SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 707
Comparative Study of Security Issue and Challenges in IoT
Sayali Vishwanath Pawar
Department of MCA, YMT College of Management, Kharghar, Navi Mumbai, Maharashtra, India
ABSTRACT
In the past few years, Internet of things (IoT) has been a focal point of
research. The Internet of Things (IoT) hold up an expansive scope of uses
including keen urban areas, waste management, auxiliary wellbeing,security,
crisis administrations, coordinations, retails, mechanical control, and
wellbeing care. Privacy and Security are the key issues for IoT applications,
and still face some colossal challenges. In late years, the Internet of Things
(IoT) has increased calculable research consideration. Now days, the IoT is
considered as eventual fate of the web. In future, IoT will assume a significant
job and will change our gauges, plan of action just as living styles. Right now
give a similar report on security issue and difficulties in iot just as a short
depiction on utilizations of iot.
KEYWORDS: Iot, Security issue and challenges, Applications of iot
How to cite this paper:SayaliVishwanath
Pawar "Comparative Study of Security
Issue and Challenges
in IoT" Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-3, April 2020, pp.707-711, URL:
www.ijtsrd.com/papers/ijtsrd30653.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
INTRODUCTION
The expression "Web of things" was presented by Kevin
Ashton in the year 1982.Internet of Things is where every
gadget is relegate to an IP address and through that IP
address, anybody makes that gadget recognizable on web.
The Internet is an advancing element.Itbeganasthe"Webof
Computers." The Internet of Things (IoT) is an arrangement
of interrelated registering gadgets, mechanical and
computerized machines, articles, creatures or individuals
that are given one of a kind identifiers (UIDs) and the
capacity to move information over a system without
expectinghuman-to-human orhuman-to-PCassociation. The
4 primary principal parts in iot are Sensor/Devices,
Connectivity, Data Processing, User Interface. One of the
entrancing highlights of iot gadgets is thattheyareequipped
for creating gigantic measure of information. Iot is likewise
used to store information in cloud the absolute most
captivating iot cloud stages are Google clouds, azure,
Amazon web administration (aws).
With the quick increment in iot application use, some
security issue have constructed forcefully. As iot utilizes
different gadgets and gadgets are turning out to be a piece of
web system subsequently these securityissuerequiredtobe
inspected. As per Study Analyzed by Hewlett Packard
uncover 70% most normally utilized iot gadget hold huge
vulnerabilities. In this paper We will talked about
comparative study of security issue and challenges in iot.
Defination of Iot[1]
Applications of IoT:
Iot is widely used in many areas some of the main
applications of iot are as follows:
IJTSRD30653
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 708
1. Smart Home:
Smart home positioning as the highest IoT application on all
channels. Smart home is the most remarkable and precise
IoT application. Smart home uses web associated gadgets to
empower remote checking frameworks and applications.
Utilizing brilliant home application, we can deal with all our
home gadgets from one spot just as it likewise valuable for
augmenting the home security. the most utilized keen
gadgets are Smart lightning, smart smoke alarm, smart lock,
etc.
2. Wearable:
Like Smart home, Wearable is additionally one of the most
well known IoT application in todays world. Wearable
innovation is trademark ti web on things. Wearable gadgets
have movement sensor. The upside of utilizing wearable
gadgets are it empowering self-obligation, expands work
environment wellbeing, upgrade effectiveness grinding
away, etc. The most regularly utilized wearable gadgets are
smart watch, fit band, smart shoes.
3. Smart city:
Smart city is made out of data and correspondence
technology. Smart city utilizes contraption, for example,
associated sensor, lights. meter to broke down and gather
information. Water supply, electricity supply and open
vehicle are the parts of Smart city.
4. IoT in Industry:
IoT is gainful in the fields where both quicker improvement,
just as the nature of items, are the basic variablesfora better
yield on Investment (ROI). One of such fields is the
assembling businesses, and Industrial Internet of Things
(IIoT) Industrial Internet of Things (IIoT) is an ever
developing and quickly expanding part that represents a
large portion of the portion ofIoTspendingintheworldwide
market. Industrialists and makes in pretty much every part
have an enormous chance to not just screen. Yet in addition
mechanize a considerable lot of complex procedure
associated with assembling. For long time businesses and
plants have had sensors and frameworks to follow progress
yet IoT makes a stride further and givescomplexitiesto even
the moment issues.
5. Smart Agriculture:
Measurements gauge the ever-developing total populace to
arrive at almost 10 billion constantly 2050. To take care of
such a monstrous populace one needs to wed farming to
innovation and get best outcomes. There are various
prospects right now. One of them is the SmartGreenhouse.A
greenhouse farming is a strategy improves the yield of
harvests by controlling natural parameters.Bethatasitmay,
manual dealing with brings about creation misfortune,
vitality misfortune, and work cost, making the procedure
less compelling. A greenhouse with inserted gadgets makes
it simpler to be observed as well as, empowers us to control
the atmosphere inside it. Sensors measure various
parameters as indicated by the plant necessity and sendit to
the cloud. It, at that point, forms the information and applies
a control activity.
Literature Review:
IoT is platform where installedgadgetisassociatedwith web
so they can trade and gather information with one another
and give unique credits and capacity to move information
over a system without needofa human-to-humanorhuman-
to-PC cooperation. While IoT is popular in today’s world so
they also come with some threat.ThevastmajorityoftheIoT
gadgets are associated with web so they can be hacked
simply like some other web subordinate gadget.
The term Internet of Things was first invented by Kevin
Ashton in 1999 in the context of supply chain management
[2]. In this paper we will discuss comparisons between
security issue and challenges in IoT. The meaning of the
Internet of things has advanced because of the combination
of numerous advances, constant examination, AI, product
sensors, and implanted frameworks. [3].IoT usage utilize
diverse specialized correspondences models, each with its
own attributes.Four basicinterchangesmodelsportrayedby
the Internet Architecture Board include: Device-to-Device,
Device-to-Cloud, Device-to-Gateway, and Back-End Data-
Sharing. [4].IoT consists of a variety of objects that are
interconnected and that can communicate with each other
