Layered Architecture of Internet of Things-A Review
Abstract views: 61 / PDF downloads: 658
Keywords:
IoT, Security, Privacy, Authentication, Threats, VulnerabilityAbstract
Nowadays internet of thing is need of every person as it makes life easy and comfortable its object work with sensors and actuator without involving human. This device gets users personal information and store it in internet cloud etc. IoT device has limited storage, power consumption and the capacity of network. Attacker can easily attack and get user information and use its wrong way in this scenario to maintain and keep secure privacy in IoT devices is also big issues so IoT has major issue of security. Its need to identify security threats and attacks and purpose solution to prevent from those attacks. So that every person can use every IoT devices without any kind of fear and hesitation about their privacy and trust and fear of loss private data. In this paper we focus on the layered architecture of IoT with its threat and attack also highlight the suitable solution of each layer’s attack and focus on the security goal which used and must achieve in every IoT devices to secure that devices from any kind of attacks and threats that can breach the end user vulnerability and get access of end user’s system. We also discuss some useful and existing techniques with services to prevent from different kind of attack that used worldwide.