A Comparison of IoT Security Threats and their Preventative Methods
Keywords:
Internet of things (IoT), IoT security, Networks, Network precautions, Security threatsAbstract
The application of IoT networks in daily life attempts to simplify and minimize the complexity of our lives. However, it has also raised the number of brand-new security risks to our data and information. Our personal lives are also threatened by various kinds of security dangers. As a result, it is now necessary to be aware of many security risks that IoT networks may face. As our daily interactions with Internet of Things (IoT) devices grow, various security and privacy concerns—such as linkability, unauthorized chats, and side-channel attacks—are brought up. These problems could endanger the IoT if they are not addressed. They come about for two basic causes. One is that the limited computational, memory, and bandwidth capabilities of IoT gadgets make it difficult to directly deploy established Internet security approaches. The absence of generally regarded IoT security and privacy principles, as well as suitable implementation methods, is the second factor. Additionally, we identify the IoT stakeholders—including consumers and manufacturers—who stand to gain the most from these rules. Additionally, we define a set of implementation methods for carrying out such directives and mitigating any threats to the levels stated before. Thirdly, we talk about the difficulties with IoT security and privacy regulations and briefly touch on IoT digital rights management. Finally, through this survey, we identify several unresolved concerns that demand future research. The authors' knowledge indicates that this work is the first survey to address the aforementioned goals. This paper investigates several IoT security risks and how they affect daily living. This paper highlights the strategies used to counter some attacks in an IoT network.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Journal of IoT Security and Smart Technologies (e-ISSN:2583-6226)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.