VII. CONCLUSION
In this paper, we have articulated that as more and
more IoT based devices get connected to the Internet,
it results in the extension of the surface area for
external attacks. We classified those attacks based on
the layers that make up IoT and discussed several such
attacks with examples. We have also surveyed the
literature on the existing methods to protect the IoT
infrastructure and summarized these security methods
on how they address the security issues in the IoT. We
have summarized the limitations of the existing
security methods and proposed future work
recommendations to overcome these limitations. In
order for the customers to embrace the IoT
technologies and the applications, these privacy and
security issues and limitations need to be addressed
and implemented immediately, so that potential of the
IoT technology and their applications can be realized.