Internet of Things (IoT) Security Issues and Challenges

© 2022 by IJCTT Journal
Volume-70 Issue-6
Year of Publication : 2022
Authors : Anita Patrot
DOI :  10.14445/22312803/IJCTT-V70I6P108

How to Cite?

Anita Patrot, "Internet of Things (IoT) Security Issues and Challenges," International Journal of Computer Trends and Technology, vol. 70, no. 6, pp. 72-75, 2022. Crossref,

The computer period is increasing daily, where individuals can connect various devices to the internet. The internet of connected things plays a major part in the globe in that every object (thing) relates to internet-connected to perform the task. IoT connects the devices and systems intelligently through the internet, where devices can interact and communicate with other objects through Radio Frequency Identification and sensor networks. This leads to a challenging task and an issue of the internet of things that every individual face the insecurity, which is having an open research problem to the researcher in this domain to concentrate on the user security issues and challenges to identify and give the proper solution for that. A huge amount of data is generated through sensor devices and stored in clouds. Again it`s a big data challenge in the cloud computing era. The retrieving of data is also taken from the cloud with the help of intermediator brokers. It`s a challenging task to get the connection as well as data transfer for the cloud. The main objective of the research paper is to view various issues occurring on the internet of things for security reasons. The overall coherence of the technologies used in the IoT research projects is the issues and security, which is a major concern in identifying the insecurity reasons for results.

Broker, Cloud Storage, Internet of Things, Security.


[1] Internet of Things (Iot) Https://En.Wikipedia.Org/Wiki/Internet_of_Things.
[2] Internet of Things (Iot),”A Hands-on Approach by Authors Bahga and Madisetti,” 2015.
[3] Mudassar, B.A, Ko, J.H., Mukhopadhyay, S. "Edge-Cloud Collaborative Processing for Intelligent Internet of Things: A Case Study on Smart Surveillance," In Proceedings of the 55th ACM/ESDA/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 24–29, Pp. 1–6, 2018.
[4] Bhattacharya, S., Lane, N.D. "Scarification and Separation of Deep Learning Layers for Constrained Resource Inference on Wearables," In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, Stanford, CA, USA, 14– 16 November , Pp. 176–189, 2016.
[5] Alsheikh, M.A., Niyato, D., Lin, S, Tan, H.-P, Han, Z, "Mobile Big Data Analytics Using Deep Learning and Apache-Spark," IEEE Netw, Vol.30, Pp.22–29, 2016.
[6] Chiang, M, Zhang, "Fog and Iot: An Overview of Research Opportunities," IEEE Internet Things J, Vol.3, Pp.854–864, 2016.
[7] Sharma, S.K. Wang, X, "Live Data Analytics with Collaborative Edge and Cloud Processing In Wireless Iot Networks," IEEE Access , Vol.5 4621–4635, 2017.
[8] X. Cheng, L. Fang, X. Hong, L. Yang, "Exploiting Mobile Big Data: Sources Features and Applications," IEEE Netw., Vol. 31, No. 1, Pp. 72-79, 2017.
[9] Y. Cao, P. Hou, D. Brown, J. Wang, S. Chen, "Distributed Analytics and Edge Intelligence: Pervasive Health Monitoring at the Era of Fog Computing," Proc. Workshop Mobile Big Data, Pp. 43-48, 2015.
[10] K. Xu, Y. Qu, K. Yang, "A Tutorial on the Internet of Things: From A Heterogeneous Network Integration Perspective," IEEE Netw., Vol. 30, No. 2, Pp. 102-108, 2016.
[11] Nordrum, "Popular Internet of Things Forecast of 50 Billion Devices By 2020 Is Outdated", IEEE Spectrum, 2016,
[12] A. Green, Internet of Things Overview Report—May 2016, May 2016, [Online] Available: Http://Blog.Ihs.Com/Technology-Internet-of-Things-Iot.
[13] H. Ghayvat, S. Mukhopadhyay, X. Gui, N. Suryadevara, "WSN-and IOT-Based Smart Homes and Their Extension to Smart Buildings," Sensors, Vol. 15, No. 5, Pp. 10350-10379, 2015.
[14] A. Vishwanath, V. Chandan, C. Mendoza, C. Blake, "A Data-Driven Pre-Cooling Framework for Energy Cost Optimization In Commercial Buildings," Proc. ACM E-Energy, Pp. 157-167, 2017.
[15] Sustainable Buildings, 2019. Http://Www.Unenvironment.Org/Explore-Topics/Resource-Efficiency/Whatwe-Do/Cities/Sustainable-Buildings.
[16] Aziz Makandar and Anita Patrot," Malware Analysis and Classification Using Artificial Neural Network," IEEE Xplorer International Conference on Automation, Communication and Computing Technologies (ITACT 2015), December 22 and 23, Bangalore, IEEE Xplorer.
[17] Aziz Makandar and Anita Patrot, "An Approach to the Analysis of Malware Using Supervised Learning Classification." International Conference on Recent Trends In Engineering, Science & Technology, ICRTEST 2016. 25th – 27th October 2016, IET Inspec, 2016.
[18] Aziz Makandar and Anita Patrot, "Trojan Malware Image Pattern Classification," International Conference on Cognition and Recognition, ICCR 2016,30-31, Mysore, Springer Lecturer Series, 2016.
[19] Aziz Makandar and Anita Patrot," Malware Class Recognition Using Image Processing Techniques," International Conference on Data Management Analytics and Innovations (ICDMAI), 2017, 24th to 26th Feb 2017, IEEE Xplorer, Puna, 2017.
[20] Aziz Makandar and Anita Patrot, "Detection and Retrieval of Malware Using Classification," ICCUBEA 2017, ICC3A, Puna, IEEE International Conference on "Best Paper Award," IEEE Xplorer, 2017.