Ahmad Bilal, Syed Jahania Shah, Muhammad A. Khan, Manaal Khan, Arwa Hasnain Bharmal, T. Mumtaz
{"title":"Security Threats and Research Challenges of IoT - A Review","authors":"Ahmad Bilal, Syed Jahania Shah, Muhammad A. Khan, Manaal Khan, Arwa Hasnain Bharmal, T. Mumtaz","doi":"10.1109/ICETECC56662.2022.10069706","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) refers to a telecommunication network that allows various objects to connect and share information via the Internet. It allows for machine-to-machine interaction and collaboration that does not necessitate human involvement. Its use has ushered in a new era of everything smart, including smart residences, smart cities, smart buildings, smart agriculture, and more. However, the security and privacy considerations associated with IoT pose significant hurdles. This paper provides a descriptive examination of the layered architecture of the IoT, as well as ways for overcoming security vulnerabilities using already established methods. Furthermore, based on the literature analysis, a more safe layered design that can be readily modified to improve cybersecurity problems has been proposed.","PeriodicalId":364463,"journal":{"name":"2022 International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETECC56662.2022.10069706","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoT) refers to a telecommunication network that allows various objects to connect and share information via the Internet. It allows for machine-to-machine interaction and collaboration that does not necessitate human involvement. Its use has ushered in a new era of everything smart, including smart residences, smart cities, smart buildings, smart agriculture, and more. However, the security and privacy considerations associated with IoT pose significant hurdles. This paper provides a descriptive examination of the layered architecture of the IoT, as well as ways for overcoming security vulnerabilities using already established methods. Furthermore, based on the literature analysis, a more safe layered design that can be readily modified to improve cybersecurity problems has been proposed.