by sending and receiving relevant data.[5].
IoT has numerous applications which are exceptionally
valuable for the individuals people living right now in this
world [6].IoT is generally appropriate for heart checking
implants, biochip transponders on livestock, electric
shellfishes in seaside waters, vehicles with worked in
sensors, gadgets for ecological/nourishment/pathogen
observing or field activity gadgets that help firefighters in
search and salvage tasks[7]. The broad arrangement of
utilizations for IoT gadgets is frequently separated into
buyer, business, modern, and infrastructure spaces[8]. The
IoT's major huge pattern as of late is explosive development
of gadgets associatedandconstrained bytheInternet[9]. The
IoT makes opendoorsformorestraightforwardcombination
of the physical world into PC based frameworks, bringing
about effectiveness enhancements,financial advantages, and
decreased human efforts[10]. The quantity of IoT gadgets
expanded 31% year-over-year to 8.4 billion intheyear2017
and it is assessed that there will be 30 billion gadgets by
2020.The worldwide market estimation of IoTisanticipated
to reach $7.1 trillion by 2020[11].
Philip N. Howard, a teacher and writer, composes that the
Internet of things offers colossal potential for enabling
residents, making government straightforward, and
expanding data get to. Howard alerts, be that as it may, that
security dangers are tremendous, similar to thepotential for
social control and political control[12]. A test for makers of
IoT applications is to clean, process and decipher the huge
measure of information which is assembled by the sensors.
There is an answer proposed for theinvestigationofthedata
alluded to as Wireless Sensor Networks [13]. Security is the
greatest worry in receiving Internet of things technology,
with worries that fast improvement is going on without
proper thought of the significant security challenges
involved and the administrative changes that may be
fundamental[14]. Inadequately made sure about Internet-
open IoT gadgets can likewisebesubvertedtoassaultothers.
In 2016, a dispersed forswearing of administration assault
controlled by Internet of things gadgets running the Mirai
malware brought down a DNS supplier and significant
sites[15].
In this paper we will discuss about security issue and
challenges in iot and how to overcome that challenges.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 709
Research Methadology:
A. How IoT Works:
An IoT framework comprises of sensors/gadgets which
"talk" to the cloud through a network. When theinformation
finds a workable pace, programming forms it and afterward
may choose to play out an activity, for example, sending a
caution or naturally modifying the sensors/gadgets without
the requirement for the client. Be that as it may, if the client
input is required or if the client just needs to monitor the
framework, a UI permits them to do as such. Any alterations
or activities that the client makes are then sent the other
way through the framework: from the UI, to the cloud, and
back to the sensors/gadgets to make a change.
[16] IoT Work
B. Security Issue and challenges in IoT:
A. Security Issue:
1. Botnet:
"Botnet" is a mix of the words "robot" and "network". A
botnet is a system that joins different frameworks together
to remotely assume responsibility for a casualty's
framework and circulate malware. Cyber lawbreakers use
botnets to actuate botnet assaults, which incorporate
malignant exercises, for example, certifications releases,
unapproved get to, information robbery and DDoS attacks.
Linux.Aidra, Bashlite, Mirai,Linux/IRCTelnetarea fewkinds
of iot botnet attacks. Botnet assaultutilizingcustomerserver
model engineering just as shared connection.
To construct a botnet, botmasters need the same number of
contaminated online gadgets or "bots" under their order as
could be allowed. The more bots associated, the greater the
botnet. The greater the botnet, the greater the effect. So size
matters. Botnets aren't normally made to bargain only one
individual PC; they're intended to contaminate a huge
number of gadgets. Bot herders regularly convey botnets
onto PCs through a trojan pony infection.
Progressively intricate botnets can even self-proliferate,
finding and tainting gadgets automatically. Botnets are hard
to recognize. They utilize just limited quantities of
processing capacity to abstain from disturbing ordinary
gadget capacities and alarming the client. Botnets set aside
some effort to develop. Botnets can contaminate practically
any gadget associated straightforwardly or remotely to the
web. PCs, PCs, cell phones, DVR's, smart watches,
surveillance cameras, and brilliant kitchen machines would
all be able to fall inside the trap of a botnet.
Botnet[21]
2. Denial Of Service (DOS) Attack/DDOS:
In processing, a denial of service attack (DoS assault) is a
digital assault wherein the culprit triestomakea machineor
system asset inaccessible to its expected clients by
incidentally or uncertainly upsetting administrations of a
host associated with the Internet. The Internet of Things
offers a wide assortment of brilliant gadgets – all of which
face the trouble of making sure about generally protection.
As the gadgets are for the most part so extraordinary their
heterogenic nature is frequently blamed by makes and
proprietors the same to skirt adequate security controls.
Attackers may get to the savvy applications arrange and
send bulk message to keen gadgets, for example, clear to
send and demand to send They can likewise assault focused
on gadget by utilizing malevolent codes so as to performDoS
assaults on different gadgets that are associatedina brilliant
applications. Thus, brilliant gadgets can't perform
appropriate functionalities in view of depleting assets
because of such assaults. For shirking from this assault, it is
imperative to apply confirmation to square and recognize
unapproved get to.
Denial of Service Attack [22]
3. Man in the Middle attack:
A man-in-the-middle assault is a sort of cyberattack. The
man-in-the-center idea is the place an assailant or
programmer catches a correspondence between two
frameworks. It is a risky assault since it is one where the
assailant acts like the first sender. A man-in-the-center
assault permits a pernicious on-screen character to catch,
send and get information implied for another person, or not
intended to be sent by any means, without either outside
gathering knowing until it is past the point of no return.
Man-in-the-center assaults can be abridged from various
perspectives, including MITM, MitM, MiM or MIM. A MITM
assault abuses the ongoing handling of exchanges,
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 710
discussions or move of other data. sniffing, spoofing are
some thechnique of man in the center assault.
Man in the Middle Attack[23]
4. Device hijacking:
The assailant hijackers and adequately expect control of a
gadget. These assaults are very hard to distinguish on the
