IoT security is a very important and broad area. The various aspects are presented in numerous articles. Here is a list of articles in which the IoT Secutity problem is presented relatively generally:
A.D. Wood and J. A. Stankovic: Denial of Service in Sensor Networks, Computer, Vol. 35, No. 10, Oct. 2002; DOI: 10.1109/MC.2002.1039518
http://ieeexplore.ieee.org/document/1039518/
J. Undercoffer, S. Avancha, A. Joshi and J. Pinkston: Security for Sensor Networks, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, MD 21250, Symposium, 2002
C. Karlof and D. Wagner: “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, IEEE International Workshop on Sensor Network Protocols and Applications, May 2003; DOI: 10.1109/SNPA.2003.1203362
http://ieeexplore.ieee.org/document/1203362/
Y. Zhou, Y. Fang and Y. Zhang: „Securing Wireless Sensor Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol.10(3), 2008; DOI: 10.1109/COMST.2008.4625802
http://ieeexplore.ieee.org/document/4625802/
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and Klaus Wehrle: Security Challenges in the IP-based Internet of Things, Wireless Personal Communications, Vol. 61(3), Dec. 2011; DOI: 10.1007/s11277-011-0385-5
G. Sharma, S. Bala, and A. K. Verma: Security Frameworks for Wireless Sensor Networks - Review, Procedia Technology, Vol. 6, 2012; https://doi.org/10.1016/j.protcy.2012.10.119
M. Chowdhury, M. F. Kader and Asaduzzaman: “Security Issues in Wireless Sensor Networks: A Survey”, International Journal of Future Generation Communication and Networking, Vol.6(5), Oct. 2013; DOI: 10.14257/ijfgcn.2013.6.5.10
P. B. Hari and S. N. Singh: Security Issues in Wireless Sensor Networks: Current Research and Challenges, International Conference on Advances in Computing, Communication, & Automation (ICACCA), Apr. 2016; DOI: 10.1109/ICACCA.2016.7578876
http://ieeexplore.ieee.org/document/7578876/
V. E. Ekong and U. O. Ekong: A Survey of Security Vulnerabilities in Wireless Sensor Networks, Nigerian Journal of Technology (NIJOTECH), Vol. 35(2), Apr. 2016
M. A. Ferrag, L. A. Maglaras, H. Janicke and J. Jiang: „Authentication Protocols for Internet of Things: A Comprehensive Survey“, arXiv, Dec. 2016
https://arxiv.org/abs/1612.07206
B. B. Zarpelão, R. S. Miani, C. T. Kawakani and S. C. de Alvarenga: A Survey of Intrusion Detection in Internet of Things, Journal of Network and Computer Applications, Vol. 84, Apr. 2017; https://doi.org/10.1016/j.jnca.2017.02.009
Pooja, Dr. R. K. Chauhan: Review on Security Attacks and Countermeasures in Wireless Sensor Networks, International Journal of Advanced Research in Computer Science, Vol. 8(5), May-June 2017
IoT security is a very important and broad area. The various aspects are presented in numerous articles. Here is a list of articles in which the IoT Secutity problem is presented relatively generally:
A.D. Wood and J. A. Stankovic: Denial of Service in Sensor Networks, Computer, Vol. 35, No. 10, Oct. 2002; DOI: 10.1109/MC.2002.1039518
http://ieeexplore.ieee.org/document/1039518/
J. Undercoffer, S. Avancha, A. Joshi and J. Pinkston: Security for Sensor Networks, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, MD 21250, Symposium, 2002
C. Karlof and D. Wagner: “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, IEEE International Workshop on Sensor Network Protocols and Applications, May 2003; DOI: 10.1109/SNPA.2003.1203362
http://ieeexplore.ieee.org/document/1203362/
Y. Zhou, Y. Fang and Y. Zhang: „Securing Wireless Sensor Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol.10(3), 2008; DOI: 10.1109/COMST.2008.4625802
http://ieeexplore.ieee.org/document/4625802/
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and Klaus Wehrle: Security Challenges in the IP-based Internet of Things, Wireless Personal Communications, Vol. 61(3), Dec. 2011; DOI: 10.1007/s11277-011-0385-5
G. Sharma, S. Bala, and A. K. Verma: Security Frameworks for Wireless Sensor Networks - Review, Procedia Technology, Vol. 6, 2012; https://doi.org/10.1016/j.protcy.2012.10.119
M. Chowdhury, M. F. Kader and Asaduzzaman: “Security Issues in Wireless Sensor Networks: A Survey”, International Journal of Future Generation Communication and Networking, Vol.6(5), Oct. 2013; DOI: 10.14257/ijfgcn.2013.6.5.10
P. B. Hari and S. N. Singh: Security Issues in Wireless Sensor Networks: Current Research and Challenges, International Conference on Advances in Computing, Communication, & Automation (ICACCA), Apr. 2016; DOI: 10.1109/ICACCA.2016.7578876
http://ieeexplore.ieee.org/document/7578876/
V. E. Ekong and U. O. Ekong: A Survey of Security Vulnerabilities in Wireless Sensor Networks, Nigerian Journal of Technology (NIJOTECH), Vol. 35(2), Apr. 2016
M. A. Ferrag, L. A. Maglaras, H. Janicke and J. Jiang: „Authentication Protocols for Internet of Things: A Comprehensive Survey“, arXiv, Dec. 2016
https://arxiv.org/abs/1612.07206
B. B. Zarpelão, R. S. Miani, C. T. Kawakani and S. C. de Alvarenga: A Survey of Intrusion Detection in Internet of Things, Journal of Network and Computer Applications, Vol. 84, Apr. 2017; https://doi.org/10.1016/j.jnca.2017.02.009
Pooja, Dr. R. K. Chauhan: Review on Security Attacks and Countermeasures in Wireless Sensor Networks, International Journal of Advanced Research in Computer Science, Vol. 8(5), May-June 2017
There are various attacks and threats related to IoT. As IoT is IP based network, it is also vulnerable to various attacks. However, IoT has no uniform architecture and there are different kinds of attacks on the different layers of IoT, such as unauthorized access to tags, tag cloning, sybil attack, sinkhole attack, denial of service attack, malicious code injection, and man in middle attack. You can work on the solutions to these attacks. You can get better information here: