An In-Depth Evaluation of Protocols for IoT Security Requirements

  • Pankaj Mudholkar, Sudhir Dawra
Keywords: IoT protection, Data, IoT Network, Cyber security, Software.

Abstract

All organisations concerned in an IoT network must be protected because it demands massive data collection and sharing. IP counterplans are now the backbone of IoT counterplans, however they are meant to work in numerous levels and give security at different layers. This research paper covers IoT countermeasures and how to secure an IoT network. One of the main problems in defending an IoT network is the dearth of industrial standardisation which determines hardware, applications and information on a range of risk and attacks.This has been supported by implementing the suitable research methods as per the aim of achieving protocol to define the IoT protection of big data. This paper outlines the characteristics of each emerging technology as well as the different ways malware is distributed through these new technologies. Also discusses about the emergence of general attack trends in digital technology.

Published
2021-07-06
How to Cite
Sudhir Dawra, P. M. (2021). An In-Depth Evaluation of Protocols for IoT Security Requirements. Design Engineering, 1899-1915. Retrieved from http://www.thedesignengineering.com/index.php/DE/article/view/2514
Section
Articles