grounds that the assailant doesn't change the fundamental
usefulness of the gadget. Additionally, it just takes one
gadget to possibly re-taint others, for instance, brilliant
meters associated with a network. In an IoT situation, a
robber could expect control of a keen meter and utilize the
undermined gadget to dispatch ransom ware assaults
against Energy Management Systems (EMSs) or illicitly
siphon unmetered electrical cables.
5. Insecure Wireless Connectivity:
Most smart application associate with cell phones or tablets
remotely,conceivablyprogrammerssimpleaccesstogadgets
and a platform to an assault on a corporate system.
Numerous remote interchanges can't prepare for a decided,
constrained attack. sometimes beacause of unreliable
remote association we misfortune the reliability,integrity of
that application.
B. Iot Security Challenges:
1. Lack Of Encryption:
In spite of the fact that encryption is an extraordinary
method to keep programmers from getting toinformation,it
is likewise one of the main IoT security challenges. These
gadgets come up short on the capacity and preparing
abilities that would be found on a customary PC. The
outcome is an expansioninassaultswhereprogrammers can
without much of a stretch control the calculations that were
intended for security. Except if aventure settle this issue,
encryption won't be a security resource.
2. Ensure data privacy and integrity:
It is likewise significant that anyplacetheinformationwinds
up after it has been transmitted over the system, it is put
away and handled safely. Executing information security
incorporates redacting or anonymizing delicateinformation
before it is put away or utilizing information partition to
decouple by and by recognizable data from IoT information
payloads. Information that is not, at this point required
ought to be discarded safely, and if information is put away,
keeping up consistence with legitimate and administrative
structures is additionally a significant test. Guaranteeing
information uprightness, which may include utilizing
checksums or advanced marks to guaranteeinformation has
not been altered. Block chain – as a decentralized conveyed
record for IoT information – offers a versatile and strong
methodology for guaranteeing the honesty of IoT
information
3. Technical Concerns:
Because of the expanded utilizationofIoTgadgets,thetraffic
created by these gadgets is too expanding. Subsequently
there is a need to expand arrange limit, subsequently, it is
additionally a test to store the colossal measure of
information for investigation and further last stockpiling.
4. Insurance Concerns:
The insurance agencies introducing IoT gadgets on vehicles
gather information about wellbeing and driving status so as
to take choices about protection
5. Lack of Common Standard:
Since there are numerous principles for IoT gadgets and IoT
fabricating businesses. Consequently, it is a major test to
recognize allowed and non-allowed gadgets associatedwith
the web.
Comparative table of security Issue and challenges
Conclusion:
In this paper ,we conferred the understanding related to
Security issue and challenges in Smart application using iot.
Smart application using iot has many pros and cons.
However the cons directly effects the security of the data.
Security issue is caused by manyfactorslikemanyactive and
passive attcks, spoofing, spamming etc. Security threat
caused due to theft is more. Hence, itis vital to keep
confidential and sensitive data secret In this paper, we have
also discussed about the short information about smart
application and how iot is work on smart application,
challenges of iot as well as some suggested solution of how
security issue can be avoided successfully by using different
technique like data encryption, data confidentiality etc.
REFERENCES
[1] https://thesai.org/Downloads/Volume8
No6/Paper_50Security_Issues_in_the_Inte
rnet_of_Things.pdf
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 711
[2] “Understanding the Internet of Things (IoT) “, July
2014. Gubbi, Jayavardhana,et al “Internet of Things
(IoT): A vision, architectural elements, and future
directions” Future Generation Computer Systems 29.7
(2013): 1645-1660
[3] Rouse, Margaret (2019). "internet of things (IoT)". IOT
Agenda. Retrieved 14 August 2019.
[4] https://www.internetsociety.org/resources/doc/2015
/iot-
overview?gclid=Cj0KCQjw3qzzBRDnARIsAECmryrjKJU
irXuumWSs0QdY7HUidaU8mDAroKfYgw_vBduFTEkM
T7avICUaAp8OEALw_wcB.
[5] Braganza D, Tulasi B. RFID Security Issues in IoT: A
Comparative Study. Orient.J. Comp. Sci. and
Technol;10(1)
[6] M, sheik dawood. (2018). Review on Applications of
Internet of Things (IoT).
[7] Reddy, M & Student, Engineering & Professor,
Assoc&Krishnamohan, Revu. (2017). Applications of
IoT: A Study. 10.13140/RG.2.2.27960.60169.
[8] "The Enterprise Internet of Things Market". Business
Insider. 25 February 2015. Retrieved 26 June 2015
[9] Nordrum, Amy (18 August 2016). "Popular Internet of
Things Forecast of 50 Billion Devices by 2020 Is
Outdated". IEEE Spectrum
[10] Lindner, Tim (13 July 2015). "The Supply Chain:
Changing at the Speed of Technology". Connected
World. Retrieved 18 September 2015.
[11] Hsu, Chin-Lung; Lin, Judy Chuan-Chuan (2016). "An
empirical examination of consumer adoption of
Internet of Things services: Network externalities and
concern for information privacy perspectives".
Computers in Human Behavior.
[12] Howard, Philip N. (2015). Pax Technica: How the
internet of things May Set Us Free, Or Lock Us Up. New
Haven, CT: Yale University Press.
[13] Gubbi, Jayavardhana; Buyya, Rajkumar; Marusic,
Slaven; Palaniswami, Marimuthu (1 September 2013).
"Internet of Things (IoT): A vision, architectural
elements, and future directions".
[14] Feamster, Nick (18 February 2017). "Mitigating the
Increasing Risks of an Insecure Internet of Things".
[15] Woolf, Nicky (26 October 2016). "DDoS attack that
disrupted internet was largest of its kind in history,
experts say
[16] https://www.google.com/url?sa=i&url=https%3A%2F
%2Fwww.quora.com%2FHow-does-the-Internet-of-
Things-
work&psig=AOvVaw3G6kwfgINy79OC4UEYHM0t&ust
=1584766319460000&source=images&cd=vfe&ved=0
CAIQjRxqFwoTCPCM6uKgqOgCFQAAAAAdAAAAABAa
[17] https://cdn4.vectorstock.com/i/1000x1000/70/53/s
mart-home-iot-internet-of-things-control-comfort-
vector-21927053.jpg
[18] https://532386f9a72d1dd857a8-
41058da2837557ec5bfc3b00e1f6cf43.ssl.c
f5.rackcdn.com/wp-
content/uploads/2019/10/Depositphotos_1
25641106_s-2019-239x300.jpg
[19] https://image.slidesharecdn.com/wearables iot-
netcraftacademy-slideshare-141026160827-
conversion-gate01/95/wearables-iot-1-
638.jpg?cb=1552863354
[20] https://blog.econocom.com/en/blog/how-the-
internet-of-things-is-revolutionising-industry/
[21] https://data-flair.training/blogs/wp-
content/uploads/sites/2/2018/05/iot-agri-image-3-
1.jpg
[22] https://www-res.cablelabs.com/wp-
content/uploads/2017/07/28093257/iot-based-
botnet-attack.png
[23] https://m.iotone.com/files/term/denial-of-service-
attack--dos-_6.jpg
[24] https://mest.meste.org/MEST_2_2017/10_ 03.pdf

