Abstract:
The Internet of Things (IoT) has become a common daily phenomenon in most areas of life and economy, where management and monitoring take place through the use of the int...Show MoreMetadata
Abstract:
The Internet of Things (IoT) has become a common daily phenomenon in most areas of life and economy, where management and monitoring take place through the use of the internet as well as digital devices interacting across the network. The important data transmitted over the network through the sensors interacting with smart devices, which exchanging data, reacting autonomously to the events of the physical world, and influencing the environment by carrying out various activities and providing the smart services. The data transmission and storage are often attempted to interfere by malicious attacks focused on the information system that ensures information confidentiality, integrity, and availability. Attacks against an information system are intended to disrupt, modify, or destroy the regular operation of the IoT. In this paper, we discuss about IoT information system security vulnerabilities, defining security methods, and introducing security countermeasures using possible solutions for the smart devices identification and authentication. These solutions help to detect anomalies in the IoT information system and more significantly improves the protection against information corruption and tampering attack of the smart devices.
Date of Conference: 08-11 June 2020
Date Added to IEEE Xplore: 07 July 2020
ISBN Information: