Call For Papers
Contact Us

  A Detailed Study of Security and Privacy of Internet of Things (IoT)  
  Authors : Mohan Krishna Kagita; Madda. Varalakshmi
  Cite as:


The (IoT) "Internet of Things" is a comprehensive notion that entirely depend on the network configuration that connects a huge number of programs whose prime objective is to assemble data and to impart among one another in an attempt to improve their decision-making efficiency. The growth of technology simplifies individual's life in different ways. At the same time, it also dispenses some threats and attacks as well. The assurance of security and privacy necessity plays an important role. Such mandates consist of data concealment and verification, access authority within the "IoT" network, privacy and trust between users and things, and the implementation of security and privacy policies. General security and remedies can't be straightway applied to "IoT" technologies because of the distinct standards and communication scads connected.


Published In : IJCSN Journal Volume 9, Issue 3

Date of Publication : June 2020

Pages : 109-113

Figures :--

Tables : --


Mohan Krishna Kagita : School of Computing and Mathematics, Charles Sturt University, Melbourne, Australia.

Madda. Varalakshmi : Department of Computer Science and Engineering, Vasireddy Venkatadri Institute of Technology, Guntur, Andhra Pradesh, India.


Internet of Things, Security issues of IoT, Sensors, security guidelines, countermeasures, security attacks

Both benefits and risks are associated with the variable and investigating the structure of technology and consequently "Internet of Things" and so many individual users are on risk. With the help of "Internet of Things" sharing and collecting data and information has become very easy and transferable, but at the same time, there are a lot of security and privacy issues. Hence protection and security measure should also be taken into account for a better and safe future. The security issues that have been regularly seen with the "IoT" devices is because of the weak passwords. Configuration of these devices is mostly done remotely as "IoT" devices very often do not have keyboards. It is recommended to put security and privacy fact labels because there is an increased number of security attacks and many poorly manufactured devices do not offer protection to their users. Manufacturers and researchers are busy in designing the system to control the flow of data and information without the leak of privacy by getting motivated by the increased number of security attacks and are trying to provide full security and privacy to user's information.


[1] Vijayalakshmi, A. and Arockiam, L. (2016) A study on security Issues and Challenges in IoT, International Journal of Engineering Sciences & Management Research, Vol. 3(11), Pp. 34-43 [2] Ghani, H. and Konstantas, D (2019) a Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective, Journal of Sensor and Actuator Networks, doi: 10.3390, Pp. 1-38 [3] Maras, M. (2015) Internet of Things: Security and privacy Implications, International Data Privacy Law, Vol. 5, No. 2, Pp. 99-104 [4] Joshitta, R. and Arockiam, L. (2016) Security in IoT Environment: A Survey, Int. Journal of Information Technology & Mechanical Engineering, Vol.2 Issue. 7, Pp. 1-8 [5] Agarwal, S., Majumdar, S., Maiti, A., Nath, A. (2015) Security and privacy issues of Internet of Things: challenges and threats, International Journal of Advanced Technology in Engineering and Science, Vol. 3, Issue - 4, Pp. 89-98. [6] Razzaq, M., Qureshi, M., Gill, S., Ullah, S (2017) Security Issues in the Internet of Things (IoT): A Comprehensive Study, International Journal of Advanced Computer Science and Applications, Vol. 8, No. 6, Pp. 383-388 [7] Al-Sharekh and Al-Shqeerat (2019) Security Challenges and Limitation in IoT Environment, International Journal of Computer Science and Network Security, VOL.19 No.2, Pp. 193-199 [8] Jindal, F. and Jamar, R and Churi, P (2018) Future and Challenges of Internet of Things, International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, Pp. 13-25 [9] Krishna Kagita, M. (2019). Security and Privacy Issues for Business Intelligence in a loT. In Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019 [8688023] [10] Iqbal, M., Olaleye, O and Bayoumi, M. (2016) A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches, Global Journal of Computer Science and Technology: E Network, Web and Security, Vol-16, Issue - 7 [11] Sedrati, A. and Mezrioui, A. (2018) A Survey of Security Challenges in Internet of Things, Advances in Science, Technology and Engineering Systems Journal Vol. 3, No. 1, Pp. 274-280.