Contenu connexe

Tendances

Internet of Things
Internet of ThingsInternet of Things
Internet of Thingsijtsrd
 
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...Alex G. Lee, Ph.D. Esq. CLP
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
IOT and Application Performance Monitoring
IOT and Application Performance MonitoringIOT and Application Performance Monitoring
IOT and Application Performance MonitoringSupongkiba Kichu
 
IOT - internet of Things - August 2017
IOT - internet of Things - August 2017IOT - internet of Things - August 2017
IOT - internet of Things - August 2017paul young cpa, cga
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-pptSonalSharnam
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointDr. Mazlan Abbas
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET Journal
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 DocumentAjith Kumar Ravi
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?AbhijitVerma9
 
Emergingtreands class11 cs
Emergingtreands class11 csEmergingtreands class11 cs
Emergingtreands class11 cssahunamita10
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paperJayanth Vinay
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An IntroductionRavindra Dastikop
 
Internet of things - 2020
Internet of things - 2020Internet of things - 2020
Internet of things - 2020Deepak Mankotia
 
Internet of things (IOT)
Internet of things (IOT)Internet of things (IOT)
Internet of things (IOT)Oshin Kandpal
 
Internet of Things (IoT) - workshop with wifi chip
Internet of Things (IoT) - workshop with wifi chipInternet of Things (IoT) - workshop with wifi chip
Internet of Things (IoT) - workshop with wifi chipPairoch Julrat
 

Tendances (19)

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
Silicon Valley Workshop: IoT/Big Data/AI Innovation & Strategy Insights from ...
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
IOT and Application Performance Monitoring
IOT and Application Performance MonitoringIOT and Application Performance Monitoring
IOT and Application Performance Monitoring
 
IOT - internet of Things - August 2017
IOT - internet of Things - August 2017IOT - internet of Things - August 2017
IOT - internet of Things - August 2017
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-ppt
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?What is the Internet of Things? How does it Work?
What is the Internet of Things? How does it Work?
 
