Проблема защиты данных и персональной информации в сфере интернета вещей

Ба Ибрагима

Аннотация


IoT preload have exposed homes and businesses to a slew of emerging challenges. The poor protection of IoT devices can be attributed to a number of factors. These considerations make it tempting for the production team to take shortcuts, such as reusing unverified code fragments or the same motherboards, using insecure third-party libraries, and not adhering to stable software development standards. These and other considerations are propelling the creation of potentially insecure IoT products for consumer markets.
Different technical developments that are crucial enablers of the IoT view, such as Wireless Sensor Networks (WSN), Web Personalization, Radio Frequency Identification (RFID), as well as their smartphone apps and networks, have become hot research topics. Despite significant contributions, IoT raises a wide range of data protection and security concerns, as the Internet of Things is a constantly expanding phenomenon that incorporates a growing array of innovations and exhibits a myriad of shifting characteristics.
IoT systems continue to face global security problems that are becoming more impossible to overcome as the technology landscape evolves. Since so many solutions are created as hackers perform to break them or find other loopholes to exploit. the more technology develops, the more hackers refine their methods and techniques. In light of the potential impact that IoT device protection and privacy concerns can have on people's lives, this thesis would focus on security and secrecy recommendations, as well as any gaps that may exist. In the first chapter, we'll provide a broad overview of the IoT universe, including its history and evolution, forms and components, design, and functions. Then, in the second segment, we'll look at the problems that this technology faces, including its flaws at the physical level, firmware, networks, and software, as well as attacks, their types, and the damage they can trigger. It will be a matter of listing suggestions to overcome the security and privacy gaps of IoT platforms in the third and final segment, which will be adaptive to its evolution, which is not about to slow down or pause.