Cyber security in internet of things

Cyber security in internet of things

Asim IsmailMuhammad Saad Robert Abbas 

Shaheed Zulfikar Ali Bhutto Institute of Science & Technology Dubai Campus 345004, United Arab Emirates

Macquarie University Sydney NSW 2109, Australia

Corresponding Author Email: 
asimismail7@gmail.com
Page: 
17-22
|
DOI: 
https://doi.org/10.18280/rces.050104
Received: 
20 January 2018
|
Accepted: 
29 March 2018
|
Published: 
31 March 2018
| Citation

OPEN ACCESS

Abstract: 

Internet has become a vital part of our lives. The number of internet connected devices are increasing every day and approximate there will be 34 billion IoT devices by 2020. It is observed that security is very weak in these devices and they can be easily compromised by hacker as some manufactures failed to implement basic security. Current devices use standards that are easy to implement and works for most forms of communications and storage. There is no such standard solution that will work on every device within the Internet of Things, because of the varied constraints between different devices, resulting in classifications within the Internet of Things.

This research addresses security challenges in the Internet of Things (IoT). To this end, it’s the discussions of the IoT evolution, architecture and its applications in industries. Secondly, it classifies and examines privacy threats by survey, pointing out the challenges that need to be overcome to ensure that the Internet of Things becomes a reality.

Keywords: 

Internet of things, cybersecurity, cybersecurity challenges and recommendations

1. Introduction
2. The Importance of Iot Data
3. Material and Methods
4. Result and Findings
5. Discussion and Future Work
  References

[1] Nermin Hajdarbegovic, Toptal. (2014). https://www.toptal.com/it/are-we-creating-an-insecure-internet-of-things, accessed on Jan. 17, 2018.

[2] NICOLE PERLROTH VINDU GOEL. (2016). http://www.nytimes.com/2016/12/14/technology/yahoo-hack.html?_r=0, accessed on Jan. 29, 2018.

[3] Johnson RW. (2006). http://www.qualres.org/HomeWhat-3513.html, accessed on Feb. 10, 2018.

[4] Given LM. (2008). The SAGE Encyclopedia of Qualitative Research Methods, 2nd ed. Charles Sturt University, Australia: SAGE Publications, Inc. https://en.wikipedia.org/wiki/Quantitative_research, accessed on Feb. 10, 2018.

[5] Gemalto. (2016). http://breachlevelindex.com/assets/Breach-Level-Index-Report-H12016.pdf, accessed on Jan. 10, 2018.