Cybersecurity Threats in The Internet of Things (Iot) : Apurv Parashar

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

IOSR Journal of Computer Engineering (IOSR-JCE)

e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 25, Issue 5, Ser. 1 (Sept. – October. 2023), PP 01-08
www.iosrjournals.org

Cybersecurity Threats In The Internet Of Things (Iot)


Apurv Parashar
(Department of Information Technology, Techno International Newtown/ MAKAUT Kolkata, India)

Abstract:
The proliferation of the Internet of Things (IoT) has ushered in a new era of connectivity and automation,
revolutionizing industries and enhancing everyday lives. However, the rapid growth and widespread adoption of
IoT devices have also exposed an alarming landscape of cybersecurity threats that challenge the security and
integrity of these interconnected ecosystems. This research paper delves into the intricate web of cybersecurity
threats that loom over the IoT and explores the vulnerabilities that contribute to their proliferation. In this
study, we provide an in-depth analysis of various cybersecurity threats that target IoT devices and networks,
ranging from unauthorized access and data breaches to sophisticated attacks like denial of service (DoS) and
distributed DoS attacks. Furthermore, we investigate the inherent vulnerabilities in the IoT architecture,
including the limited computing resources of devices, the absence of standardized security regulations, and the
exploitation of insecure communication protocols. This research aims to illuminate the multifaceted nature of
cybersecurity threats in the IoT, offering insights into both the risks and the opportunities that arise from the
interconnectedness of devices. As technology continues to evolve, safeguarding the IoT against cyber threats
becomes an imperative for ensuring the sustainable growth and positive impact of this transformative
technology.
Key Word: Internet of Things; Cybersecurity; Attack, Vulnerabilities;
-------------------------------------------------------------------------------------------------------------- -------------------------
Date of Submission: 26-08-2023 Date of Acceptance: 06-09-2023
---------------------------------------------------------------------------------------------------------------------------------------

I. Introduction
The Internet of Things (IoT) has emerged as a technological paradigm that promises to reshape
industries, revolutionize daily life, and accelerate the journey toward a more interconnected world. This
transformative concept envisions a landscape where billions of devices communicate seamlessly, offering
unprecedented levels of automation, efficiency, and convenience. As homes, cities, industries, and critical
infrastructure systems become increasingly entwined with IoT devices, the potential benefits are boundless.
However, this interconnectedness comes at a cost – the amplified exposure to a broad spectrum of cybersecurity
threats that cast a shadow over the promising potential of the IoT. In IoT, objects, networks, and humans
communicate using conscious and/or unconscious actions. By automating and reducing human input, IoT differs
from the Internet, which relies on human input to run.[1] The trajectory of the IoT's growth has been staggering.
From smart thermostats that adjust temperature preferences based on weather forecasts to industrial sensors that
monitor machine performance in real-time, the prevalence of IoT devices is transforming both consumer
experiences and industrial operations. Yet, beneath this facade of innovation lies a complex landscape of
vulnerabilities and threats that challenge the very foundation of the IoT's promise.
The central premise of the IoT lies in its ability to gather and disseminate data through interconnected
devices, enhancing decision-making, automating tasks, and offering insights into various aspects of life.
However, the convergence of devices with limited computing resources, the reliance on myriad communication
protocols, and the dynamic nature of IoT ecosystems has inadvertently created fertile ground for cyber
adversaries to exploit. These adversaries, driven by motives ranging from financial gain to geopolitical
advantage, skillfully exploit the gaps in IoT security, jeopardizing data privacy, system integrity, and even
physical safety.
This research paper embarks on an exploration of the multifaceted realm of cybersecurity threats in the
IoT. It delves into the various types of threats that target IoT devices and networks, dissecting the techniques
employed by adversaries to compromise the integrity of these systems. Additionally, this paper investigates the
underlying vulnerabilities within the architecture of IoT, shedding light on factors that make these ecosystems
particularly susceptible to attacks.
Through a lens of real-life examples, this paper emphasizes the tangible impact of IoT security
breaches on individuals, organizations, and societies at large. By analyzing past incidents, we underscore the
significance of proactive security measures in safeguarding the continuity and reliability of IoT-enabled
services.

