In this paper. we have articulated that as more and more IoT based devices get connected to the Internet. it results in the extension of the surface area for external attacks. We classified those attacks based on the layers that make up IoT and discussed several such attacks with examples. We have also surveyed the literature on the existing methods to protect the IoT infrastructure and summarized these security methods on how they address the security issues in the IoT. We have summarized the limitations of the existing security methods and proposed future work recommendations to overcome these limitations. In order for the customers to embrace the IoT technologies and the applications. these privacy and security issues and limitations need to be addressed and implemented immediately. so that potential of the IoT technology and their applications can be realized.
Check Also
Southeast Asia will be a Major Energy Power for the next Decade
Southeast Asia’s role in the global energy system is set to grow strongly over the …