The broad usage areas of IoT, Security threats in the IoT ecosystems and finally the steps and the approaches to mitigate the threats are discussed.
— The Term ‘Internet of things’ can be roughly understood as the use of standard Internet protocols for interconnection of highly heterogeneous networked entities for the human-to-thing or thing-to-thing communication in embedded networks. Because of the inherent nature of the IOT devices the security threats, although acknowledged, but is still not fully understood how existing IP security protocols and architectures could be used to connect various devices that range from 8-bit chips to 32 and 64 bit new generation Raspberry Pi based devices running full fledged Linux operating systems. Inefficient security capabilities and irregular or no patching of vulnerabilities in these devices, coupled with lack of consumer security alertness, provide malicious users with opportunities to exploit these devices. In this paper, we discuss the broad usage areas of IoT, Security threats in the IoT ecosystems and finally the steps and the approaches to mitigate the threats.