A survey of security issues in the Internet of Things and solutions to increase its security
Publish place: The first international conference on electricity, mechanics, information technology and computers in engineering sciences
Publish Year: 1403
نوع سند: مقاله کنفرانسی
زبان: English
View: 129
This Paper With 9 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
EMICWCONF01_066
تاریخ نمایه سازی: 19 فروردین 1404
Abstract:
Internet of Things (IoT) security is a fundamental approach and focus in the field of technology that is dedicated to protecting devices, computing devices, systems and networks related to the Internet of Things. In this context, various devices communicate with each other and exchange information and control devices through the Internet. For example, mechanical and digital machines can connect to the network through the Internet and share their information with each other and with servers. Artificial intelligence and similar technologies can also be used to analyze data and make intelligent decisions. However, the Internet always faces a variety of security threats, including unauthorized access, hacking, espionage and other attacks. For this reason, paying attention to the Internet of Things is very important. Security measures such as: data encryption, attack detection, access management and implementation of security protocols are among the measures taken to protect devices and information in this area. IoT security is indeed one of the biggest challenges in information and communication technology in today's world. Due to less attention to security aspects, various IoT devices are often considered the weakest links in the network, through which attackers can gain access to related systems. In fact, IoT security is considered at several layers of infrastructure and communication points. Security in the Internet of Things is very important because attacks on devices and data in this area can have serious consequences and privacy.
Keywords:
Authors
Vahid Kardgar
Department of Computer Engineering, Babol Branch, Islamic Azad University, Babol, Iran
Behnam Barzegar
Department of Computer Engineering, Babol Branch, Islamic Azad University, Babol, Iran
Yaser Bozorgi Rad
Department of Computer Engineering, Babol Branch, Islamic Azad University, Babol, Iran