Cyber Physical Systems - Advances and Applications

Author(s): P.S. Pavithra* and P. Durgadevi

DOI: 10.2174/9789815223286124010003

A Comprehensive Analysis of Various Threat Detection and Prevention Techniques in IoT Environment

Pp: 1-19 (19)

Buy Chapters

* (Excluding Mailing and Handling)

  • * (Excluding Mailing and Handling)

Abstract

SHS investigation development is considered from the geographical and historical viewpoint. 3 stages are described. Within Stage 1 the work was carried out in the Department of the Institute of Chemical Physics in Chernogolovka where the scientific discovery had been made. At Stage 2 the interest to SHS arose in different cities and towns of the former USSR. Within Stage 3 SHS entered the international scene. Now SHS processes and products are being studied in more than 50 countries.

Abstract

The Internet of Things (IoT) has become one of the most widely used technologies in recent times. IoT devices can be enabled to collect, and exchange information in a highly efficient manner via the network. A smart object with technology and devices builds a network infrastructure that is used in a variety of areas such as mechanical, building, medical, manufacturing, entertainment, and transport. The major security issues such as confidentiality, authentication, confirmation, security systems, system configuration, data storage, and administration are the main challenges in an IoT environment. To overcome these security issues, various techniques are addressed. Initially software called an Intrusion Detection System (IDS) was used that monitors a network of malicious activity using valuable tools in IoT devices. Then, the machine technique was used to detect the attacks from the intrusion detection system to provide embedded intelligence in IoT devices and networks. Finally, Blockchain (BC) technology is gaining traction in modern IoT devices to address security and privacy challenges to provide reliable communication in an IoT environment. The aim of this work is to provide a detailed review of ML and BC techniques that can be used to develop revamped IoT security devices. 

We recommend

Favorable 70-S: Investigation Branching Arrow

Authors:Bentham Science Books