REVIEW ON IOT BASED THREATS, VULNERABILITIES & CHALLENGES OF INCIDENT RESPONSE USING EMBEDDED SYSTEM FOR SENSOR NODES

Authors

  • Vaishnavi Rajeshsingh Thakur M Tech Student,Dept.of Electronics & Telecommunication Engg., CSMSS Chh.Sahu College of Engineering, Aurangabad, India
  • Dr. A. M. Rawate Head & Associate Professor, CSMSS Chh.Sahu College of Engineering, Aurangabad, India
  • Dr. Syeda Sumera Ali Associate Professor, CSMSS Chh.Sahu College of Engineering, Aurangabad, India

DOI:

https://doi.org/10.17605/OSF.IO/MGV5K

Keywords:

Cybersecurity,, Professor Michael Sanchez,, IoT

Abstract

The Internet of Things (IoT) is the technology innovation of the century and will forever impact how future generations communicate, work, and handle personal day-to-day tasks. IoT devices streamline processes and often automate everyday household tasks. Despite all the hype and added benefits to their uses, they continue to be the spotlight of recent breaches, privacy concerns, and security vulnerabilities and incidents. The purpose of this study is to shed light on the current threat landscape as it relates to the Internet of Things (IoT) while addressing the reasons why IoT devices are prime targets for attack.Additionally, the study examines the challenges of network defenders, incident responders, and forensic examiners face when investigating incidents.The study found IoT devices are plagued by many software and hardware vulnerabilities, most of which are examined and researched heavily by the Open Web Application Security Project (OWASP). Solutions include providing education to consumers on the risks and mitigations associated some of the more common vulnerabilities. Device manufacturers have a role to play in securing devices before they are released to the general market. Solutions to the challenges faced by Incident Responders and Computer Forensics examiners includes preparation before the incident or crime occurs. Proposed solutions include creating investigative and analytical procedures applying specifically to the Internet of Things. Including understanding their internal makeup, where data is stored, and to whom data is transferred. Answering each of these questions provides potential sources of evidence used to paint an overall picture of the root cause of incidents and events.

Downloads

Published

2021-06-27

Issue

Section

Articles

How to Cite

Vaishnavi Rajeshsingh Thakur, Dr. A. M. Rawate, & Dr. Syeda Sumera Ali. (2021). REVIEW ON IOT BASED THREATS, VULNERABILITIES & CHALLENGES OF INCIDENT RESPONSE USING EMBEDDED SYSTEM FOR SENSOR NODES. International Journal of Innovations in Engineering Research and Technology, 8(06), 373-378. https://doi.org/10.17605/OSF.IO/MGV5K