TY - JOUR AU - S., Bobby AU - G., AmalRedge PY - 2017/02/15 Y2 - 2024/03/29 TI - The Security Strategies in IoT – A Road Map JF - Asian Journal of Applied Sciences JA - AJAS VL - 5 IS - 1 SE - Articles DO - UR - https://www.ajouronline.com/index.php/AJAS/article/view/4640 SP - AB - <p>The Internet of Things (IoT) is the escalation production of the Computer Science and Communication technology. The phrase IoT was originally proposed to connected objects with RFID technology. Presently, researchers relate IoT with sensors, actuators, GPS devices and Mobile devices. IoT has provided a capable prospect to build powerful industrial systems and applications. Recently large number of IoT applications have been developed and deployed. The significance of the security in the IoT is gradually budding and IoT is one of the most promising network technologies in the new network. This paper is a survey of the basic concept of IoT, background architecture and analyzes the security problems of IoT. And also we provide the requirements of embedded security, the solutions to resist different attacks and the technology for defying rage proofing of the embedded devices by the concept of trusted computing. Addressing this concern is equivalent to addressing the security issue of the hardware platform.</p> ER -