Understanding IoT Working, Architecture and Protocols for Enhancing IoT Security: Strategies to Mitigate Cyber Threats
Main Article Content
Abstract
5G and 6G telecommunications development, big data, communication among machines (M2M), the global web, and the internet of things (IoT) are the key pillars of the next generation of technological platforms. The Internet of Things (IoT) is a revolutionary approach which is rapidly gaining traction both inter- nationally and domestically. It is smart, intelligent, autonomous, and portable. Numerous cutting-edge technologies are included into the Internet of Things, including blockchain, machine learning, and Artificial Intelligence (AI). This new trend is introducing various technologies, such as cloud computing, virtualization, cyber-physical systems, and the semantic web. This chapter provides a basic explanation of various IOT networks and the five layer architecture that IoT devices use to share information and function as smart, portable systems or applications. This research gathers up-to date information on all facets of the Internet of Things, such as standards, technology, risks, security, and remedies offered by IOT protocols. IoT protocols must address security breaches and security issues with data privacy, authentication, authorization, and trust management in a distributed, heterogeneous environment. We discussed the various attacks that might happen on the Internet of Things environment and the precautions that need to be taken in-depth.