Review on Vulnerabilities of IoT Security

A. Vinitha, B. Vanitha, E. J. Thomson Fedrik
{"title":"Review on Vulnerabilities of IoT Security","authors":"A. Vinitha, B. Vanitha, E. J. Thomson Fedrik","doi":"10.31142/IJTSRD24020","DOIUrl":null,"url":null,"abstract":"Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals.","PeriodicalId":14446,"journal":{"name":"International Journal of Trend in Scientific Research and Development","volume":"44 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Trend in Scientific Research and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31142/IJTSRD24020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网安全漏洞研究综述
版权所有©2019由作者和《国际科学研究与发展趋势杂志》所有。这是一篇根据知识共享署名许可(CC BY 4.0) (http://creativecommons.org/licenses/ BY /4.0)条款发布的开放获取文章。摘要物联网被称为物联网,无线传感器网络和RFID在教育、卫生、农业和娱乐领域得以实现。物联网是计算机科学和通信技术的发展产物。物联网的脆弱性与安全和隐私问题有关。用户可能会面临物联网技术传播的后果。该调查的重点是物联网中使用的信息交换技术引起的安全漏洞。数据分析利用物联网和大数据,它面临着安全挑战,以保护其重要数据。到2020年,通过使用物联网和大数据技术可以产生大量数据。本次调查的目的是根据我们所知的第一次调查,分析物联网各层涉及的脆弱安全问题和风险。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Status of Secondary Sector in Nabarangpur, Odisha Factors Influencing Smallholder Potato Farmers’ Choice Decisions of Market Outlets in Musanze and Nyabihu Districts, Rwanda: A Multivariate Probit MODEL Maintenance and other Operating Expenses (MOOE) and School Based Management (SBM) Performance of Secondary Schools in Samar Island Biogas Production from Decanter Cake of Palm Oil Mill from South India Estimating the Survival Function of HIV/AIDS Patients using Weibull Model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1