DOI: 10.9790/0661-2505010108 www.iosrjournals.org 1 | Page


Cybersecurity Threats in the Internet of Things (IoT)

Moreover, as the IoT continues to permeate various sectors, from healthcare to manufacturing, the
security implications grow exponentially. This paper advocates for a comprehensive approach to mitigating IoT
cybersecurity threats, one that incorporates security best practices, collaboration across stakeholders, and the
integration of cutting-edge technologies.
In the pursuit of secure IoT ecosystems, this research aims to empower both technologists and
policymakers with insights into the intricacies of IoT cybersecurity. By navigating the ever-evolving landscape
of threats, vulnerabilities, and solutions, stakeholders can effectively navigate the crossroads of innovation and
security, ultimately realizing the full potential of the IoT while preserving the integrity and privacy of its users.

II. IoT Architecture and Components


The architecture of the Internet of Things (IoT) is a complex framework that facilitates the seamless
interaction of interconnected devices, sensors, actuators, and communication protocols. IoT is not a single
technology. It is a combination of sensors, devices, networks, and software that works together to unlock
valuable, actionable data from the Internet of Things. Unlike other technologies that revolve around one
predominant architecture, device type or connection method, IoT is at its core an assembly of disparate
technologies.[2] Understanding the architecture and components of the IoT is crucial for comprehending the
flow of data, the communication pathways, and the inherent vulnerabilities within these systems.

IoT Architecture Layers:


The architecture of the IoT is often depicted as a multi-layered structure, each layer serving a distinct
purpose in the data flow and interaction process. The typical layers include:
a. Perception Layer: This layer is the entry point of data into the IoT ecosystem. It comprises various
sensors, actuators, and devices that collect real-world data, ranging from temperature readings to movement
detection.
b. Network Layer: The network layer forms the communication backbone of the IoT. It involves the
transmission of data between devices and gateways through wired or wireless connections. This layer
encompasses various communication protocols, such as Wi-Fi, Bluetooth, Zigbee, and cellular networks.
c. Middleware Layer: Sitting between the network and application layers, the middleware layer
facilitates data processing, storage, and management. It enables seamless data exchange between different
devices and platforms, often using standardized protocols and APIs.
d. Application Layer: The application layer encompasses the user-facing aspects of the IoT. It involves
the development of software applications, dashboards, and user interfaces that allow users to interact with IoT
data, control devices, and receive insights.

IoT Components:
IoT devices consist of several interconnected components that work harmoniously to collect, process,
and transmit data. These components include:
a. Sensors: Sensors are the primary data collection units in IoT devices. They capture physical
properties such as temperature, humidity, light intensity, motion, and more. Different sensors cater to different
data types and are chosen based on the application's requirements.
b. Actuators: Actuators are responsible for performing actions based on data received from sensors.
They can initiate processes such as turning on a fan, adjusting a valve, or activating an alarm.
c. Microcontrollers/Microprocessors: These components serve as the "brains" of IoT devices,
controlling data processing, decision-making, and communication. Microcontrollers are used in simple devices,
while more powerful microprocessors are suitable for more complex tasks.
d. Communication Interfaces: IoT devices communicate with each other, gateways, and central servers
using various communication interfaces. These interfaces can include Wi-Fi, Bluetooth, RFID, Zigbee, NFC,
LoRa, and cellular networks.
e. Power Sources: Since many IoT devices are deployed in diverse environments, power sources play a
crucial role. Devices can be powered by batteries, solar panels, energy harvesting techniques, or wired
connections.
Understanding the intricate interplay of these components and layers is essential for comprehending the
data flow within the IoT architecture. This understanding lays the foundation for identifying potential
vulnerabilities and devising effective security strategies to safeguard the IoT ecosystem against cybersecurity
threats.

