ABSTRACT

The Internet of Things (IoT) is a network that connects various sensors and objects so that they can communicate with one another without the need for human intervention. IoT is a vast network of linked devices and is rapidly evolving, making human life much easier than it has been in the past. Most operations, such as booking a hotel stay with a simple text message, may now be accomplished with a simple click. IoT now uses Artificial Intelligence as well as Machine Learning to make it user-adaptive, in addition to connecting devices across a network. Because IoT is doing so many things at once, it requires a lot of power, but even more critically, it requires a lot of data. IoT networks are built on low-power, lossy networks (LLN). In this chapter, we investigated which devices are most attacked, as well as the most common attacks carried out by hackers, such as DoS (denial of service) attacks, man-in-the-middle attacks, forgery, and chosen cipher text attack replay attacks on IoT devices to gain data access. Many threats are suggested; however, the majority of them may be prevented merely by installing network-wide end-to-end encryption. End-to-end encryption can be used to defend against network attacks. There are many other things to keep in mind to counter any attack, such as performing regular network analysis, checking system security, and updating hardware and software with security patches. This analysis identifies which devices to secure first to prevent an attack, as well as a broad view of the attacks used by hackers, as well as solutions to these attacks that users can take as a precaution before an attack, as well as countermeasures if the attack is already underway. The chapter also shows the increase in a number of attacks.