Security Vulnerabilities, Challenges, and Schemes in IoT-Enabled Technologies

2021 
The Internet of Things (IoT), which has recently witnessed a dramatic surge, has had an immense impact on every aspect of human life, ranging from wearable gears, to sensors monitoring ecological changes in remote locations, to regulating physical metrics in manufacturing processes. Although these large-scale advances in technology have unequivocally reduced human intervention and have significantly integrated devices with the real world, the big question of privacy and protection in IoT devices has been left largely unaddressed and now presents a potential threat to the cyber-landscape. The lack of a standard IoT framework safeguarding privacy across all platforms has been attributed to varied communication protocols, the multitude of programming languages, and differing levels of distributed computing in devices, networking, and perceiving data in real-time systems. This chapter aims to highlight various security- and privacy-related challenges in IoT-enabled technologies. Further, we undertake a case-study-based approach to investigate the various facets of cyberattacks on intellectual property. In its final section, the chapter concludes with a litany of security schemes used with the associated technologies.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    1
    References
    0
    Citations
    NaN
    KQI
    []