DOI: 10.9790/0661-2505010108 www.iosrjournals.org 2 | Page


Cybersecurity Threats in the Internet of Things (IoT)

III. Types of Cybersecurity Threats


As the Internet of Things (IoT) ecosystem expands, the interconnected nature of devices introduces a
range of cybersecurity threats that exploit vulnerabilities within these systems. Understanding the various types
of threats that target IoT devices and networks is crucial for devising effective security strategies and
safeguarding the integrity of these interconnected ecosystems.

Unauthorized Access and Data Breaches:


One of the most prevalent threats in the IoT landscape is unauthorized access to devices and networks.
Adversaries can exploit weak or default credentials to gain unauthorized control over devices, potentially
compromising sensitive data or manipulating device behavior. Data breaches, whether through unauthorized
access or vulnerabilities in data transmission, can lead to the exposure of personal information, trade secrets, and
confidential data.

Denial of Service (DoS) and Distributed DoS Attacks:


IoT devices' interconnectedness makes them susceptible to denial of service (DoS) attacks, where
adversaries flood a device or network with excessive traffic, rendering it unavailable. Distributed DoS (DDoS)
attacks leverage a network of compromised devices to overwhelm a target. These attacks can disrupt critical
services, compromise device functionality, and impact IoT-enabled operations.

Device Spoofing and Identity Theft:


Device spoofing involves mimicking the identity of legitimate IoT devices to gain unauthorized access.
Adversaries can manipulate device identification data to impersonate trusted devices, infiltrate networks, and
launch attacks from within the IoT ecosystem. Identity theft of IoT devices can lead to unauthorized control,
data manipulation, and unauthorized actions.

Eavesdropping and Data Interception:


Insecure communication channels and data transmission protocols can expose IoT data to
eavesdropping. Adversaries intercept and capture sensitive information as it travels between devices, sensors,
and gateways. This threat compromises data privacy and exposes confidential information to unauthorized
parties.

Malware and Ransomware Targeting IoT Devices:


IoT devices can become targets for malware and ransomware attacks, where malicious software
infiltrates devices, compromising their functionality or encrypting data until a ransom is paid. These attacks can
disrupt device operations, compromise user privacy, and result in financial losses.

Physical Attacks on IoT Devices:


Physical attacks on IoT devices involve tampering, theft, or destruction of devices to compromise their
functionality or data integrity. These attacks are particularly concerning in industrial settings, where
compromised devices can disrupt operations, compromise safety, and cause physical harm.

Supply Chain Attacks:


Adversaries can target the supply chain of IoT devices by injecting malicious components during
manufacturing or distribution. These compromised devices enter the ecosystem, posing threats that may not be
immediately apparent. Supply chain attacks undermine the trustworthiness of devices and networks.

Zero-Day Vulnerabilities and Exploits:


Zero-day vulnerabilities are previously unknown security flaws that adversaries can exploit before
manufacturers or developers can release patches. Adversaries capitalize on these vulnerabilities to gain
unauthorized access, execute code, or compromise devices.
Understanding the spectrum of threats that target IoT devices and networks is essential for developing
proactive security measures. By recognizing these threats, stakeholders can design resilient and secure IoT
ecosystems that mitigate risks and protect sensitive data.

IV. Vulnerabilities in IoT Security


The pervasive integration of the Internet of Things (IoT) devices into various aspects of daily life and
industrial operations has brought unprecedented convenience and efficiency. However, the rapid adoption of
these interconnected devices has also exposed a multitude of vulnerabilities that threaten the security and

DOI: 10.9790/0661-2505010108 www.iosrjournals.org 3 | Page


Cybersecurity Threats in the Internet of Things (IoT)

privacy of both individuals and organizations. Understanding these vulnerabilities is essential for devising
effective strategies to fortify IoT security and mitigate potential cybersecurity threats.

Limited Computing Resources:


Many IoT devices are constrained by limited computing resources, including processing power,
memory, and energy. These constraints often necessitate simplified operating systems and firmware that lack
comprehensive security features. Adversaries exploit these limitations to launch attacks, as resource-constrained
devices may struggle to implement robust security measures.

