
International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 2
March-April 2025
Indexing Partners



















Security Challenges in Internet of Things (IOT) – Based Brilliant Situations
Author(s) | Dr. SHIVKUMAR DWIVEDI |
---|---|
Country | India |
Abstract | One of the objectives of brilliant conditions is to improve the nature of human life regarding solace and effectiveness. The Internet of Things (IoT) worldview has as of late developed into an innovation for building savvy conditions. Security and protection are viewed as central points of contention in any genuine shrewd condition dependent on the IoT model. The security weaknesses in IoT-based frameworks make security dangers that influence shrewd condition applications. In this way, there is an essential requirement for intrusion discovery frameworks (IDSs) intended for IoT situations to moderate IoT-related security assaults that misuse a portion of these security weaknesses. The mix of IoT frameworks and brilliant situations makes savvy protests more viable. Secrecy, honesty, and accessibility are three significant security ideas of uses and administrations in IoT-based brilliant situations; consequently, to address these worries, data security in IoT frameworks requires more prominent examination center. Analysts study the security difficulties of the IoT from various perspectives, one of which is the security weakness of IoT communication conventions. This overview centers around IDSs for the IoT worldview, autonomous of a particular convention; along these lines, this examination centers around the security challenges confronting IoT frameworks based on the IEEE definition and the general IoT engineering. |
Keywords | Internet, Intrusion, Security, Privacy, Authentication, Access control, Identification |
Field | Computer Applications |
Published In | Volume 7, Issue 2, March-April 2025 |
Published On | 2025-03-30 |
Share this

E-ISSN 2582-2160

CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
