Mr. Kamlesh Kumar Yadav
Assistant Professor
Faculty of Computer Science and IT
Kalinga University, Naya Raipur (C.G.) –INDIA
kamlesh.yadav@kalingauniversity.ac.in
Abstract- The Internet of Things (IoT) is a global network of online-connected physical and digital “things.” Each item has a special ID that is used to identify it. IoT is a new technology that will alter how we communicate with gadgets. Nearly all electronic devices of the future will be intelligent ones that can communicate and do computations with handheld and other infrastructural equipment. Due to the fact that most IoT devices may be battery-operated and have limited computational capacity, security, and privacy are significant problems. The three main security and privacy issues in IoT are authentication, identification, and device heterogeneity. Integration, scalability, ethical communication mechanisms, commercial models, and surveillance are significant obstacles. key security and safety issues are discussed in this study.
The phrase “Internet of Things” (IoT) was first coined and popularised by Kevin Ashton ten years ago. Everything in the Internet of Things (IoT), whether virtual or physical, is able to communicate, be addressed, and be accessed. Understanding IoT is crucial before delving into the privacy and security concerns around it. IoT, when used broadly, refers to the global network of linked devices that communicate with one another online. For optimum functionality, the gadgets exchange information while also creating and gathering data. The entire protocol stack is covered by the broad topic of security and privacy. Authentication, identification, and device heterogeneity are three major security concerns in the Internet of Things. It will be exceedingly challenging to identify billions of gadgets because each one has its own ID. The same is true of authentication. Every device authentication can be a laborious task. Device heterogeneity is one of the main security issues. IoT device manufacturers, cloud providers, and researchers are trying to create security systems and protocols, discover new vulnerabilities, and identify effective solutions to secure data privacy in response to an increasing number of vulnerabilities, assaults, and information breaches. IoT is considered to be a point of vulnerability for cyber-attacks by the majority of security experts due to lax security rules and policies. End users were therefore unable to use security tools to stop data breaches. Devices with IoT capabilities have been employed for a variety of commercial and industrial applications. The apps assist these companies in gaining a competitive advantage over their rivals. To safeguard their company’s assets and guarantee service continuity and stability, it is crucial that experts address these dangerous issues and implement thorough security procedures and policies. Our goal in this work is to give a general overview of IoT applications, advantages, and potential hazards. To create a framework for studying and improving best security practices, as well as to implement, evaluate, and/or create new security measures. On the basis of our results, we offer suggestions for reducing these risks and fixing any potential security flaws. This activity will direct regulatory organizations to continue enforcing laws, and training end users and entities, and stakeholders involved in IoT to design and implement more suitable security and privacy safeguards. Every day that goes by, there are more gadgets in the Internet of Things (IoT) environment. There may be 64 billion IoT devices in use worldwide by 2025. With a significant shift in how daily tasks are carried out, the increase in IoT devices is undoubtedly advantageous. Smart lighting, for instance, might assist in lowering your energy usage and electric expense. The nature of interconnectedness between IoT devices provides an obvious response to the question, “Why security is important in IoT?” The security and resilience of IoT may be impacted if a device with weak security joins the IoT ecosystem. IoT users and developers must be careful to avoid endangering other users because of the widespread deployment of homogeneous devices. The causes behind privacy concerns are one of the most crucial considerations in comprehending the privacy challenges in IoT. With the ability to conduct sample operations and disseminate information from any location, intelligent artifacts are nearly always present in the IoT environment. The protection techniques used to secure network-based or internet-connected devices are referred to as “IoT security.” IoT is a very broad term, and as technology has continued to advance, it has only grown even more so. Nearly all modern electronics, including watches, thermostats, and gaming consoles, have some kind of connectivity to the internet or other devices. The group of methods, plans, and resources known as IoT security are employed to keep these gadgets from being compromised. Ironically, the connectivity of IoT is what makes these gadgets more susceptible to cyber attacks.
Kalinga Plus is an initiative by Kalinga University, Raipur. The main objective of this to disseminate knowledge and guide students & working professionals.
This platform will guide pre – post university level students.
Pre University Level – IX –XII grade students when they decide streams and choose their career
Post University level – when A student joins corporate & needs to handle the workplace challenges effectively.
We are hopeful that you will find lot of knowledgeable & interesting information here.
Happy surfing!!