Networking in IoT: Technologies Usage, Security Threats, and Possible Countermeasures

Author(s): Deena Nath Gupta, Rajendra Kumar*

Journal Name: International Journal of Sensors, Wireless Communications and Control

Volume 11 , Issue 6 , 2021


Become EABM
Become Reviewer
Call for Editor

Graphical Abstract:


Abstract:

IoT is the networking of daily use objects. These objects are commonly known as constrained devices. Constrained devices work with low memory, low storage, and low computation power. Implementing security algorithms in these devices is challenging. The researchers take these challenges as an opportunity.

The diverse and heterogeneous structure of the IoT phenomenon introduces a variety of new security risks and challenges. Many threats such as botnets, home intrusion, remote control of the IoT devices, and man-in-the-middle attacks are threatening the IoT environment. Hence, it needs stronger security implementation to protect IoT devices from being compromised.

The authors survey different kinds of networking technologies under an IoT environment, security challenges on them, and possible countermeasures for these challenges to form a more secure IoT environment for trustful adaptation of services through industrial or personal use.

In this paper, the authors presented the study of numerous networking technologies, along with possible threats and their countermeasures.

Keywords: IoT, RFID, Wi-Fi, Wi-MAX, LoRaWAN, ransomware, botnet, APTs, intrusion.

Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 11
ISSUE: 6
Year: 2021
Published on: 05 January, 2021
Page: [619 - 626]
Pages: 8
DOI: 10.2174/2210327910666210106090826
Price: $25

Article Metrics

PDF: 75