Networking in IoT: Technologies used, Security Threats and Possible Countermeasures
Purnima Gupta1, Aswani Kumar Singh2, Archana Sharma3
1Purnima Gupta*, IT Department, Institute of Management Studies Noida, Noida, India.
2Aswani Kumar Singh, Software Engineer, Soft-Tech Development Solution, DDU, India.
3Dr. Archana Sharma, IT Department, Institute of Management Studies Noida, Noida, India.
Manuscript received on June 17, 2020. | Revised Manuscript received on June 25, 2020. | Manuscript published on July 10, 2020. | PP: 557-563 | Volume-9 Issue-9, July 2020 | Retrieval Number: 100.1/ijitee.I7622079920 | DOI: 10.35940/ijitee.I7622.079920
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: IoT is the networking of daily use objects. Internet of Things amalgamates various kinds of physical object to communicate with each other directly. These objects are commonly known as constrained devices. Constrained devices work with low memory, low storage, and low computation power. Implementing security algorithms in these devices is challenging. The researchers take these challenges as opportunity. The diverse and heterogeneous structure of the IoT phenomenon introduces a variety of new security risks and challenges. Many threats, like botnets, home intrusion, remote control of the IoT devices, and man in the middle attacks, are emerging and need a stronger security implementation to protect IoT devices from being compromised. The authors surveys different kinds of IoT networking technologies, security challenges and solutions of these challenges to form more secure IoT environment for trustful adoption of services through industrial or personal use. In this paper, the authors presented a study of numerous networking technologies along with possible threats and their countermeasures.
Keywords: IoT, RFID, Wi-Fi, Wi MAX, Lo Ra WAN, Ransomware, Botnet, APTs, Intrusion.
Scope of the Article: IoT