Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн
74 страница из 122
The objective of this paper is therefore to focus on current IoT cyber security issues and get familiarized with the dangers posed by IoT devices. The paper discusses about the characteristics of such dangers and the possible infringements. The issues recognized with IoT related cyber security have been presented in various works in the literature as in, e.g., [7–9]. As compared to such papers, here, we address the theme from an increasingly down to earth viewpoint. Commonly, “Zigbee, 6Lo-WPAN, LoRa-WAN, and Bluetooth Low Energy” are eventually utilized as communication protocols in IoT devices.
We quickly review the security methods supported by every protocol and, consequently, investigate the attack surface, additionally revealing a progression of genuine assaults against eminent business IoT devices as instances of the dangers related with inadequately planned security components. Moreover, we depict the “formulating units, communication protocol, and cryptographic equipment, and programming” utilized around business arrangements, to bestow preparatory processes as of now embraced in the market. This examination would then be able to be valuable to readers and specialists intrigued to get a handle on the more functional ramifications of IoT security.