According to (Alsaidi & Kausar (2018), “It is expected that by the 2020, around 25 billion objects will become the part of global IoT network, which will pose new challenges in securing IoT systems. It will become easy target for hackers as these systems are often deployed in uncontrolled and hostile environment. The main security challenges in IoT environment are authorization, privacy, authentication, admission control, system conformation, storage, and administration” (p. 213).Discuss and describe the difference between a black hole attack and a wormhole attack.
Uncontrolled and hostile environment
We help you get better grades, improve your productivity and get more fun out of college!!
Get Homework Answer for this question
Free title page
Free reference page
Free formatting
Unlimited revisions