Lack of Security Standards and Regulations:


The nascent nature of the IoT industry has resulted in a lack of standardized security practices and
regulations. Unlike more established technology domains, the IoT lacks uniform security guidelines and
certifications. This absence of standards leads to inconsistencies in security implementations across different
devices and ecosystems.

Insecure Communication Protocols:


IoT devices communicate using various protocols that may lack built-in security mechanisms. Insecure
communication protocols expose data to interception, manipulation, and unauthorized access. Adversaries can
exploit these weaknesses to intercept sensitive information or inject malicious commands into the
communication flow.

Firmware and Software Vulnerabilities:


IoT devices often rely on firmware and software to execute tasks and process data. Vulnerabilities in
these components can be exploited by adversaries to gain unauthorized access, execute malicious code, or
compromise the device's functionality. Moreover, the challenge of updating firmware in deployed IoT devices
exacerbates the risk of unpatched vulnerabilities.

Inadequate Device Authentication and Authorization:


Weak or inadequate authentication mechanisms enable adversaries to bypass security measures and
gain unauthorized access to devices. Additionally, insufficient authorization controls may allow attackers to
perform unauthorized actions on devices or access sensitive data.

Insecure Device Management:


The remote management of IoT devices introduces security challenges, especially in cases where
devices lack secure channels for updates or configuration changes. Without robust device management
practices, adversaries can exploit vulnerabilities in device management interfaces to compromise devices.

Lack of End-to-End Encryption:


End-to-end encryption ensures that data remains confidential and secure throughout its journey from
source to destination. In the IoT, the absence of end-to-end encryption can expose data to eavesdropping,
tampering, and unauthorized access.

Physical Security Considerations:


Physical security vulnerabilities involve the exposure of IoT devices to tampering, theft, or
unauthorized physical access. These vulnerabilities can compromise device functionality, data integrity, and
even user safety.

Human Factor:
The human factor remains a significant vulnerability in IoT security. Users often overlook security
practices, such as changing default passwords, applying updates, and configuring privacy settings. This lack of
awareness contributes to device compromise and data breaches.
Addressing vulnerabilities in IoT security requires a multi-faceted approach that encompasses secure
design practices, standardized security regulations, robust authentication mechanisms, and continuous
monitoring. By recognizing these vulnerabilities and implementing appropriate countermeasures, stakeholders
can bolster the security posture of IoT ecosystems and ensure the trustworthiness of these interconnected
environments.

DOI: 10.9790/0661-2505010108 www.iosrjournals.org 4 | Page


Cybersecurity Threats in the Internet of Things (IoT)

V. Real Life Examples


The vulnerabilities within the Internet of Things (IoT) ecosystem have not remained theoretical; they
have manifested in real-world incidents that underscore the critical importance of cybersecurity in this
interconnected landscape. Authentication and identification of users in IoTs is also significantly important. If an
attacker compromises authentication, they can get access to the system as a legitimate user and can launch
various further attacks without even being detected.[3] The following real-life examples illustrate the tangible
impact of compromised IoT security on individuals, organizations, and society at large:

Mirai Botnet Attack (2016):


Botnet generally involve transferring spam, data theft, exploiting sensitive information, or launching
vicious DDoS attacks.[4] The Mirai botnet attack remains one of the most infamous incidents in IoT
cybersecurity history. The attack exploited default or weak credentials in IoT devices, amassing a massive
botnet that launched distributed denial of service (DDoS) attacks. These attacks disrupted major websites and
services, highlighting the potential for IoT devices to be harnessed as powerful tools for cybercriminals.

Dyn DDoS Attack (2016):


In a striking demonstration of the power of compromised IoT devices, the Dyn DDoS attack targeted a
major domain name service (DNS) provider. The attack overloaded Dyn's servers with traffic, causing
widespread internet outages for major websites and services. The attack leveraged a variety of IoT devices, from
webcams to routers, underscoring the need for stronger device security.

Jeep Cherokee Hack (2015):


Researchers successfully demonstrated the vulnerability of connected vehicles by remotely hacking
into a Jeep Cherokee's infotainment system. This breach exposed potential risks to driver safety, as hackers
gained control over critical functions like acceleration, braking, and steering.

