Counterfeiting Threats in IoT
Kayiram Kavitha1, R.V.S Lalitha2, T.V.Suneetha3, D.Usha Sree4
1Dr. Kayiram Kavitha, Associate Professor, Dept. of CSE, Gokaraju Rangaraju Institute of Engineering and Technology, Bachupally, Hyderabad, Telangana, India.
2Dr. R.V.S.Lalitha, Professor, Dept. of CSE, Aditya College of Engineering, Surampalem, Kakinada, A P, India.
3T.V.Suneetha, Assistant .Professor, Dept. of CSE ,Gokaraju Rangaraju Institute of Engineering and Technology, Bachupally, Hyderabad, Telangana, India.
4D.Usha Sree, Assistant Professor, Dept. of CSE ,Gokaraju Rangaraju Institute of Engineering and Technology, Bachupally, Hyderabad, Telangana, India.
Manuscript received on October 14, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 2990-2992 | Volume-9 Issue-1, November 2019. | Retrieval Number: A9121119119/2019©BEIESP | DOI: 10.35940/ijitee.A9121.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: With the advent of digitalization the entire world is greatly connected to the digital world. The modern gadgets are equipped with Internet-connectivity encouraging web browsing. Due to rapid mobility of devices numerous applications are launched while these come with lot of advantages and wide spread of information they are prone to attacks too. These attacks on IoT devices compromise the security & privacy of the user. The attackers get entry and invade through the data, inject malware, or schedule attacks on neighborhood. In this paper, we present the attacks and the vulnerabilities in IoT, along with the preventive and counter measures to be adapted to safeguard from attacks. We compiled a brief outline of the security breaches and the latest block chain application to implement security in IoT devices as work for future direction.
Keywords: Security, IoT Devices, Block Chain, Threats, Preventive Measures.
Scope of the Article: IoT