Reference Hub4
Internet of Things: Architectures, Applications, and Challenges

Internet of Things: Architectures, Applications, and Challenges

ISBN13: 9781668481455|ISBN10: 1668481456|ISBN13 Softcover: 9781668481462|EISBN13: 9781668481479
DOI: 10.4018/978-1-6684-8145-5.ch023
Cite Chapter Cite Chapter

MLA

Laturkar, Kaustubh, and Kasturi Laturkar. "Internet of Things: Architectures, Applications, and Challenges." Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies, edited by Thangavel Murugan and Nirmala E., IGI Global, 2023, pp. 456-475. https://doi.org/10.4018/978-1-6684-8145-5.ch023

APA

Laturkar, K. & Laturkar, K. (2023). Internet of Things: Architectures, Applications, and Challenges. In T. Murugan & N. E. (Eds.), Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies (pp. 456-475). IGI Global. https://doi.org/10.4018/978-1-6684-8145-5.ch023

Chicago

Laturkar, Kaustubh, and Kasturi Laturkar. "Internet of Things: Architectures, Applications, and Challenges." In Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies, edited by Thangavel Murugan and Nirmala E., 456-475. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-8145-5.ch023

Export Reference

Mendeley
Favorite

Abstract

With the internet of things (IoT) growing steadily, a wide range of application fields are being offered. These include monitoring health, weather, smart homes, autonomous vehicles, and so on. The result is the incorporation of solutions in various commercial and residential areas and the eventual emergence of them as ubiquitous objects in everyday life. Due to such circumstances, cybersecurity would be essential to mitigate risks, such as data exposure, denial of service efforts, malicious system exploitation, etc. A large majority of entry-level IoT consumer devices lack adequate protection systems, which makes them susceptible to a wide range of malicious attacks. The chapter discusses IoT architectures in depth, along with an analysis of potential applications. A detailed and thorough analysis of challenges in the IoT domain is provided, emphasizing flaws in current commercial IoT solutions and the importance of designing IoT solutions with security and privacy in mind.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.