St. Jude Medical Pacemaker Vulnerability (2016):


A vulnerability in St. Jude Medical's pacemakers and defibrillators allowed attackers to remotely
control the devices, potentially endangering patients' lives. This incident raised alarms about the security of
medical IoT devices and the need for robust protections to prevent life-threatening breaches.

IoT Cameras and Privacy Breaches:


Numerous incidents have exposed the security flaws in IoT cameras. Hackers have infiltrated baby
monitors, security cameras, and webcams to invade users' privacy, monitor homes, and even broadcast
unauthorized content.

Ransomware on IoT Devices:


IoT devices have been targeted by ransomware attacks, where adversaries encrypt the device's data and
demand payment for its release. This tactic has affected smart TVs, smart refrigerators, and other connected
devices.

Security Cameras as Botnets (2020):


A research report highlighted how vulnerable security cameras could be compromised and used as part
of a botnet. This enabled attackers to perform coordinated attacks, highlighting the broader implications of poor
IoT device security.

These real-life examples demonstrate the immediate consequences of inadequately secured IoT
devices. They highlight the potential for widespread disruption, privacy invasion, and even physical harm when
security measures are lacking. The incidents underscore the pressing need for manufacturers, developers, and
users to collaborate in fortifying IoT security against a myriad of cyber threats.

VI. Security Solutions and Best Practices


IoT software platform is defined as a software that facilitates the sharing of data and services among
IoT devices on a network.[5] Addressing the cybersecurity threats within the Internet of Things (IoT) ecosystem
demands a comprehensive approach that encompasses proactive security solutions and adherence to best
practices. As the proliferation of IoT devices continues, stakeholders must prioritize robust security measures to
ensure the integrity, privacy, and functionality of interconnected systems.

DOI: 10.9790/0661-2505010108 www.iosrjournals.org 5 | Page


Cybersecurity Threats in the Internet of Things (IoT)

Secure Device Design and Manufacturing:


The foundation of IoT security lies in secure device design and manufacturing. Manufacturers should
implement security-by-design principles, incorporating encryption, strong authentication mechanisms, and
tamper-resistant hardware. Robust supply chain management ensures that devices are not compromised during
production or distribution.

Regular Firmware and Software Updates:


Firmware and software vulnerabilities are common entry points for cyberattacks. Regular updates and
patches are essential to address known vulnerabilities and strengthen security measures. Manufacturers should
provide mechanisms for easy and secure updates, and users should promptly apply updates to their devices.

Network Segmentation and Isolation:


Network segmentation involves dividing the IoT network into isolated segments to limit the lateral
movement of adversaries. Critical systems should be isolated from less secure devices, minimizing the potential
impact of breaches.

Intrusion Detection and Prevention Systems:


Intrusion detection and prevention systems (IDPS) monitor network traffic for suspicious activities and
patterns. These systems can automatically respond to potential threats, helping to mitigate attacks before they
escalate.

Encryption and Authentication Mechanisms:


End-to-end encryption ensures that data remains confidential throughout its journey. Encryption, along
with strong authentication mechanisms, prevents unauthorized access and data interception.

Secure Communication Protocols:


IoT devices should utilize secure communication protocols that offer encryption and data integrity.
Protocols like MQTT with Transport Layer Security (TLS) or HTTPS provide secure communication channels.

Device Authentication and Authorization:


Robust device authentication ensures that only authorized devices can interact with the network. Two-
factor authentication and secure key exchange mechanisms enhance the trustworthiness of device interactions.

Privacy by Design:
Privacy should be a fundamental consideration in IoT design. Minimize data collection to only what is
necessary, and ensure that collected data is anonymized and protected from unauthorized access.

Security Awareness and Training:


Users should be educated about IoT security risks and best practices. Training programs can empower
users to configure devices securely, update firmware, and recognize potential threats.

