Review on IoT Security and Challenge in Industry 4.0
Abstract
Wireless networks are very exposed to the danger of security. The majority of in military, commercial, health, retail, and transportation wireless communication network is used. These systems utilize networks that are wired, mobile, or adhoc. The Internet of Things (IoT) was quite attractive. The future of the Internet is regarded by IoT. In the future, IoT plays an important part and affects our way of life, norms, and business methods. IoT use is predicted to expand quickly in the next years in many applications. The IoT provides for the connection and information sharing of billions of equipment, people, and services. As IoT devices are being used more widely, several security threats are occurring in the IoT networks. In order to provide privacy, authentication, access, and integrity control, it is crucial to implement efficient protocols for the security of IoT networks and privacy among others. In addition, user privacy in the IoT environment is becoming critical since much personal information is provided and distributed among related items. It is, therefore, necessary to guarantee that personal data are protected and controlled from cloud events. The presentation addresses security and privacy dangers and concerns coming out of IoT services and presents ways to the industrial problem of security and privacy. In this article, a study on security and problems in IoT networks are discussed.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Thank you for your interest in submitting your manuscript to the Journal of Engineering and Technology (JET).
JET publishes only original works. Manuscripts must not be previously published or under consideration by any other publications. Papers published in JET may not be published again in whole or in part without permission. Please review these guidelines for researching, writing, formatting and submitting your manuscript. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0).
Those submitting manuscripts should be carefully checked to ensure that all works contributed to the manuscript are acknowledged. The list of authors should include all those who can legitimately claim authorship. Manuscript should only be submitted for consideration once consent is given by all contributing authors using Transfer of Copyright form.