Internet Of Things (Iot), Security Issues And Its Solutions
Fahad Azam,
Rashid Munir,
Mehboob Ahmed,
M. Ayub,
Ahthasham Sajid () and
Zaheer Abbasi
Additional contact information
Fahad Azam: Department of Information Technology, Faculty of ICT Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan.
Rashid Munir: Department of Information Technology, Faculty of ICT Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan.
Mehboob Ahmed: Department of Information Technology, Faculty of ICT Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan.
M. Ayub: Department of Information Technology, Faculty of ICT Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan.
Ahthasham Sajid: Department of Computer Science, Faculty of ICT Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan
Zaheer Abbasi: Department of Environmental Science, FICT, BUITEMS, Quetta, Baluchistan, PAKISTAN
Science Heritage Journal (GWS), 2019, vol. 3, issue 2, 18-21
Abstract:
Internet of things (IoT) plays a great role in the 21st century than a couple of years ago. Internet of things (IoT) provides us a technologically and optimistic image of the future where several computing objects are linked to the internet and they can recognize themselves with additional computing strategies. In this paper detail review of security issues over different layers of IoT has been covered. This paper also discusses the solutions possible to overcome those security issues. In this paper the brief discussion on security threats and how to measure it respectively to protect information or confidential information of the users IoT accentuations on controlling different assignments and attempt to approve the physical things to act denied of any obstruction of the human. The up and coming and existing IoT introductions are much guaranteed to expand the solace level, effectiveness, and robotization of the clients. The objects can represent digitally because IoT is very significant.
Keywords: Internet of Things; Malicious; Phishing. (search for similar items in EconPapers)
Date: 2019
References: Add references at CitEc
Citations:
Downloads: (external link)
https://jscienceheritage.com/download/905/ (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:zib:zbngws:v:3:y:2019:i:2:p:18-21
DOI: 10.26480/gws.02.2019.18.21
Access Statistics for this article
Science Heritage Journal (GWS) is currently edited by Professor Dr. Ahmed Jalal Khan Chowdhury
More articles in Science Heritage Journal (GWS) from Zibeline International Publishing
Bibliographic data for series maintained by Zibeline International Publishing ( this e-mail address is bad, please contact ).