An Insight of Existing Research Methods towards Securing IoT Communication System
Nasreen Fathima1, Reshma Banu2, G.F Ali Ahammed3
1Nasreen Fathima, Assistant Professor, Department of Computer Science Engineering, ATME College of Engineering, Mysuru, India.
1Dr. Reshma Banu, Professor & Head, Department of Information Science & Engineering, GSSSIETW, Mysuru, India.
3Dr. G.F Ali Ahammed, Department of Computer Science Engineering, VTU Post Graduate Centre, Mysuru, India.
Manuscript received on January 13, 2020. | Revised Manuscript received on January 25, 2020. | Manuscript published on February 10, 2020. | PP: 1362-1371 | Volume-9 Issue-4, February 2020. | Retrieval Number: D1621029420/2020©BEIESP | DOI: 10.35940/ijitee.D1621.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: IoT is an advanced analytics system that incorporates physical devices, intelligent technologies, and internet services to provide automation services and cost-effective productivity. The IoT oriented framework offers effective control, stabilized execution, and translucent services when it is applied to any enterprise. However, IoT devices are at risk of many security threats because they communicate and operate smart device services over wide distributed networks (i.e., insecure Internet channels). Over the past few years, it has been witnessed that several types of malicious activities have been tried to undermine the security and privacy of sensor networks as well as Internet-based applications. In order to protect IoT devices, many research works have been carried out to address potential security attack and to find an optimal way to overcome and limit the risk factors that affect security requirement and individual privacy. Therefore, this paper carries an assessment of the existing research works in order to understand better the root cause of the new possible threat and the challenges associated with IoT security. The paper also reflects the research trend to demonstrate the current status of security methods being developed till date. The prime motive of the present work is to reveal the current research gap and make an effective contribution to the future research direction.
Keywords: Internet of Things, Privacy, Security, Authentication, Adversary, Ransomware, Cryptography.
Scope of the Article: Cryptography and Applied Mathematics