Vulnerabilities to Internet of Things and Current State of the Art of Security Architecture
Md. Forhad Rabbi1, Ashique Jubayer2, Syed Montasir Hossain3
1Md Forhad Rabbi, Department of CSE, Shahjalal University of Science and technology, Sylhet, Bangladesh.
2Ashique Jubayer, Department of CSE, Sylhet Engineering College, Sylhet, Bangladesh.
3Syed Montasir Hossain, Department of CSE, Sylhet Engineering College, Sylhet, Bangladesh.
Manuscript received on November 15, 2019. | Revised Manuscript received on November 23, 2019. | Manuscript published on November 30, 2019. | PP: 1758-1764 | Volume-8 Issue-4, November 2019. | Retrieval Number: C5888098319/2019©BEIESP | DOI: 10.35940/ijrte.C5888.118419
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Internet of Thing (IoT) is one of the most popular systems these days. This ensures internet connectivity of physical devices and everyday objects. This technology is getting popular day by day due advanced technology and cheap price. However, IoT has some vulnerability issues to deal with. The main hindrance of popularity exploitation of IoT is security. In this paper, the study reflects about the most modern technology, IoT and its security and vulnerabilities where the factors of intrusions in IoT and different types of protocols are explored by studying different papers. In this paper, we have followed the structure of Kitchenham  to conduct a systematic literature review. We have performed the SLR by collecting some relevant papers from the well-known databases like IEEE xplore, ACM, Springer, Elsevier, etc. Our main purpose is to analyze the recent research works according to the security issue and come up with a result in order to intend to have future research on security of IoT.
Keywords: Cyber Security, Internet of Things, Cyber Physical System, Vulnerability, Systematic Literature Review.
Scope of the Article: Plant Cyber Security.