IJFANS International Journal of Food and Nutritional Sciences

ISSN PRINT 2319 1775 Online 2320-7876

SECURITY REQUIREMENTS AND CHALLENGES IN INTERNET OF THINGS (IOT)

Main Article Content

Amanpreet Kaur

Abstract

Industry 4.0, smart cities, and smart homes are just a few examples of how the Internet has expanded beyond the virtual realm in the previous twenty years. Increased energy efficiency, streamlined and automated procedures, and improved comfort are just a few of the numerous advantages brought to consumers by the Internet of Things (IoT), but it also raises new privacy and security issues. The proliferation of Internet-enabled gadgets opens up interesting possibilities for technological progress. The manufacturing and widespread integration of Internet of Things (IoT) items into daily life raises new security concerns. In order to facilitate data analytics on other devices, sensors will gather private and public information in unprecedented quantities and communicate it across a wireless channel that can be readily monitored(1). More and more gadgets are being made, but many of them skimp on security to be "first to market." In addition, the protocols upon which modern security methods rely were developed with higher-powered, more feature-rich devices in mind, such as desktop computers and cellular phones. Many of the security issues plaguing the Internet of Things currently have no good answers due to the relative youth of the underlying technologies. Security measures tailored to the evolving Internet of Things (IoT) are essential for ensuring that users' information remains private and safe(2). This article describes some of the most pressing issues with the Internet of Things and ranks their relative importance to assist pinpoint areas of weakness that need to be addressed. Solutions that are specific to the limitations of the IoT are provided with a focus on these critical issues. To better manage the disparate nature of IoT infrastructure, a framework based on security features is designed to categorize devices into distinct groups. To demonstrate the viability of IoT devices and networks, a unique physical device authentication approach is given. As outlined in the aforementioned framework, further low-power approaches are developed and assessed to determine the many security options accessible to IoT devices.

Article Details