Vulnerability Management:
Implement a comprehensive vulnerability management strategy that includes continuous monitoring,
proactive vulnerability assessments, and the timely application of patches and updates.

Third-Party Component Evaluation:


Before integrating third-party components, ensure they meet security standards. Vet components for
vulnerabilities and potential security risks to prevent compromise.

Compliance with Security Standards:


Compliance with established security standards and frameworks, such as the NIST Cybersecurity
Framework or ISO/IEC 27001, provides a structured approach to IoT security.
Adopting these security solutions and best practices can significantly mitigate IoT cybersecurity
threats. However, as the threat landscape evolves, stakeholders should remain vigilant and adaptive,
continuously reassessing and refining their security strategies to address emerging challenges. In order to
mitigate ever-expanding security threats to companies, organizations, and governments have to change their
perspective towards security. This paradigm shift is the one that addresses security through an essentially
broader scope at every level of the interaction. Organizations must emphasize the nature of the challenges, risks,
and technological advantages and disadvantages unique to the product or service environment.[6]

DOI: 10.9790/0661-2505010108 www.iosrjournals.org 6 | Page


Cybersecurity Threats in the Internet of Things (IoT)

VII. Discussion
The rapid expansion of the Internet of Things (IoT) introduces a host of cybersecurity challenges that
require vigilant attention and strategic solutions. Navigating these challenges is imperative for cultivating a
secure and resilient IoT ecosystem. The rapid expansion of the Internet of Things (IoT) introduces a host of
cybersecurity challenges that require vigilant attention and strategic solutions. Navigating these challenges is
imperative for cultivating a secure and resilient IoT ecosystem. Many traditional techniques for protecting the
IoT are now ineffective due to new dangers and vulnerabilities. The capabilities of artificial intelligence,
particularly machine and deep learning solutions, must be used if the next-generation IoT system is to have a
continuously changing and up-to-date security system.[7] The absence of standardized security practices across
the IoT landscape remains a pressing concern. The lack of consistent regulations makes it challenging to ensure
that devices adhere to a baseline of security measures. To overcome this hurdle, concerted efforts from
manufacturers, policymakers, and industry bodies are needed to establish universally accepted security
standards and frameworks. A pervasive challenge persists in the lack of user awareness regarding IoT security
risks. Empowering users with knowledge to make informed decisions and take appropriate security measures is
integral to fostering a secure IoT environment. The proliferation of IoT devices raises considerable privacy
concerns due to the vast amounts of personal data being collected. Striking the right balance between data
collection for enhanced services and safeguarding user privacy is an ongoing challenge that calls for ethical
considerations and comprehensive regulations. The concept of zero-trust architectures, where no device or user
is inherently trusted, gains significance in IoT security. Implementing such architectures is intricate, demanding
meticulous identity verification, continuous monitoring, and adaptive security policies. Ensuring security
throughout the entire device lifecycle, from manufacturing to decommissioning, is a challenge. Devices that are
no longer supported by manufacturers may remain vulnerable to attacks. The advent of quantum computing
brings both promise and threats to cybersecurity. Quantum computers have the potential to break current
encryption algorithms, necessitating the development of quantum-resistant encryption methods. IoT
cybersecurity challenges span industries, sectors, and technologies. Effective solutions require cross-domain
collaboration among manufacturers, researchers, policymakers, and cybersecurity experts to tackle the
multifaceted nature of the threats. The future trajectory of IoT cybersecurity will be molded by the interplay of
cutting-edge technologies, the establishment of robust standards, and collaborative endeavors to prioritize
security. Embracing these challenges and proactively addressing them will determine the resilience and
trustworthiness of the IoT ecosystem in an interconnected world. A persistent challenge is the lack of user
awareness and education about IoT security risks. Empowering users to make informed decisions and take
appropriate security measures is essential to creating a secure IoT environment.

