ABSTRACT

The field of the Internet of Things (IoT) has emerged as an essential technology in the era of connectivity. It has replaced traditional devices and thoughts with interconnected smart devices for more efficient and independent work, without human intervention, and can be found in many sectors, such as industrial healthcare, smart homes, logistics tracking, automobiles, etc. Since then, there has been important research and development done on the IoT, but different vulnerabilities have been noted that maintain risk for the IoT as a technology. IoT devices are objects of cyberspace and can be accessed via the Internet. They send or receive data and information. Risk, vulnerability, and threats are the biggest challenges for these devices. In this chapter, a variety of attacks and countermeasures are identified. The analysis shows how the various attacks on each layer work and which defensive configurations can help to prevent the devices from getting affected. Cyberattacks and their attack vectors change according to IT asset vulnerability and security loopholes. The chapter ends by providing some future directions for IoT security and privacy.