{"title":"A Review on Data Flow Risk based on IoT","authors":"Anku Sharma, Yogesh","doi":"10.1109/ICICT46931.2019.8977646","DOIUrl":null,"url":null,"abstract":"The IoT has come too far to be a protruding technology in the ongoing era. It is regarding facilitating the connection among objects (\"things\") and the backend system via the Internet. Today, IoT attracts many considerations and provides a stunning picture of what the future holds for us. Recently, IoT has glided the entire society and attracted major research ideas. It is a central part of the current generation of information technology. Along with its rapid expansion in the population thickness in developed cities, the demand for more resources is emerging gradually. To look after the issues of city improvement, the practice of web of things (IoT) devices and the savvy frameworks are the sharp and lucrative source. All these smart devices make our living way easier, comfortable and advanced, but on the conflicting, we are bare to a number of threats, various types of cyber-attacks, security and privacy issues regarding data integrity, confidentiality, and authenticity. This paper emphasizes on the architecture of the IoT, the security threats and how to deal with these threats so as to secure our IoT device.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT46931.2019.8977646","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The IoT has come too far to be a protruding technology in the ongoing era. It is regarding facilitating the connection among objects ("things") and the backend system via the Internet. Today, IoT attracts many considerations and provides a stunning picture of what the future holds for us. Recently, IoT has glided the entire society and attracted major research ideas. It is a central part of the current generation of information technology. Along with its rapid expansion in the population thickness in developed cities, the demand for more resources is emerging gradually. To look after the issues of city improvement, the practice of web of things (IoT) devices and the savvy frameworks are the sharp and lucrative source. All these smart devices make our living way easier, comfortable and advanced, but on the conflicting, we are bare to a number of threats, various types of cyber-attacks, security and privacy issues regarding data integrity, confidentiality, and authenticity. This paper emphasizes on the architecture of the IoT, the security threats and how to deal with these threats so as to secure our IoT device.