Security Issues and Vulnerability of IoT Devices Kurdistan Ali & Shavan Askar

Security Issues and Vulnerability of IoT Devices

Author (s)

Kurdistan Ali & Shavan Askar

Abstract

­

The principle of linking intelligent device to the internet is taken out in the internet of things. This model facilitates the relation across the Cloud between the intellectual real items and the separate contact parties, such as the servers, the cellular devices. Internet of things is entering in all aspects of life including home, industries, medical care, cars, sensors, but the main and very important open challenges in this area is security issues. IoT security is very weak this is due to heterogeneous devices used in this field. Therefore, the expansion of security weak points will bring serious dangers to users’ security, and property. This paper discuss the security aspects in the IoT communication protocols and Security threats of multiple layers dependent on the security concepts of data confidently, data integrity and privacy, it also discusses and investigates the main IoT protocols that used to communicate between IoT based nodes and sensors. Furthermore, vulnerability in different protocols are reviewed and compared.

 Keywords: Internet of Things, Security, Privacy, Vulnerabilities, ZigBee, LoRaWaN, 6LoWPAN.

Download PDF

Title: Security Issues and Vulnerability of IoT Devices
Author: Kurdistan Ali & Shavan Askar
Journal Name: International Journal of Science and Business
Website: ijsab.com
ISSN: ISSN 2520-4750 (Online), ISSN 2521-3040 (Print)
DOI: https://doi.org/10.5281/zenodo.4497707
Media: Online
Volume: 5
Issue: 3
Acceptance Date: 01/02/2021
Date of Publication: 03/02/2021
PDF URL: https://ijsab.com/wp-content/uploads/690.pdf
Free download: Available
Page: 101-115
First Page: 101
Last Page: 115
Paper Type: Literature Review
Current Status: Published

 

Cite This Article:

Kurdistan Ali & Shavan Askar (2021). Security Issues and Vulnerabilities of IoT Devices. International Journal of Science and Business, 5(3), 101-115. doi: https://doi.org/ 10.5281/zenodo.4497707

Retrieved from https://ijsab.com/wp-content/uploads/690.pdf

 

About Author (s)

Kurdistan Ali, Information System Engineering, Erbil Polytechnic University, Erbil, Iraq. Email: Kurdistan.hamaali@epu.edu.iq.

Shavan Askar (Corresponding Author), Assistant Professor, Erbil Polytechnic University, Erbil, Iraq. Email: shavan.askar@epu.edu.iq.

 

 Download PDF

DOI: https://doi.org/10.5281/zenodo.4497707

Follow us

This Post Has Been Viewed 181 Times

0Shares