CMMC IoT & MQTT
CMMC IoT & MQTTCMMC IoT & MQTT
CMMC IoT & MQTT
 
Emergingtreands class11 cs
Emergingtreands class11 csEmergingtreands class11 cs
Emergingtreands class11 cs
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An Introduction
 
Internet of things - 2020
Internet of things - 2020Internet of things - 2020
Internet of things - 2020
 
Internet of things (IOT)
Internet of things (IOT)Internet of things (IOT)
Internet of things (IOT)
 
Internet of Things (IoT) - workshop with wifi chip
Internet of Things (IoT) - workshop with wifi chipInternet of Things (IoT) - workshop with wifi chip
Internet of Things (IoT) - workshop with wifi chip
 

Similaire à Comparative Study of Security Issue and Challenges in IoT

Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarRAJESHKUMARG12
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxjmindy
 
Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...ijtsrd
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Anil
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetMichelle Singh
 
Dissection of the Internet of Things (IoT) Industry.pdf
Dissection of the Internet of Things (IoT) Industry.pdfDissection of the Internet of Things (IoT) Industry.pdf
Dissection of the Internet of Things (IoT) Industry.pdftheindustryviewmagaz
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of thingsDeva Johnson
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom TrainingsCOEPD HR
 
The Future of IoT Development Trends and Predictions.pdf
The Future of IoT Development Trends and Predictions.pdfThe Future of IoT Development Trends and Predictions.pdf
The Future of IoT Development Trends and Predictions.pdfDark Bears
 
(IoT) Internet of Things, The Ultimate Guide
(IoT) Internet of Things, The Ultimate Guide(IoT) Internet of Things, The Ultimate Guide
(IoT) Internet of Things, The Ultimate GuideRR IT Zone
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingIAEME Publication
 
Internet of Things (Iot) Based Smart Environment and its Applications
Internet of Things (Iot) Based Smart Environment and its ApplicationsInternet of Things (Iot) Based Smart Environment and its Applications
Internet of Things (Iot) Based Smart Environment and its Applicationsijtsrd
 
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfhahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfRamiz ALI
 

Similaire à Comparative Study of Security Issue and Challenges in IoT (20)

Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
 
Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
 
Dissection of the Internet of Things (IoT) Industry.pdf
Dissection of the Internet of Things (IoT) Industry.pdfDissection of the Internet of Things (IoT) Industry.pdf
Dissection of the Internet of Things (IoT) Industry.pdf
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of things
 
IoT Classroom Trainings
IoT Classroom TrainingsIoT Classroom Trainings
IoT Classroom Trainings
 
iot 3.pptx
iot 3.pptxiot 3.pptx
iot 3.pptx
 
The Future of IoT Development Trends and Predictions.pdf
The Future of IoT Development Trends and Predictions.pdfThe Future of IoT Development Trends and Predictions.pdf
The Future of IoT Development Trends and Predictions.pdf
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
(IoT) Internet of Things, The Ultimate Guide
(IoT) Internet of Things, The Ultimate Guide(IoT) Internet of Things, The Ultimate Guide
(IoT) Internet of Things, The Ultimate Guide
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controlling
 
FUTURE OF IOT
FUTURE OF IOTFUTURE OF IOT
FUTURE OF IOT
 
Internet of Things (Iot) Based Smart Environment and its Applications
Internet of Things (Iot) Based Smart Environment and its ApplicationsInternet of Things (Iot) Based Smart Environment and its Applications
Internet of Things (Iot) Based Smart Environment and its Applications
 
Slideshare week1
Slideshare week1Slideshare week1
Slideshare week1
 
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfhahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
 
IOT
IOTIOT
IOT
 

Plus de ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Plus de ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Dernier

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Dernier (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

