IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Comprehensive Study of Cyber Security Attacks, Classification, and Countermeasures in the Internet of Things

A Comprehensive Study of Cyber Security Attacks, Classification, and Countermeasures in the Internet of Things
View Sample PDF
Author(s): Md Alimul Haque (Department of Computer Science, Veer Kunwar Singh University, Ara, India), Shameemul Haque (Al-Hafeez College, Ara, India), Kailash Kumar (College of Computing and Informatics, Saudi Electronic University, Riyadh, Saudi Arabia)and Narendra Kumar Singh (Department of Physics, V. K. S. University, Ara, India)
Copyright: 2021
Pages: 28
Source title: Handbook of Research on Digital Transformation and Challenges to Data Security and Privacy
Source Author(s)/Editor(s): Pedro Fernandes Anunciação (Polytechnic Institute of Setúbal, Portugal), Cláudio Roberto Magalhães Pessoa (Escola de Engenharia de Minas Gerais, Brazil)and George Leal Jamil (Informações em Rede Consultoria e Treinamento, Brazil)
DOI: 10.4018/978-1-7998-4201-9.ch004

Purchase


Abstract

The role of the internet of things (IoT) and cyberspace in a digital society is well recognized, and they have become tremendously popular due to certain features like the ability to ease the operational process of businesses and instant communication. Recent developments in the fields of wireless communication networks like 4G, 5G, and 6G with IoT applications have greatly benefited human welfare. Still, the rapid growth of various IoT applications focuses on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. It has also contributed to unethical practices by hackers who use new tools and techniques to penetrate more complex or well-controlled environments and produce increased damage and even remain under the cover. The main objective of this chapter is to improve understanding of the challenges to secure future digital infrastructure while it is still evolving. In this context, a detailed review of the security-related issues, challenges, threats, and countermeasures in the IoT applications is presented.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom