© December 2021| IJIRT | Volume 8 Issue 7 | ISSN: 2349-6002 IJIRT 153413 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY 193 IoT security a layered Approach for Attacks and Defenses Ankit R. Patel 1 , Jigneshkumar A. Chauhan 2 1 Research Scholar, Ganpat University 2 Assistant Professor, Ganpat University Abstract - Internet of things(IoT) are everywhere in our daily life. Internet of things is the connection of embedded technologies that contained physical objects and is used to communicate and intellect or interact with the inner states or external surroundings rather than people to people communication. Internet of Things(IoT) includes millions of connected devices that can sense ,compute, and communicate data. Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things(IoT) revolution [7]. Large amount of data is captured, processed, and transmitted through the network by IoT devices. Security of the transmitted data is a major area of concern in IoT networks. security is a big challenge in IoT numerous encryption algorithms have been proposed to ensure security of transmitted data through the IoT network[7]. we analyzed the various challenges and security requirements and various light weight cryptographic algorithms. Index Terms - IoT, Security, Privacy, Radiofrequency Identification, Lightweight Security. INTRODUCTION Internet of things (IoT) is a collection of things embedded with electronics, software, sensors, actuator, and connected via the internet to collect and exchange data with each other. The IoT devices are equipped with sensors and processing power that enable them to be deployed in many environment[3].the fast growth of the number of IoT devices utilized is predicted to reach 41 billion in 2020 as stated in the 2013 report of the international Data Corporation(IDC). The IoT device can create information about individual’s behaviours, analyze it, and take action. Services provided by IoT applications offer a great benefit for human’s life. Fig.1 Different Layer of IoT Sources : https://www.researchgate.net/figure/The- five-layer-IoT-architecture- 114_fig7_309606980 Security and privacy remain huge issues for IoT devices, which introduce a whole new degree of online privacy concerns for consumers. That’s because these devices not only collect personal information like user’s name and telephone number’s but can also monitor user’s activity[3] To address these challenges when many smart devices are connected in an IoT environment, the increasing demand for the use of appropriate cryptographic solution into the embedded applications. However, these smart devices generally have constrained resources, or they can be called low- resource devices in regard to their low computation power, limited battery life, small size, small memory, and limited power supply. Hence, the conventional cryptographic primitives might not be suited for low- resource smart devices. For example, the 1204-bit RSA algorithm [12] HOW IOT WORK?