Comparative Study of Security Issue and Challenges in IoT

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 707 Comparative Study of Security Issue and Challenges in IoT Sayali Vishwanath Pawar Department of MCA, YMT College of Management, Kharghar, Navi Mumbai, Maharashtra, India ABSTRACT In the past few years, Internet of things (IoT) has been a focal point of research. The Internet of Things (IoT) hold up an expansive scope of uses including keen urban areas, waste management, auxiliary wellbeing,security, crisis administrations, coordinations, retails, mechanical control, and wellbeing care. Privacy and Security are the key issues for IoT applications, and still face some colossal challenges. In late years, the Internet of Things (IoT) has increased calculable research consideration. Now days, the IoT is considered as eventual fate of the web. In future, IoT will assume a significant job and will change our gauges, plan of action just as living styles. Right now give a similar report on security issue and difficulties in iot just as a short depiction on utilizations of iot. KEYWORDS: Iot, Security issue and challenges, Applications of iot How to cite this paper:SayaliVishwanath Pawar "Comparative Study of Security Issue and Challenges in IoT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-3, April 2020, pp.707-711, URL: www.ijtsrd.com/papers/ijtsrd30653.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) INTRODUCTION The expression "Web of things" was presented by Kevin Ashton in the year 1982.Internet of Things is where every gadget is relegate to an IP address and through that IP address, anybody makes that gadget recognizable on web. The Internet is an advancing element.Itbeganasthe"Webof Computers." The Internet of Things (IoT) is an arrangement of interrelated registering gadgets, mechanical and computerized machines, articles, creatures or individuals that are given one of a kind identifiers (UIDs) and the capacity to move information over a system without expectinghuman-to-human orhuman-to-PCassociation. The 4 primary principal parts in iot are Sensor/Devices, Connectivity, Data Processing, User Interface. One of the entrancing highlights of iot gadgets is thattheyareequipped for creating gigantic measure of information. Iot is likewise used to store information in cloud the absolute most captivating iot cloud stages are Google clouds, azure, Amazon web administration (aws). With the quick increment in iot application use, some security issue have constructed forcefully. As iot utilizes different gadgets and gadgets are turning out to be a piece of web system subsequently these securityissuerequiredtobe inspected. As per Study Analyzed by Hewlett Packard uncover 70% most normally utilized iot gadget hold huge vulnerabilities. In this paper We will talked about comparative study of security issue and challenges in iot. Defination of Iot[1] Applications of IoT: Iot is widely used in many areas some of the main applications of iot are as follows: IJTSRD30653
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 708 1. Smart Home: Smart home positioning as the highest IoT application on all channels. Smart home is the most remarkable and precise IoT application. Smart home uses web associated gadgets to empower remote checking frameworks and applications. Utilizing brilliant home application, we can deal with all our home gadgets from one spot just as it likewise valuable for augmenting the home security. the most utilized keen gadgets are Smart lightning, smart smoke alarm, smart lock, etc. 2. Wearable: Like Smart home, Wearable is additionally one of the most well known IoT application in todays world. Wearable innovation is trademark ti web on things. Wearable gadgets have movement sensor. The upside of utilizing wearable gadgets are it empowering self-obligation, expands work environment wellbeing, upgrade effectiveness grinding away, etc. The most regularly utilized wearable gadgets are smart watch, fit band, smart shoes. 3. Smart city: Smart city is made out of data and correspondence technology. Smart city utilizes contraption, for example, associated sensor, lights. meter to broke down and gather information. Water supply, electricity supply and open vehicle are the parts of Smart city. 4. IoT in Industry: IoT is gainful in the fields where both quicker improvement, just as the nature of items, are the basic variablesfora better yield on Investment (ROI). One of such fields is the assembling businesses, and Industrial Internet of Things (IIoT) Industrial Internet of Things (IIoT) is an ever developing and quickly expanding part that represents a large portion of the portion ofIoTspendingintheworldwide market. Industrialists and makes in pretty much every part have an enormous chance to not just screen. Yet in addition mechanize a considerable lot of complex procedure associated with assembling. For long time businesses and plants have had sensors and frameworks to follow progress yet IoT makes a stride further and givescomplexitiesto even the moment issues. 5. Smart Agriculture: Measurements gauge the ever-developing total populace to arrive at almost 10 billion constantly 2050. To take care of such a monstrous populace one needs to wed farming to innovation and get best outcomes. There are various prospects right now. One of them is the SmartGreenhouse.A greenhouse farming is a strategy improves the yield of harvests by controlling natural parameters.Bethatasitmay, manual dealing with brings about creation misfortune, vitality misfortune, and work cost, making the procedure less compelling. A greenhouse with inserted gadgets makes it simpler to be observed as well as, empowers us to control the atmosphere inside it. Sensors measure various parameters as indicated by the plant necessity and sendit to the cloud. It, at that point, forms the information and applies a control activity. Literature Review: IoT is platform where installedgadgetisassociatedwith web so they can trade and gather information with one another and give unique credits and capacity to move information over a system without needofa human-to-humanorhuman- to-PC cooperation. While IoT is popular in today’s world so they also come with some threat.ThevastmajorityoftheIoT gadgets are associated with web so they can be hacked simply like some other web subordinate gadget. The term Internet of Things was first invented by Kevin Ashton in 1999 in the context of supply chain management [2]. In this paper we will discuss comparisons between security issue and challenges in IoT. The meaning of the Internet of things has advanced because of the combination of numerous advances, constant examination, AI, product sensors, and implanted frameworks. [3].IoT usage utilize diverse specialized correspondences models, each with its own attributes.Four basicinterchangesmodelsportrayedby the Internet Architecture Board include: Device-to-Device, Device-to-Cloud, Device-to-Gateway, and Back-End Data- Sharing. [4].IoT consists of a variety of objects that are interconnected and that can communicate with each other by sending and receiving relevant data.