{"title":"Cyber security — IoT","authors":"Swapnil Naik, V. Maral","doi":"10.1109/RTEICT.2017.8256700","DOIUrl":null,"url":null,"abstract":"In the past, only mobiles and computers were connected to the internet but in the new era with the advent of new technologies other things like security cameras, microwaves, cars and industrial equipment's are now connected to internet. This network of things is called the internet of things. There are already 6 billion devices on the internet and within a few years these number is anticipated to scale to 20 billion devices. PCs and mobiles have dozens of software security solutions to protect them from most of the attacks but similar security solutions are missing to protect the rest of the internet of things. Recently, thousands of security cameras were breached to launch a DDOS attack that caused Twitter outage. IoT solutions is not just software but an entire ecosystem of hardware, software, cloud, web and mobile interfaces. This ecosystem is not very mature and there are still major concerns lurking around IoT adoption primarily due to security threats. IoT Top Security Concerns: Device Cloning, Sensitive Data Exposure, Denial of Service, Unauthorized Device Access and Control, Tampering Data. This research work accomplishesthe need to mitigateIoT security challenges Device Cloning and Sensitive Data Exposure.","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"29","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RTEICT.2017.8256700","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 29
Abstract
In the past, only mobiles and computers were connected to the internet but in the new era with the advent of new technologies other things like security cameras, microwaves, cars and industrial equipment's are now connected to internet. This network of things is called the internet of things. There are already 6 billion devices on the internet and within a few years these number is anticipated to scale to 20 billion devices. PCs and mobiles have dozens of software security solutions to protect them from most of the attacks but similar security solutions are missing to protect the rest of the internet of things. Recently, thousands of security cameras were breached to launch a DDOS attack that caused Twitter outage. IoT solutions is not just software but an entire ecosystem of hardware, software, cloud, web and mobile interfaces. This ecosystem is not very mature and there are still major concerns lurking around IoT adoption primarily due to security threats. IoT Top Security Concerns: Device Cloning, Sensitive Data Exposure, Denial of Service, Unauthorized Device Access and Control, Tampering Data. This research work accomplishesthe need to mitigateIoT security challenges Device Cloning and Sensitive Data Exposure.