VIII. Conclusion
The landscape of IoT cybersecurity is dynamic and multifaceted, encompassing a spectrum of threats
ranging from unauthorized access and data breaches to sophisticated distributed denial of service (DDoS)
attacks. The vulnerabilities within IoT systems, including limited computing resources, insecure communication
protocols, and inadequate security standards, create opportunities for adversaries to exploit and compromise the
ecosystem. Real-life examples have demonstrated the tangible impact of these vulnerabilities, revealing the
potential for disruption, privacy invasion, and physical harm when security measures fall short. Such incidents
underscore the pressing need for comprehensive security strategies and proactive measures to mitigate risks.
Safeguarding the IoT ecosystem requires a holistic approach that spans secure device design and manufacturing,
regular updates, robust authentication mechanisms, and a privacy-by-design mindset. The integration of
artificial intelligence and machine learning offers promising avenues for threat detection and mitigation, while
adherence to standardized security practices and cross-domain collaboration can foster a unified and secure IoT
landscape. Looking to the future, the challenges of balancing security and usability, establishing industry-wide
standards, and addressing emerging threats like quantum computing demand ongoing attention. As technology
evolves, so too must our strategies for securing the IoT.
In conclusion, the Internet of Things has revolutionized how we interact with our environment,
enhancing efficiency and transforming industries. Yet, this transformation is accompanied by a responsibility to
protect the integrity, privacy, and security of these connected systems. By embracing the challenges, harnessing
innovative solutions, and fostering a collective commitment to cybersecurity, stakeholders can pave the way for
a safer and more resilient IoT future. As the IoT continues to evolve, the journey toward enhancing security
must be ongoing, proactive, and collaborative, ensuring that the promise of the IoT is fully realized without
compromising the trust of its users.

DOI: 10.9790/0661-2505010108 www.iosrjournals.org 7 | Page


Cybersecurity Threats in the Internet of Things (IoT)

References
[1]. Altulaihan, E.; Almaiah, M.A.; Aljughaiman, A. Cybersecurity Threats, Countermeasures And Mitigation Techniques On The Iot:
Future Research Directions. Electronics 2022, 11, 3330. Https:// Doi.Org/10.3390/Electronics11203330program (NCEP) Expert
Panel On Detection, Evaluation, And Treatment Of Highblood Cholesterol In Adults (Adult Treatment Panel III) Finalreport.
Circulation. 2002;106(25, Article 3143).
[2]. El Hakim, Ahmed. (2018). Internet Of Things (Iot) System Architecture And Technologies, White Paper..
10.13140/RG.2.2.17046.19521.
[3]. Sidhu S, Mohd BJ, Hayajneh T. Hardware Security In Iot Devices With Emphasis On Hardware Trojans. Journal Of Sensor And
Actuator Networks. 2019; 8(3):42. Https://Doi.Org/10.3390/Jsan8030042
[4]. Dr. Shikha Gupta, Vaama Nikam, Tanay Mukadam, Prathmesh Deshmukh, Prathamesh Bhanse. Cyber Security For Internet Of
Things, IJRASET, Volume 10 Issue X, Oct 22, ISSN 2321-9853.
[5]. Phillip Williams, Indira Kaylan Dutta, Hisham Daoud, Magdy Bayoumi, A Survey On Security In Internet Of Things With A Focus
On The Impact Of Emerging Technologies, Internet Of Things, Volume 19, 2022, 100564, ISSN 2542-6605,
Https://Doi.Org/10.1016/J.Iot.2022.100564. (Https://Www.Sciencedirect.Com/Science/Article/Pii/S2542660522000592)
[6]. Aldowah, Hanan & Rehman, Shafiq & Umar, Irfan. (2019). Security In Internet Of Things: Issues, Challenges, And Solutions.
10.1007/978-3-319-99007-1_38.
[7]. Mazhar T, Talpur DB, Shloul TA, Ghadi YY, Haq I, Ullah I, Ouahada K, Hamam H. Analysis Of Iot Security Challenges And Its
Solutions Using Artificial Intelligence. Brain Sci. 2023 Apr 19;13(4):683. Doi: 10.3390/Brainsci13040683. PMID: 37190648;
PMCID: PMC10136937.

DOI: 10.9790/0661-2505010108 www.iosrjournals.org 8 | Page

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy