IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Key Vulnerabilities in Internet of Things: A Holistic View

Key Vulnerabilities in Internet of Things: A Holistic View
View Sample PDF
Author(s): Kavitha Ammayappan (University of Hyderabad, India), Arun Babu Puthuparambil (Indian Institute of Science, Bengaluru, India)and Atul Negi (University of Hyderabad, India)
Copyright: 2020
Pages: 17
Source title: Applied Approach to Privacy and Security for the Internet of Things
Source Author(s)/Editor(s): Parag Chatterjee (National Technological University, Argentina & University of the Republic, Uruguay), Emmanuel Benoist (Bern University of Applied Sciences, Switzerland)and Asoke Nath (St. Xavier's College, Kolkata, India)
DOI: 10.4018/978-1-7998-2444-2.ch002

Purchase

View Key Vulnerabilities in Internet of Things: A Holistic View on the publisher's website for pricing and purchasing information.

Abstract

Internet of things (IoT) is a buzzword around the globe. Academics and industries are evolving to solve real-world problems with emerging technologies; IoT is one among them. Now, it's very prevalent to see IoT devices in varied application domains like healthcare, hospitality, home, oil and gas, aviation, agriculture and marketing, cold storage chains, food preservation industries, automobile, environmental pollution monitoring sectors, energy industries, marine and fisheries, dairy and poultry, logistics, smart home and smart city, etc. Industries and research institutes are focusing to enrich environment and ecosystem to bring back green world again for the millennials and our future generations to make this globe as a potential place to cherish. In this mission, IoT is playing a major role of protection and preservation. In parallel, hackers are trying to destroy this mission by exploiting varied cyber vulnerabilities. To make IoT systems robust against those vulnerabilities it is necessary to understand the key vulnerabilities in detail.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom