An Elementary Research Scope and Constraints with IOT
Pages : 734-738, DOI: https://doi.org/10.14741/ijmcr/v.8.5.8Download PDF
The IoT is known as one of the most imperative zones of upcoming expertise in the Information Technology and is achieving huge devotion from a wide range of industries. The Internet of Things (IoT) opens opportunities for computing devices, home appliances, and software to share and communicate information on the Internet. The IoT consents objects to be sensed and/or controlled remotely across current network set-up, producing opportunities for more incorporation of the physical world into computer-based systems, and consequence in better accuracy, efficiency and economic advantage. In this paper, we begin with elementary information related to IoT with different challenges and four layered cyber security architecture. Protocols used in IoT systems can have security issues that can affect the entire systems. The Paper also comprises the Taxonomy of security attacks within IoT networks. We categorize different attacks into eight classifications which are erected to assist IoT users or developers for better awareness of the risk of security faults so that better defences shall be incorporated.
Keywords: Internet of Things, IoT, IoMT, Smart Healthcare, layered architectures, Cyber security, Sensing Layer, attacks, SCA, PaaS, PaaS, Phishing Attack, Taxonomy, RFID.