Chip off IoT Devices: Attacks and Mitigations
Gottumukkala Eswar Kumar Raju1, Lakshmy K. V2

1Gottumukkala Eswar Kumar Raju, TIFAC-CORE Cyber Security, Amrita Vishwa Vidyapeetham University, Coimbatore (Tamil Nadu), India.
2Dr. Lakshmy K. V, TIFAC-CORE Cyber Security, Amrita Vishwa Vidyapeetham University, Coimbatore (Tamil Nadu), India.
Manuscript received on 03 July 2019 | Revised Manuscript received on 13 August 2019 | Manuscript Published on 27 August 2019 | PP: 164-168 | Volume-8 Issue-2S4 July 2019 | Retrieval Number: B10300782S419/2019©BEIESP | DOI: 10.35940/ijrte.B1030.0782S419
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of Things (IoT) is the most emerging field in Information Technology. IoT will make real-world objects into virtual objects and allows them to be sensed remotely. The IoT biological community is changing and getting to be appealing over a more extensive scope of controls, consequently their development in prevalent innovation. Security and protection are the key issues for IoT applications and still face some huge difficulties. Pervasive IoT gadgets have genuine security suggestions as they happen in extensive numbers, are topographically dispersed and can be hard to physically verify. These gadgets may contain touchy or economically profitable information making them appealing to different types of assault. It is discovered that a large portion of the gadgets is defenseless against assaults on hardware, firmware as well as web interface level. In this paper, vulnerabilities due to Insufficient Security Configurability, Insecure Firmware, Security Misconfiguration of IoT devices, recommendations for those vulnerabilities and an approach to reproduce those attacks is explained so as to provide better security to IoT Devices.
Keywords: Firmware, Hardware, Internet of Things Vulnerabilities.
Scope of the Article: IoT