The rapid advancements in technology have led to the proliferation of Internet of Things (IoT) devices, which are now an integral part of our daily lives. However, this widespread integration has also brought about significant cybersecurity challenges. This paper aims to explore and analyze the various cybersecurity issues associated with IoT devices. It begins by providing an overview of IoT and its applications, emphasizing the interconnected nature of these devices. The subsequent sections delve into the vulnerabilities and threats that pose risks to the cybersecurity of IoT devices, such as weak authentication, lack of encryption, and insufficient device updates. Furthermore, the paper discusses the impact of these vulnerabilities on users' privacy and data security. It then examines existing security measures and best practices to mitigate risks, such as strong authentication protocols, end-to-end encryption, and regular software updates. Finally, the paper proposes future research directions and recommendations for policymakers, manufacturers, and consumers to ensure a more secure and resilient IoT ecosystem.
Taylor, D. Cybersecurity Challenges in Internet of Things Devices. Transactions on Engineering and Technology, 2021, 3, 19. https://doi.org/10.69610/j.tet.20210516
AMA Style
Taylor D. Cybersecurity Challenges in Internet of Things Devices. Transactions on Engineering and Technology; 2021, 3(1):19. https://doi.org/10.69610/j.tet.20210516
Chicago/Turabian Style
Taylor, David 2021. "Cybersecurity Challenges in Internet of Things Devices" Transactions on Engineering and Technology 3, no.1:19. https://doi.org/10.69610/j.tet.20210516
APA style
Taylor, D. (2021). Cybersecurity Challenges in Internet of Things Devices. Transactions on Engineering and Technology, 3(1), 19. https://doi.org/10.69610/j.tet.20210516
Article Metrics
Article Access Statistics
References
Burbules, N. C., & Callister, T. A. (2000). Watch IT: The Risks and Promises of Information Technologies for Education. Westview Press.
Stajano, F., & Wilson, P. (2010). The Internet of Things: A Survey of Enabling Technologies. ACM Computing Surveys, 42(2), 1-42.
Chilcott, T., Egea-Lopez, E., & Spafford, E. H. (2013). Securing the Internet of Things: Challenges and Opportunities. IEEE Security & Privacy, 11(6), 34-41.
Pompian, M. (2007). Preventing Botnets: Detecting and Defeating the New Breed of Hackers. Syngress.
Jha, P., Sahu, P. K., & Das, S. (2014). DDoS Attacks on Internet of Things: Challenges, Approaches, and Solutions. In Proceedings of the 4th International Conference on Computing, Communications and Control (ICCCC) (pp. 1-6). IEEE.
Balduzzi, M., Kirda, E., Kruegel, C., & Vigna, G. (2013). The Internet of Things Meets the Web: Privacy and Security Challenges with Web-based IoT Devices. In Proceedings of the 2013 Network and Distributed System Security Symposium (pp. 465-478). Internet Society.
Wang, X., Liu, L., & Wang, Y. (2012). Secure Authentication for Internet of Things. In Proceedings of the 2012 IEEE International Conference on Computing, Communications and Control and Information Technology (pp. 1-5). IEEE.
Wang, Y., Liu, L., & Wang, X. (2013). Secure Data Communication for Internet of Things. In Proceedings of the 2013 IEEE International Conference on Computing, Communications and Control and Information Technology (pp. 1-5). IEEE.
Baker, M., Pompian, M., & Velkonja, T. (2016). Securing the Internet of Things. Morgan Kaufmann.