like antiviruses and antimalwares that alerts the user and protect the IoT devices.  lack of protection can lead to many attacks on them like unauthorized access, Eavesdropping and Spoofing. 
One issue that IoT users will encounter is the heavy load of traffic, that needs to be collected, processed, stored, monitored and analyzed. Which leads to increase the bandwidth of the data traffic, cost of smart devices and the need to secure IoT technology and its components. Monitoring the behavior of IoT devices traffic will be a must for businesses in the future to ensure the safety of IoT technology used. 
Security of network and network devices are another concern in the process of securing IoT infrastructure, since it is one of the most important elements in IoT structure. There are many attacks that targets the data while it is being transferred from sensors in devices to the gateway of the network in addition to DDoS and Man in the Middle attacks, such as Sinkhole Attack where an attacker makes a compromised node look attractive to other nodes by making all the data flow from any node directed towards the compromised node resulting in packets drop. 
Another example is the Sybil Attack where an attacker makes particular node present multiple identities for another single node, and because the compromised node is considered as part of the system, it can be compromised which result in false information about the redundancy. 
IoT Security in the future
Smart devices usage is increasing every day and there are expectations of having a large owning and using of IoT technology by more individuals and businesses in all different sectors. Security might not be the main concern at the beginning, but the increase usage leads to consider it from many different perspectives. Analyzing the structure of IoT network and components, clarify the level of security that should be applied to this technology and where security measures are necessary.
There are many searches that are trying to provide a complete well-defined security architecture that aim to protect the security and privacy of IoT technology. Dividing the IoT structure and components to multiple layers can help to divide the security safeguards and goals that should be considered for each part. Hardware devices and built in softwares can be protected using Hash algorithms, encryption mechanisms, risk assessments, intrusion detection and anonymity approaches to achieve data and sensitive information privacy in addition to the authentication. 
On the other hand, network protection through data privacy and routing security could be achieved by using P2P Encryption, intrusion detection and ensuring data integrity so that data received from one device is the same as the one sent. 
At last, the security of cloud storage and applications should not be forgotten. Integrated identity identification and firewalls are examples on the security measures that could be considered to ensure the security of user’s sensitive data. 
Achieving an acceptable level of security can promote the use of Internet of things to higher level and provide a safe environment for use by common users and business developers.
Finally, living in this environment and this century requires moving fast and keeping up with the development. Security nowadays is a necessity following what Duke-Woolley, CEO at Beecham Research said in one of the articles:
“Data must be protected within the system, in transit or at rest and significant evolution is required in the identification, authentication and authorization of devices and people.”
1. Corser, G. (2017). INTERNET OF THINGS (IOT) SECURITY BEST PRACTICES (white paper). IEEE.
2.Rose, K., Eldridge, S., & Chapin, L. (2015). The Internet of Things: An Overview. The Internet Society (ISOC). Retrieved July 17, 2018, from
3.Patel, K., & Patel, S. (2016). Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges. International Journal of Engineering Science and Computing, 6(5), 6122-6131.
4.G. (2014). Understanding the Internet of Things (IoT).
5.Vardomatskaya, Y. (2017, April 21). Five IoT security risks and ways to secure yourself. Retrieved from
6.U.farooq, M., Waseem, M., Khairi, A., & Mazhar, S. (2015). A Critical Analysis on the Security Concerns of Internet of Things (IoT). International Journal of Computer Applications, 111(7), 1-6. doi:10.5120/19547-1280
7.IoT multiplies risk of attack. (2015, May 22). Retrieved from https://www.sciencedirect.com/science/article/pii/S1353485815300416