IOT FROM CYBER SECURITY PERSPECTIVE SUMMARY The Internet of Things (IoT) is a big idea that's growing fast, connecting different devices to make smart networks. By 2020, there could be 200 billion IoT devices, helping in areas like healthcare and finance. But, these devices are vulnerable to cyberattacks because they connect wirelessly. The Mirai attack is an example where hackers used default passwords to disrupt smart home networks. Securing IoT systems is vital for their success and to protect everything they're connected to, like servers and applications. We need to understand these attacks and find ways to stop them to make IoT safe. It's important for IoT to be safe so we can use it in smart cities and other places to make life easier. We need to pay attention to security to make sure IoT can be used everywhere without problems. IoT systems face serious security challenges due to their distributed nature and wireless communication, making them vulnerable to attacks. Unlike traditional systems, IoT needs advanced defense mechanisms because it's made up of diverse objects and operates on a large scale. Designing security for IoT is complex because of limitations like memory and battery life. Additionally, the lack of standardized technologies and protocols complicates security efforts. Effective security solutions for IoT must detect attacks, prevent breaches, ensure confidentiality, and maintain uninterrupted services. IoT technology is growing fast, but security worries are holding it back and making it a target for attacks. There are three main layers in an IoT system: the physical hardware layer (perception), the data-routing layer (network), and the user interface layer (application). These layers use different standards and protocols for communication. Researchers have classified attacks on each layer and assessed their risk levels using a special model. When users respond with the requested information, attackers can use it to gain access to the accounts. Regular encryption methods used in normal networks can't work well in IoT because IoT devices have limits like how much power or memory they have. So, special encryption methods are needed to protect IoT data. This data is always being created and can be targeted by snooping or malware attacks. To protect it, encryption using special codes is necessary. Regular encryption methods used in regular networks aren't suitable for IoT because IoT devices have limitations like power and memory. So, specific encryption methods are required to keep IoT data safe. A firewall is a security system that manages network traffic at different levels, filtering packets from basic network data to application protocols. There are different types of firewalls based on filtering policies and deployment methods, including Packet filtering, Stateful Packet inspection, Application-level gateway, and Circuit-level gateway. In an IoT setup, firewalls can be placed either directly on IoT devices or on a central node overseeing different communication networks . Intrusion Detection Systems (IDS) identify network intrusions and play roles in monitoring, identification, and alarms. They come in types like Signature-based and Anomalybased, each with strengths and weaknesses. While Signature-based IDS is good for known attacks, Anomalybased can catch unknown ones but might give false alarms. In IoT, designing effective IDS is tough due to power constraints and varied computing environments. REFERENCES: ➢ ➢ ➢ Gupta, H., Sharma, S., & Agrawal, S. (2023). A Survey on Deep Learning Enabled Intrusion Detection System for Internet of Things. In Advances in Cognitive Science and Communications (pp. 571). Wankhade, A. D., & Wagh, K. (2023). Design Secure Cloud Based IoT Network for End to End Cloud Communication. In 2023 11th International Conference on Emerging Trends in Engineering & Technology - Signal and Information Processing (ICETET - SIP) (pp. 1-5). Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current status and open issues. In 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS) (pp. 1-8). Aalborg, Denmark. doi: 10.1109/PRISMS.2014.6970594 .CITATION: Yadav, Pradyuman . (2024). IoT from Cybersecurity Perspective. Vellore Institute Of Technology, Katpadi, Vellore, 632014. RegNo: 21BCT0192 , Name: PRADYUMAN YADAV