In this paper. we have articulated that as more and more IoT based devices get connected to the Internet. it results in the extension of the surface area for external attacks. We classified those attacks based on the layers that make up IoT and discussed several such attacks with examples. We have also surveyed the literature on the existing methods to protect the IoT infrastructure and summarized these security methods on how they address the security issues in the IoT. We have summarized the limitations of the existing security methods and proposed future work recommendations to overcome these limitations. In order for the customers to embrace the IoT technologies and the applications. these privacy and security issues and limitations need to be addressed and implemented immediately. so that potential of the IoT technology and their applications can be realized.
Check Also
France’s Electricity Prices Turn Negative amid Poor Demand
Power prices in France turned negative for hours on Tuesday morning amid tepid demand in …