A Comprehensive Study of Cyber Security Attacks, Classification, and Countermeasures in the Internet of Things

A Comprehensive Study of Cyber Security Attacks, Classification, and Countermeasures in the Internet of Things

Md Alimul Haque (Department of Computer Science, Veer Kunwar Singh University, Ara, India), Shameemul Haque (Al-Hafeez College, Ara, India), Kailash Kumar (College of Computing and Informatics, Saudi Electronic University, Riyadh, Saudi Arabia) and Narendra Kumar Singh (Department of Physics, V. K. S. University, Ara, India)
DOI: 10.4018/978-1-7998-4201-9.ch004
OnDemand PDF Download:
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The role of the internet of things (IoT) and cyberspace in a digital society is well recognized, and they have become tremendously popular due to certain features like the ability to ease the operational process of businesses and instant communication. Recent developments in the fields of wireless communication networks like 4G, 5G, and 6G with IoT applications have greatly benefited human welfare. Still, the rapid growth of various IoT applications focuses on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. It has also contributed to unethical practices by hackers who use new tools and techniques to penetrate more complex or well-controlled environments and produce increased damage and even remain under the cover. The main objective of this chapter is to improve understanding of the challenges to secure future digital infrastructure while it is still evolving. In this context, a detailed review of the security-related issues, challenges, threats, and countermeasures in the IoT applications is presented.
Chapter Preview
Top

As IoT applications combine with diverse systems, these are expected to be rapidly developed in the future, and more in-depth studies are being conducted for the same. In this literature review, we emphasize the importance of security requirements that clarified the relationship of security-related factors of Wireless Sensor Networks (WSNs) through a detailed analysis of the existing studies.

Complete Chapter List

Search this Book:
Reset