Security Challenges in IoT Devices
Keywords:
IoT Security, Unauthorized Access, Data Breaches, Encryption Techniques, Intrusion DetectionAbstract
The Internet of Things (IoT) has revolutionized various industries by enabling seamless connectivity between devices, sensors, and networks. However, the rapid proliferation of IoT devices has introduced significant security challenges, posing risks to data privacy, network integrity, and user safety. This research paper explores the critical security threats affecting IoT systems, including unauthorized access, data breaches, device vulnerabilities, and denial-of-service (DoS) attacks. Additionally, it examines encryption techniques, authentication protocols, and intrusion detection mechanisms that enhance IoT security. The study also highlights regulatory frameworks and best practices for mitigating cybersecurity risks in IoT ecosystems. By addressing these challenges, this research aims to contribute to the development of more secure and resilient IoT infrastructures for future applications.
References
- Zhou, W., Zhang, Y., & Liu, P. (2019). The Effect of Security Threats on IoT Ecosystems: A Survey. IEEE Internet of Things Journal, 6(5), 8200-8214.
- Chou, T. (2020). Securing the Internet of Things: A Cryptographic Approach. Springer International Publishing.
- Zhang, J., Xie, C., & Wang, H. (2018). Multi-factor authentication for IoT devices: A security analysis. Computers & Security, 78, 26-40.
- Singh, K., Kumar, A., & Gupta, P. (2021). Machine Learning-Based Intrusion Detection for IoT Networks. Future Generation Computer Systems, 115, 123-136.
- Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security and privacy: The case study of a smart home. IEEE Internet of Things Journal, 4(5), 1351-1360.
- National Institute of Standards and Technology (NIST). (2020). Security Framework for IoT Devices. NIST Special Publication 800-183.
- Fernandes, E., Jung, J., & Prakash, A. (2019). Security Analysis of Emerging IoT Systems: A Case Study on Smart Homes. Proceedings of the IEEE Symposium on Security and Privacy, 636-654.
- Sethi, P., & Sarangi, S. R. (2017). Internet of Things: Architectures, Protocols, and Applications. Journal of Electrical and Computer Engineering, 2017, 1-25.
- Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, Privacy, and Trust in IoT: The Road Ahead. Computer Networks, 76, 146-164.
- Li, X., He, D., & Zeadally, S. (2020). Securing the Internet of Things with AI: Emerging Challenges and Solutions. IEEE Communications Surveys & Tutorials, 22(3), 1904-1931.
- Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog Computing and Its Role in the Internet of Things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 13-16.
- Mosca, M. (2018). Cybersecurity in an Era with Quantum Computers: Will We Be Ready? IEEE Security & Privacy, 16(5), 38-41.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.