Exploration of Various Attacks and Security Measures Related to the Internet of Things
Debajit Datta1, Dheeba J2

1Debajit Datta, Undergraduate B.Tech., Vellore Institute of Technology, Vellore, India.
2Prof. J. Dheeba, Associate Professor in School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India. 

Manuscript received on May 25, 2020. | Revised Manuscript received on June 29, 2020. | Manuscript published on July 30, 2020. | PP: 175-184 | Volume-9 Issue-2, July 2020. | Retrieval Number: B3353079220/2020©BEIESP | DOI: 10.35940/ijrte.B3353.079220
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this era of technological advances, it will be impractical to think of a day without the usage of gadgets. Development and popularity of the Internet of Things have helped mankind a lot in several ways, but at the same time, there has also been an increase in attacks invading the underlying security. Advances in studies have resulted in the development of evolved algorithms that can be used in order to reduce the attacks and threats to the Internet of Things. With several advancements in studies and research works, the security measures on various Internet of Things based components and protocols are developing with time, but concurrently more advanced threats and attacks on these components are also evolving. These attacks are not only harmful to the components, but rather they also affect the users and applications that are associated with it, by breaching data, increase in inconsistency and inaccuracy, and many more. This work deals with the study of several attacks that are associated with the Internet of Things and also the approaches to secure the IoT systems. This work will also help in coming up with further up-gradation in the currently implemented security protocols and also in predicting the possible attacks that can be developed against the IoT protocols.
Keywords: Internet of Things, Security Issue, Cyber Attacks, Protocol, Privacy, Security Measure.