CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Overview of Internet of Things Security Status andChallenges

عنوان مقاله: Overview of Internet of Things Security Status andChallenges
شناسه ملی مقاله: ICIRES15_001
منتشر شده در پانزدهمین کنفرانس بین المللی نوآوری و تحقیق در علوم مهندسی در سال 1402
مشخصات نویسندگان مقاله:

Maryam Bahrami Deraseleh - Information technology expert, Mazandaran University of Medical Sciences

خلاصه مقاله:
The paper asserts that the idea of the IoT is that any device, whether it be a stove, car, or wearable, would have its own digitalidentity and be linked to the internet. One of the biggest challenges, is security. The problem with IoT security is that there areso many new devices coming out every day that are connected to the internet, and not all of them have been specificallydesigned to keep hackers out. Plus, many manufacturers might not be aware of security threats and won’t take precautionsagainst them when they design their products. The internet of things, also known as the IoT, is a network of physical objectsthat can share data and with other computers over a network. These interconnected devices can provide information to people.However, this system is not without problems. Security risks in the IoT need to be addressed before businesses and homes canwidely adopt them. The first security risk is that there are so many different pieces of hardware involved that each needs someform of authentication to prove its identity and be allowed access to the network or other devices. This leads to an increasedchance of mistakes because there are many credentials involved with managing these connections. The security challengesfaced by IoT are unique to the industry because of the type of technology involved. Connected devices are at risk frommalware, cyber-attacks, data breaches, and privacy risks. The infrastructure behind IoT products is also susceptible to hacking

کلمات کلیدی:
IoT, security, privacy, connected device

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/1741352/