[5]. IoT has numerous applications which are exceptionally valuable for the individuals people living right now in this world [6].IoT is generally appropriate for heart checking implants, biochip transponders on livestock, electric shellfishes in seaside waters, vehicles with worked in sensors, gadgets for ecological/nourishment/pathogen observing or field activity gadgets that help firefighters in search and salvage tasks[7]. The broad arrangement of utilizations for IoT gadgets is frequently separated into buyer, business, modern, and infrastructure spaces[8]. The IoT's major huge pattern as of late is explosive development of gadgets associatedandconstrained bytheInternet[9]. The IoT makes opendoorsformorestraightforwardcombination of the physical world into PC based frameworks, bringing about effectiveness enhancements,financial advantages, and decreased human efforts[10]. The quantity of IoT gadgets expanded 31% year-over-year to 8.4 billion intheyear2017 and it is assessed that there will be 30 billion gadgets by 2020.The worldwide market estimation of IoTisanticipated to reach $7.1 trillion by 2020[11]. Philip N. Howard, a teacher and writer, composes that the Internet of things offers colossal potential for enabling residents, making government straightforward, and expanding data get to. Howard alerts, be that as it may, that security dangers are tremendous, similar to thepotential for social control and political control[12]. A test for makers of IoT applications is to clean, process and decipher the huge measure of information which is assembled by the sensors. There is an answer proposed for theinvestigationofthedata alluded to as Wireless Sensor Networks [13]. Security is the greatest worry in receiving Internet of things technology, with worries that fast improvement is going on without proper thought of the significant security challenges involved and the administrative changes that may be fundamental[14]. Inadequately made sure about Internet- open IoT gadgets can likewisebesubvertedtoassaultothers. In 2016, a dispersed forswearing of administration assault controlled by Internet of things gadgets running the Mirai malware brought down a DNS supplier and significant sites[15]. In this paper we will discuss about security issue and challenges in iot and how to overcome that challenges.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 709 Research Methadology: A. How IoT Works: An IoT framework comprises of sensors/gadgets which "talk" to the cloud through a network. When theinformation finds a workable pace, programming forms it and afterward may choose to play out an activity, for example, sending a caution or naturally modifying the sensors/gadgets without the requirement for the client. Be that as it may, if the client input is required or if the client just needs to monitor the framework, a UI permits them to do as such. Any alterations or activities that the client makes are then sent the other way through the framework: from the UI, to the cloud, and back to the sensors/gadgets to make a change. [16] IoT Work B. Security Issue and challenges in IoT: A. Security Issue: 1. Botnet: "Botnet" is a mix of the words "robot" and "network". A botnet is a system that joins different frameworks together to remotely assume responsibility for a casualty's framework and circulate malware. Cyber lawbreakers use botnets to actuate botnet assaults, which incorporate malignant exercises, for example, certifications releases, unapproved get to, information robbery and DDoS attacks. Linux.Aidra, Bashlite, Mirai,Linux/IRCTelnetarea fewkinds of iot botnet attacks. Botnet assaultutilizingcustomerserver model engineering just as shared connection. To construct a botnet, botmasters need the same number of contaminated online gadgets or "bots" under their order as could be allowed. The more bots associated, the greater the botnet. The greater the botnet, the greater the effect. So size matters. Botnets aren't normally made to bargain only one individual PC; they're intended to contaminate a huge number of gadgets. Bot herders regularly convey botnets onto PCs through a trojan pony infection. Progressively intricate botnets can even self-proliferate, finding and tainting gadgets automatically. Botnets are hard to recognize. They utilize just limited quantities of processing capacity to abstain from disturbing ordinary gadget capacities and alarming the client. Botnets set aside some effort to develop. Botnets can contaminate practically any gadget associated straightforwardly or remotely to the web. PCs, PCs, cell phones, DVR's, smart watches, surveillance cameras, and brilliant kitchen machines would all be able to fall inside the trap of a botnet. Botnet[21] 2. Denial Of Service (DOS) Attack/DDOS: In processing, a denial of service attack (DoS assault) is a digital assault wherein the culprit triestomakea machineor system asset inaccessible to its expected clients by incidentally or uncertainly upsetting administrations of a host associated with the Internet. The Internet of Things offers a wide assortment of brilliant gadgets – all of which face the trouble of making sure about generally protection. As the gadgets are for the most part so extraordinary their heterogenic nature is frequently blamed by makes and proprietors the same to skirt adequate security controls. Attackers may get to the savvy applications arrange and send bulk message to keen gadgets, for example, clear to send and demand to send They can likewise assault focused on gadget by utilizing malevolent codes so as to performDoS assaults on different gadgets that are associatedina brilliant applications. Thus, brilliant gadgets can't perform appropriate functionalities in view of depleting assets because of such assaults. For shirking from this assault, it is imperative to apply confirmation to square and recognize unapproved get to. Denial of Service Attack [22] 3. Man in the Middle attack: A man-in-the-middle assault is a sort of cyberattack. The man-in-the-center idea is the place an assailant or programmer catches a correspondence between two frameworks. It is a risky assault since it is one where the assailant acts like the first sender. A man-in-the-center assault permits a pernicious on-screen character to catch, send and get information implied for another person, or not intended to be sent by any means, without either outside gathering knowing until it is past the point of no return. Man-in-the-center assaults can be abridged from various perspectives, including MITM, MitM, MiM or MIM. A MITM assault abuses the ongoing handling of exchanges,
