Internet of Things: Impact of IoT in Business Environment and Challenges in Secure Implementation
Archana Sharma

Dr. Archana Sharma, IT Department, Institute of Management Studies Noida, Noida, India. 

Manuscript received on May 25, 2020. | Revised Manuscript received on June 29, 2020. | Manuscript published on July 30, 2020. | PP: 874-879 | Volume-9 Issue-2, July 2020. | Retrieval Number: B3949079220/2020©BEIESP | DOI: 10.35940/ijrte.B3949.079220
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: The Internet of Things as new paradigm is interconnection of computing ,physical and mechanical device together with people with the ability to transfer the data over network. The embedded devices may gather and swap over data with the support of network connectivity, sensors and electronics. The diversified deployment area of IoT are not limited to smart home application, health care industry, education industry and agriculture, etc. It also taking step ahead in developing new products or services in business. With the help of this emerging technology business will have the major impact by improved customer engagement, productivity enhancement, and better access to data, enhanced inventory tracking and security. Whereas the rapid growth rate of IoT network is getting attention of the cyber criminals. In recent advancement, different types of embedded IoT devices are connected together with wireless network and continuously access internet for communication. Cyber criminals are finding vulnerabilities on IoT devices and compromise them to launch massive attacks (e.g. DDoS, Spamming, MITM, RFID Skimming) to destroy the network. IoT devices having default authentication credentials are easy target. This paper highlights that how IoT may introduce the better opportunities in business and challenges of secure IoT connection and while communicating the IoT device. This research also highlights the security aspects of existing technologies and existing technologies and challenges with implementation.
Keywords: IoT, sensors, tracking device, embedded system, digital signature, DSA, RSA.