Security Issues and Challenges in IoT Routing over Wireless Communication
G. Saibabu1, Anuj Jain2, V. K. Sharma3

1Saibabu Gutta*, Pursuing Ph. D, Department of Electronics and Communication Engineering, Bhagwant University, Rajasthan, India.
2Anuj Jain, Professor, Lovely Professional University, Punjab, India.
3V. K. Sharma, Professor, Department of Electronics & Telecommunication Engineering, Maharashtra Academy of Engineering, Alandi, Under Pune University, India.
Manuscript received on January 13, 2020. | Revised Manuscript received on January 23, 2020. | Manuscript published on February 10, 2020. | PP: 1572-1580 | Volume-9 Issue-4, February 2020. | Retrieval Number: D1797029420/2020©BEIESP | DOI: 10.35940/ijitee.D1797.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: The participation of Internet devices in different communications through embedded technologies and the adaptive and interactive nature of each communication affects future development tools and applications. The majority of IoT devices are able to communicate over a wireless network, improving their usability and scalability quickly. But these usability improvements drew the attackers’ attention to their personal advantages and created numerous security challenges for detection and protection. Because devices are exposed to the Internet to deliver services, they are particularly vulnerable to various threats to security and privacy. Therefore, a major concern on the Internet of Things (IoT) is the discovery of such abnormal activities that pose a security threat so that appropriate solutions can be provided with a high level of reliability. This paper will be based on a detailed overview of IoT wireless security issues and abnormal activity detection methods. It also provided an overview of the various anomaly detection models and security challenges for launching the IoT connection to the wireless network. 
Keywords: Internet of Things, Security, Challenges, Anomaly Detection, Wireless Sensor Network.
Scope of the Article:  Security service systems