S. Gautam, Ayasha Malik, Nanhay Singh, Suresh Kumar
{"title":"Recent Advances and Countermeasures Against Various Attacks in IoT Environment","authors":"S. Gautam, Ayasha Malik, Nanhay Singh, Suresh Kumar","doi":"10.1109/ICSPC46172.2019.8976527","DOIUrl":null,"url":null,"abstract":"Over the past some decennium, Internet technology experienced flying growth, extremely in the Internet of Things (IoT). The current improvements that have changed the means of people living, says Smart devices that are able of contacting anybody, anytime and anywhere. In contrast with traditional Internet, an IoT tie sizeable machines, humans, resource-strained gadget/devices and sensors over miscellaneous wired and wireless networks. In this paper, we presented a survey on security of IoT and analyzed the recent, primary concerns that relate to it. This paper probes the security goals of IoT, provides a classification of attacks with their correction, on the basis of layers. The main aim is to find how, when, and why an IoT was compromised or involved in commitment with attack.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPC46172.2019.8976527","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Over the past some decennium, Internet technology experienced flying growth, extremely in the Internet of Things (IoT). The current improvements that have changed the means of people living, says Smart devices that are able of contacting anybody, anytime and anywhere. In contrast with traditional Internet, an IoT tie sizeable machines, humans, resource-strained gadget/devices and sensors over miscellaneous wired and wireless networks. In this paper, we presented a survey on security of IoT and analyzed the recent, primary concerns that relate to it. This paper probes the security goals of IoT, provides a classification of attacks with their correction, on the basis of layers. The main aim is to find how, when, and why an IoT was compromised or involved in commitment with attack.