Loading

Vulnerabilities, Attacks and their Mitigation: An Implementation on Internet of Things (IoT)
Shamneesh Sharma1, Manoj Manuja2, Keshav Kishore3

1Shamneesh Sharma, Head, Division of Information Technology, Alakh Prakash Goya Shimla University, Shimla (H.P.) India
2Dr. Manoj Manuja, Vertical Head (IT) iNurture Education Solutions, Banglore, India
3Kshav Kishore, Associate Professor, Department of Computer Science & Engineering, Alakh Prakash Goyal Shimla University, Shimla (H.P.) India

Manuscript received on 02 July 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 August 2019 | PP: 146-150 | Volume-8 Issue-10, August 2019 | Retrieval Number: F3761048619/2019©BEIESP | DOI: 10.35940/ijitee.F3761.0881019
Open Access | Ethics and  Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: IoT is much-hyped technology in today’s world still it helps us to achieve the goals of ubiquitous computing. Although, there are many challenges in adoption and implementation of IoT based solutions. One of the major challenges is security of IoT products and services. Day after day exposures like Insecure Firmware, Data Protection, Identity Thefts and DoS/DDoS Attack in the field of IoT are being oppressed with malicious objectives so we need to focus on these security issues. A framework of IoT may use many services on a single platform to give a specific applicability to the applications. These services can be sensor fields, cloud computing and data analytics so the security architecture should ensure its measures on each level such as physical access, remote access and secured data access. This paper presents the study on existing attacks and mitigation in IoT Services which enables for finding and patching security vulnerabilities. With the help of machine learning and data analytics, IoT services and security can be made proactive rather than reactive. 
Keywords: Internet of Things (IoT), Security in IoT, Attacks in IoT, Data Protection in IoT, IoT Services
Scope of the Article: IoT