This paper is published in Volume-5, Issue-2, 2019
Area
Cyber Security
Author
M. Hemanth Kumar, Dr. A. Swarupa Rani
Org/Univ
Siddharth Institute of Engineering and Technology, Chittoor, Andhra Pradesh, India
Keywords
Internet of Things, Cyber-attack, Security threats
Citations
IEEE
M. Hemanth Kumar, Dr. A. Swarupa Rani. Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
M. Hemanth Kumar, Dr. A. Swarupa Rani (2019). Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.
MLA
M. Hemanth Kumar, Dr. A. Swarupa Rani. "Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.
M. Hemanth Kumar, Dr. A. Swarupa Rani. Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
M. Hemanth Kumar, Dr. A. Swarupa Rani (2019). Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.
MLA
M. Hemanth Kumar, Dr. A. Swarupa Rani. "Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.
Abstract
Internet of Things (IoT) devices is rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides, analyze and characterize intruders and attacks facing IoT devices and services.