{"title":"REVIEW ON VULNERABILITIES AND CHALLENGES ON IOT SECURITY FRAMEWORKS IN DIVERSIFIED FIELDS OF APPLICATIONS","authors":"Poojarini Mitra, Kaustuv Bhattacharjee, Anirban Das, S. Das, Papiya Ghosh, Priya Gorai, Sayani Maity","doi":"10.15864/ajec.2101","DOIUrl":null,"url":null,"abstract":"Abstract - Internet of Things (loT) is emerging as a revolutionary technology since the last double decade. Internet of things has changed many aspects of the human. loT has changed living styles and health care with the help of intelligent health care technologies like\n wearable devices. loT makes use of lightweight communication with the motive of the reduction of extra overhead generated in regular internet communication. The number of multiple devices are connected and the amount of data interchanged between them is surprising and hence becoming a goal\n for attack and misuse of information. Other than the obvious vulnerability of wireless connections, security in loT is difficult to earn because of the universal way of data collection, complication of cryptographic solutions for the resource-tractable equipment, characteristics of the cyber\n world with the physical world, complex wideness topologies and insufficient organizational capabilities. The Internet of Things (loT) devices are becoming more popular, vulnerability counteragents are inadequate and many things have occurred. It is because there is inadequate preservation\n against vulnerabilities specific to loT equipment.","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"American Journal of Electronics & Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15864/ajec.2101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract - Internet of Things (loT) is emerging as a revolutionary technology since the last double decade. Internet of things has changed many aspects of the human. loT has changed living styles and health care with the help of intelligent health care technologies like
wearable devices. loT makes use of lightweight communication with the motive of the reduction of extra overhead generated in regular internet communication. The number of multiple devices are connected and the amount of data interchanged between them is surprising and hence becoming a goal
for attack and misuse of information. Other than the obvious vulnerability of wireless connections, security in loT is difficult to earn because of the universal way of data collection, complication of cryptographic solutions for the resource-tractable equipment, characteristics of the cyber
world with the physical world, complex wideness topologies and insufficient organizational capabilities. The Internet of Things (loT) devices are becoming more popular, vulnerability counteragents are inadequate and many things have occurred. It is because there is inadequate preservation
against vulnerabilities specific to loT equipment.