3 research outputs found

    Survey on IoT: Security Threats and Applications

    Get PDF
    the rapid growth of the internet of things (IoT) in the world in recent years is due to its wide range of usability, adaptability, and smartness. Most of the IoT applications are performing jobs an automatic manner without interactions of human or physical objects. It’s required that the current and upcoming devices will be smart, efficient and able to provide the services to the users to implement such a new technology with a secure manner. Thus the security issues are exploring day by day by the researchers. IoT devices are most portable and light in nature so it has several issues such as battery consumption, memory, and as these devices are working open range so the most important is security. In this survey paper, we have elaborated on the security attacks with reference to the different kinds of IoT layers. In the last, we have presented some of the applications of the IoT. This study will provide assistance to the researchers and manufacturers to evaluate and decrease the attacks range on IoT devices

    Mitigating Security Threats for Digital Twin Platform: A Systematic Review with Future Scope and Research Challenges

    Get PDF
    In Industry 4.0, the digital twin (DT) enables users to simulate future states and configurations for prediction, optimization, and estimation. Although the potential of digital twin technology has been demonstrated by its proliferation in traditional industrial sectors, including construction, manufacturing, transportation, supply chain, healthcare, and agriculture, the risks involved with their integration have frequently been overlooked. Moreover, as a digital approach, it is intuitive to believe it is susceptible to adversarial attacks. This issue necessitates research into the multitude of attacks that the digital twin may face. This study enumerates various probable operation-specific attacks against digital twin platforms. Also, a comprehensive review of different existing techniques has been carried out to combat these attacks. A comparison of these strategies is provided to shed light on their efficacy against various attacks. Finally, future directions and research issues are highlighted that will help researchers expand the digital twin platform
    corecore