Reference Hub3
A Comprehensive Study on Internet of Things Security: Challenges and Recommendations

A Comprehensive Study on Internet of Things Security: Challenges and Recommendations

Manikandakumar Muthusamy, Karthikeyan Periasamy
Copyright: © 2019 |Pages: 15
ISBN13: 9781522571490|ISBN10: 1522571493|ISBN13 Softcover: 9781522586784|EISBN13: 9781522571506
DOI: 10.4018/978-1-5225-7149-0.ch004
Cite Chapter Cite Chapter

MLA

Muthusamy, Manikandakumar, and Karthikeyan Periasamy. "A Comprehensive Study on Internet of Things Security: Challenges and Recommendations." Advancing Consumer-Centric Fog Computing Architectures, edited by Kashif Munir, IGI Global, 2019, pp. 72-86. https://doi.org/10.4018/978-1-5225-7149-0.ch004

APA

Muthusamy, M. & Periasamy, K. (2019). A Comprehensive Study on Internet of Things Security: Challenges and Recommendations. In K. Munir (Ed.), Advancing Consumer-Centric Fog Computing Architectures (pp. 72-86). IGI Global. https://doi.org/10.4018/978-1-5225-7149-0.ch004

Chicago

Muthusamy, Manikandakumar, and Karthikeyan Periasamy. "A Comprehensive Study on Internet of Things Security: Challenges and Recommendations." In Advancing Consumer-Centric Fog Computing Architectures, edited by Kashif Munir, 72-86. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7149-0.ch004

Export Reference

Mendeley
Favorite

Abstract

Internet of things is a growing technology with many business opportunities and risks. It is strongly believed that IoT will cause a major shift in people's lives similar to how the internet transformed the way people communicate and share information. IoT is becoming popular in the various domains such as smart health, smart cities, smart transport, and smart retail. The security and privacy concerns of IoT are crucial as it connects a large number of devices. Security is a more critical issue that certainly needs to be resolved with a high level of attention, as with an increasing number of users, there would be a need to manage their requests and check authenticity on the cloud-based pattern. Recently, a series of massive distributed denial-of-service attacks have occurred in IoT organizations. Such malicious attacks have highlighted the threats resulting from not enough security in IoT devices together with their overwhelming effects on the internet. This chapter provides an overview of the security attacks with regard to IoT technologies, protocols, and applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.