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 710 discussions or move of other data. sniffing, spoofing are some thechnique of man in the center assault. Man in the Middle Attack[23] 4. Device hijacking: The assailant hijackers and adequately expect control of a gadget. These assaults are very hard to distinguish on the grounds that the assailant doesn't change the fundamental usefulness of the gadget. Additionally, it just takes one gadget to possibly re-taint others, for instance, brilliant meters associated with a network. In an IoT situation, a robber could expect control of a keen meter and utilize the undermined gadget to dispatch ransom ware assaults against Energy Management Systems (EMSs) or illicitly siphon unmetered electrical cables. 5. Insecure Wireless Connectivity: Most smart application associate with cell phones or tablets remotely,conceivablyprogrammerssimpleaccesstogadgets and a platform to an assault on a corporate system. Numerous remote interchanges can't prepare for a decided, constrained attack. sometimes beacause of unreliable remote association we misfortune the reliability,integrity of that application. B. Iot Security Challenges: 1. Lack Of Encryption: In spite of the fact that encryption is an extraordinary method to keep programmers from getting toinformation,it is likewise one of the main IoT security challenges. These gadgets come up short on the capacity and preparing abilities that would be found on a customary PC. The outcome is an expansioninassaultswhereprogrammers can without much of a stretch control the calculations that were intended for security. Except if aventure settle this issue, encryption won't be a security resource. 2. Ensure data privacy and integrity: It is likewise significant that anyplacetheinformationwinds up after it has been transmitted over the system, it is put away and handled safely. Executing information security incorporates redacting or anonymizing delicateinformation before it is put away or utilizing information partition to decouple by and by recognizable data from IoT information payloads. Information that is not, at this point required ought to be discarded safely, and if information is put away, keeping up consistence with legitimate and administrative structures is additionally a significant test. Guaranteeing information uprightness, which may include utilizing checksums or advanced marks to guaranteeinformation has not been altered. Block chain – as a decentralized conveyed record for IoT information – offers a versatile and strong methodology for guaranteeing the honesty of IoT information 3. Technical Concerns: Because of the expanded utilizationofIoTgadgets,thetraffic created by these gadgets is too expanding. Subsequently there is a need to expand arrange limit, subsequently, it is additionally a test to store the colossal measure of information for investigation and further last stockpiling. 4. Insurance Concerns: The insurance agencies introducing IoT gadgets on vehicles gather information about wellbeing and driving status so as to take choices about protection 5. Lack of Common Standard: Since there are numerous principles for IoT gadgets and IoT fabricating businesses. Consequently, it is a major test to recognize allowed and non-allowed gadgets associatedwith the web. Comparative table of security Issue and challenges Conclusion: In this paper ,we conferred the understanding related to Security issue and challenges in Smart application using iot. Smart application using iot has many pros and cons. However the cons directly effects the security of the data. Security issue is caused by manyfactorslikemanyactive and passive attcks, spoofing, spamming etc. Security threat caused due to theft is more. Hence, itis vital to keep confidential and sensitive data secret In this paper, we have also discussed about the short information about smart application and how iot is work on smart application, challenges of iot as well as some suggested solution of how security issue can be avoided successfully by using different technique like data encryption, data confidentiality etc. REFERENCES [1] https://thesai.org/Downloads/Volume8 No6/Paper_50Security_Issues_in_the_Inte rnet_of_Things.pdf
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30653 | Volume – 4 | Issue – 3 | March-April 2020 Page 711 [2] “Understanding the Internet of Things (IoT) “, July 2014. Gubbi, Jayavardhana,et al “Internet of Things (IoT): A vision, architectural elements, and future directions” Future Generation Computer Systems 29.7 (2013): 1645-1660 [3] Rouse, Margaret (2019). "internet of things (IoT)". IOT Agenda. Retrieved 14 August 2019. [4] https://www.internetsociety.org/resources/doc/2015 /iot- overview?gclid=Cj0KCQjw3qzzBRDnARIsAECmryrjKJU irXuumWSs0QdY7HUidaU8mDAroKfYgw_vBduFTEkM T7avICUaAp8OEALw_wcB. [5] Braganza D, Tulasi B. RFID Security Issues in IoT: A Comparative Study. Orient.J. Comp. Sci. and Technol;10(1) [6] M, sheik dawood. (2018). Review on Applications of Internet of Things (IoT). [7] Reddy, M & Student, Engineering & Professor, Assoc&Krishnamohan, Revu. (2017). Applications of IoT: A Study. 10.13140/RG.2.2.27960.60169. [8] "The Enterprise Internet of Things Market". Business Insider. 25 February 2015. Retrieved 26 June 2015 [9] Nordrum, Amy (18 August 2016). "Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated". IEEE Spectrum [10] Lindner, Tim (13 July 2015). "The Supply Chain: Changing at the Speed of Technology". Connected World. Retrieved 18 September 2015. [11] Hsu, Chin-Lung; Lin, Judy Chuan-Chuan (2016). "An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives". Computers in Human Behavior. [12] Howard, Philip N. (2015). Pax Technica: How the internet of things May Set Us Free, Or Lock Us Up. New Haven, CT: Yale University Press. [13] Gubbi, Jayavardhana; Buyya, Rajkumar; Marusic, Slaven; Palaniswami, Marimuthu (1 September 2013). "Internet of Things (IoT): A vision, architectural elements, and future directions". [14] Feamster, Nick (18 February 2017). "Mitigating the Increasing Risks of an Insecure Internet of Things". [15] Woolf, Nicky (26 October 2016). "DDoS attack that disrupted internet was largest of its kind in history, experts say [16] https://www.google.com/url?sa=i&url=https%3A%2F %2Fwww.quora.com%2FHow-does-the-Internet-of- Things- work&psig=AOvVaw3G6kwfgINy79OC4UEYHM0t&ust =1584766319460000&source=images&cd=vfe&ved=0 CAIQjRxqFwoTCPCM6uKgqOgCFQAAAAAdAAAAABAa [17] https://cdn4.vectorstock.com/i/1000x1000/70/53/s mart-home-iot-internet-of-things-control-comfort- vector-21927053.jpg [18] https://532386f9a72d1dd857a8- 41058da2837557ec5bfc3b00e1f6cf43.ssl.c f5.rackcdn.com/wp- content/uploads/2019/10/Depositphotos_1 25641106_s-2019-239x300.jpg [19] https://image.slidesharecdn.com/wearables iot- netcraftacademy-slideshare-141026160827- conversion-gate01/95/wearables-iot-1- 638.jpg?cb=1552863354 [20] https://blog.econocom.com/en/blog/how-the- internet-of-things-is-revolutionising-industry/ [21] https://data-flair.training/blogs/wp- content/uploads/sites/2/2018/05/iot-agri-image-3- 1.jpg [22] https://www-res.cablelabs.com/wp- content/uploads/2017/07/28093257/iot-based- botnet-attack.png [23] https://m.iotone.com/files/term/denial-of-service- attack--dos-_6.jpg [24] https://mest.meste.org/MEST_2_2017/10_ 03.pdf