{"title":"Challenges & Security Threats in IoT with Solution Architectures","authors":"Saloni Bansal, V. Tomar","doi":"10.1109/PARC52418.2022.9726660","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is only the next step in communication’s evolution. Physical items may be required to efficiently create, gather, and exchange data via the Internet of Things. Certain Internet of Things technologies strive to automate various tasks and allow inanimate physical things to function without the need for human contact. It gives users reliability and flexibility by moving data across a network without requiring any human-to-computer or human-to-human connection, but it also opens up a new world of possibilities. Security methods with the ability to manage several platforms while retaining the same level of security are of high quality. Being able to interact with a range of devices is essential. This article examines the primary issues that arise during the installation of the Internet of Things, as well as the numerous security dangers that exist in today’s world, and how to mitigate these security risks using a variety of ways.","PeriodicalId":158896,"journal":{"name":"2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PARC52418.2022.9726660","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The Internet of Things (IoT) is only the next step in communication’s evolution. Physical items may be required to efficiently create, gather, and exchange data via the Internet of Things. Certain Internet of Things technologies strive to automate various tasks and allow inanimate physical things to function without the need for human contact. It gives users reliability and flexibility by moving data across a network without requiring any human-to-computer or human-to-human connection, but it also opens up a new world of possibilities. Security methods with the ability to manage several platforms while retaining the same level of security are of high quality. Being able to interact with a range of devices is essential. This article examines the primary issues that arise during the installation of the Internet of Things, as well as the numerous security dangers that exist in today’s world, and how to mitigate these security risks using a variety of ways.