. Souza, Joseé R. A. Amazonas, An Outlier Detect Algorithm using Big Data Processing and Internet of Things Architecture, Procedia Computer Science, Volume 52, 2015.

Lin, C., G. Wu, Enhancing the attacking efficiency of the node capture attack in win: a matrix approach, J. Supercom-put. 66 (2) (2013) 989–1007.

Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. Retrieved from https://4ajournal.com/article/view/76

Qian, J., H. Xu and P. Li, "A Novel Secure Architecture for the Internet of Things," 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), Ostrawva, 2016, pp. 398–401. doi: 10.1109/INCoS.2016.36.

Sha, K., W. Wei, A. Yang, W. Shi, Security in the Internet of Things: Opportunities and challenges, in Proceedings of International Conference on Identification, Information & Knowledge in the Internet of Things (IIKI 2016), 2016.

Singh, D., G. Tripathi and A. Jara, "Secure layers-based architecture for the Internet of Things," 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, 2015, pp. 321–326. doi 10.1109/WF-IoT.2015.7389074.

Vashi, S., J. Ram, J. Modi, S. Verma, and C. Prakash, "Internet of Things (IoT): A vision, architectural elements, and security issues," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics, and Cloud) (I-SMAC), Palladam, 2017, pp. 492–496. doi 10.1109/I-SMAC.2017.8058399.

Zhang, W., Qu, B. "Security Architecture of the Internet of Things Oriented to Perceptual Layer," International Journal on Computer Consumer and Control (IJ3C), vol. 2, no. 2, 2013.

Downloads

Published

31-12-2017

How to Cite

Mandapuram, M. (2017). Security Risk Analysis of the Internet of Things: An Early Cautionary Scan. ABC Research Alert, 5(3), 49-55. https://doi.org/10.18034/ra.v5i3.650

Similar Articles

1-10 of 51

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)