Journal Browser
Open Access Journal Article

Cybersecurity Challenges in Internet of Things Devices

by David Taylor 1,*
1
David Taylor
*
Author to whom correspondence should be addressed.
TET  2021, 19; 3(1), 19; https://doi.org/10.69610/j.tet.20210516
Received: 18 March 2021 / Accepted: 15 April 2021 / Published Online: 16 May 2021

Abstract

The rapid advancements in technology have led to the proliferation of Internet of Things (IoT) devices, which are now an integral part of our daily lives. However, this widespread integration has also brought about significant cybersecurity challenges. This paper aims to explore and analyze the various cybersecurity issues associated with IoT devices. It begins by providing an overview of IoT and its applications, emphasizing the interconnected nature of these devices. The subsequent sections delve into the vulnerabilities and threats that pose risks to the cybersecurity of IoT devices, such as weak authentication, lack of encryption, and insufficient device updates. Furthermore, the paper discusses the impact of these vulnerabilities on users' privacy and data security. It then examines existing security measures and best practices to mitigate risks, such as strong authentication protocols, end-to-end encryption, and regular software updates. Finally, the paper proposes future research directions and recommendations for policymakers, manufacturers, and consumers to ensure a more secure and resilient IoT ecosystem.

 


Copyright: © 2021 by Taylor. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY) (Creative Commons Attribution 4.0 International License). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

Share and Cite

ACS Style
Taylor, D. Cybersecurity Challenges in Internet of Things Devices. Transactions on Engineering and Technology, 2021, 3, 19. https://doi.org/10.69610/j.tet.20210516
AMA Style
Taylor D. Cybersecurity Challenges in Internet of Things Devices. Transactions on Engineering and Technology; 2021, 3(1):19. https://doi.org/10.69610/j.tet.20210516
Chicago/Turabian Style
Taylor, David 2021. "Cybersecurity Challenges in Internet of Things Devices" Transactions on Engineering and Technology 3, no.1:19. https://doi.org/10.69610/j.tet.20210516
APA style
Taylor, D. (2021). Cybersecurity Challenges in Internet of Things Devices. Transactions on Engineering and Technology, 3(1), 19. https://doi.org/10.69610/j.tet.20210516

Article Metrics

Article Access Statistics

References

  1. Burbules, N. C., & Callister, T. A. (2000). Watch IT: The Risks and Promises of Information Technologies for Education. Westview Press.
  2. Stajano, F., & Wilson, P. (2010). The Internet of Things: A Survey of Enabling Technologies. ACM Computing Surveys, 42(2), 1-42.
  3. Chilcott, T., Egea-Lopez, E., & Spafford, E. H. (2013). Securing the Internet of Things: Challenges and Opportunities. IEEE Security & Privacy, 11(6), 34-41.
  4. Pompian, M. (2007). Preventing Botnets: Detecting and Defeating the New Breed of Hackers. Syngress.
  5. Jha, P., Sahu, P. K., & Das, S. (2014). DDoS Attacks on Internet of Things: Challenges, Approaches, and Solutions. In Proceedings of the 4th International Conference on Computing, Communications and Control (ICCCC) (pp. 1-6). IEEE.
  6. Balduzzi, M., Kirda, E., Kruegel, C., & Vigna, G. (2013). The Internet of Things Meets the Web: Privacy and Security Challenges with Web-based IoT Devices. In Proceedings of the 2013 Network and Distributed System Security Symposium (pp. 465-478). Internet Society.
  7. Wang, X., Liu, L., & Wang, Y. (2012). Secure Authentication for Internet of Things. In Proceedings of the 2012 IEEE International Conference on Computing, Communications and Control and Information Technology (pp. 1-5). IEEE.
  8. Wang, Y., Liu, L., & Wang, X. (2013). Secure Data Communication for Internet of Things. In Proceedings of the 2013 IEEE International Conference on Computing, Communications and Control and Information Technology (pp. 1-5). IEEE.
  9. Baker, M., Pompian, M., & Velkonja, T. (2016). Securing the Internet of Things. Morgan Kaufmann.