An Examination of Security and Privacy Challenges in Internet of Things
Aditya Harbola1, Shivani2, Deepti Negi3, Aditya Joshi4
1Aditya Harbola, Department of Computing, Graphic Era Hill University Dehradun (Uttarakhand), India.
2Shivani, Department of Computing, Graphic Era Hill University Dehradun (Uttarakhand), India.
3Deepti Negi, Department of Computing, Graphic Era Hill University Dehradun (Uttarakhand), India.
4Aditya Joshi, Department of CSE, Graphic Era University Dehradun (Uttarakhand), India.
Manuscript received on 15 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript Published on 02 July 2019 | PP: 1-5 | Volume-8 Issue-4S, April 2019 | Retrieval Number: D10010484S19/19©BEIESP | DOI: 10.35940/ijeat.D1001.0484S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The Internet of Things (IoT) has been growing to market from the past several years with great potential. Many several devices have been now available in the market based on IoT, which enables it to connect with your smart phones or with any other kind of smart resources, and then that device is ready to perform smart work via the Internet. With the help of IoT, we are now able to make our devices connect with the internet and then can be operated from anywhere from the geo location as well as it can store and retrieve a large amount of data for better communication between the end-user and the device. IoT also has a wide range of applications that are being used on many platforms. However, this great technology also has to face many problems and among all the problems the main issue arises with its security aspects. The major concern on using IoT security is the hacker wants to enter into the large network system using a particular device as all the devices are connected over the network. Not only this, many other security threats and malware are also a major concern in IoT. So taking these security aspects as a major concern this research paper reviews several security issues and challenges that occur in IoT. As there in every field when it comes to cyber security for any kind of data, we need to follow CIA Security Triangle i.e., Confidentiality, Integrity, and Availability of data. CIA security triangle is the most important concept in terms of security and also must be taken into consideration in the IoT domain. Therefore, considering all these facts and reviewing some of the latest documents as well as researches in the field of IoT, this paper has been based on all the facts related to IoT security issues and its desirable solution which is needed to be done and should follow the security triangle to an extent.
Keywords: Internet of Things, Security Threats, CIA Security Triangle, Solution.
Scope of the Article: Internet of Things