Abstract: The Internet of Things technology played a vital role in our daily lives. It allows billions of devices and people to communicate, share data, and personalize services to enhance the living style. This wireless communication devices are distributed everywhere at smart homes, smart cities, smart transportations, as well as in military, business, and healthcare fields. Due to the rapid increase of IoT devices all around the world, it became a target for many hackers to trespass the privacy of people by collecting sensitive information and use it in suspicious tasks. Moreover, many of intruders have harmful intentions to destroy systems and infrastructures of some organizations. The deployment of efficient security and privacy protocols in IoT networks is extremely needed to ensure confidentiality, authentication, access control, and integrity, among others [5]. In this paper, the Internet of Things topic is introduced, its architectures and characteristics are clarified, the security threats and challenges are highlighted, and some essential solutions are explained.

Keywords: Internet of Things (IoT), Security, Privacy, Authentication, Access Control, Cyberattack, Fog Computing, Cloud Computing, Blockchain.


PDF | DOI: 10.17148/IJARCCE.2021.10704

Open chat
Chat with IJARCCE