An In-Depth Evaluation of Protocols for IoT Security Requirements

2021 
All organisations concerned in an IoT network must be protected because it demands massive data collection and sharing. IP counterplans are now the backbone of IoT counterplans, however they are meant to work in numerous levels and give security at different layers. This research paper covers IoT countermeasures and how to secure an IoT network. One of the main problems in defending an IoT network is the dearth of industrial standardisation which determines hardware, applications and information on a range of risk and attacks.This has been supported by implementing the suitable research methods as per the aim of achieving protocol to define the IoT protection of big data. This paper outlines the characteristics of each emerging technology as well as the different ways malware is distributed through these new technologies. Also discusses about the emergence of general attack trends in digital technology.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []