Comprehensive Study of IoT Vulnerabilities and Countermeasures

被引:0
作者
Coston, Ian [1 ]
Plotnizky, Eadan [1 ]
Nojoumian, Mehrdad [1 ]
机构
[1] Florida Atlantic Univ, Dept Elect Engn & Comp Sci, 777 Glades Rd, Boca Raton, FL 33431 USA
来源
APPLIED SCIENCES-BASEL | 2025年 / 15卷 / 06期
关键词
internet of things; IoT security; intrusion detection system; IoT protocols; vulnerability analysis; attack mitigation; INTERNET; BLUETOOTH; SECURITY; ATTACKS; THINGS;
D O I
10.3390/app15063036
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
This comprehensive study provides an in-depth examination of the Internet of Things (IoT), which refers to the interconnection of multiple devices through various wireless protocols that facilitate data transfer and improve operational intelligence. IoT is widely used in numerous fields, including urban infrastructure, domestic settings, transportation systems, military operations, healthcare, and agriculture. However, with its growing prevalence comes a significant increase in security risks across multiple layers, such as hardware, software, cloud infrastructure, and networks. This study categorizes these vulnerabilities and explores how adversaries can exploit weaknesses to compromise IoT systems. In doing so, it highlights the risks associated with unauthorized access, data breaches, and system manipulation, all of which pose a direct threat to confidentiality, integrity, and availability. To address these concerns, this paper examines various mitigation strategies that aim to enhance IoT security by reducing attack surfaces, improving authentication methods, and securing communication protocols. By systematically analyzing existing vulnerabilities and countermeasures, this research contributes to the ongoing effort to fortify IoT devices and infrastructure against current and emerging threats. Through this study, we seek to advance the discussion on securing IoT environments while emphasizing the importance of proactive security measures in this rapidly evolving landscape.
引用
收藏
页数:37
相关论文
共 118 条
  • [1] Abideen Z.U., 2024, Reconfigurable Obfuscation Techniques for the IC Supply Chain: Using FPGA-Like Schemes for Protection of Intellectual Property
  • [2] A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
    Adeniyi, Abidemi Emmanuel
    Jimoh, Rasheed Gbenga
    Awotunde, Joseph Bamidele
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [3] Ultra-wideband wireless systems
    Aiello, GR
    Rogerson, GD
    [J]. IEEE MICROWAVE MAGAZINE, 2003, 4 (02) : 36 - 47
  • [4] Akyildiz I.F., 2010, Elsevier Journal of Physical Communication, V3, P217, DOI [10.1016/j.phycom.2010.08.001, DOI 10.1016/J.PHYCOM.2010.08.001]
  • [5] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [6] Ali S, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P217, DOI 10.1109/FMEC.2018.8364068
  • [7] MitM attacks on intellectual property and integrity of additive manufacturing systems: A security analysis
    Alkofahi, Hamza
    Alawneh, Heba
    Skjellum, Anthony
    [J]. COMPUTERS & SECURITY, 2024, 140
  • [8] Internet-of-Things Security and Vulnerabilities: Case Study
    Alqarawi, Ghaida
    Alkhalifah, Bashayer
    Alharbi, Najla
    El Khediri, Salim
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2023, 18 (03) : 559 - 575
  • [9] SCAP SigFox: A Scalable Communication Protocol for Low-Power Wide-Area IoT Networks
    Alqurashi, Halah
    Bouabdallah, Fatma
    Khairullah, Enas
    [J]. SENSORS, 2023, 23 (07)
  • [10] Cybersecurity Risk Analysis in the IoT: A Systematic Review
    Alsalem, Thanaa Saad
    Almaiah, Mohammed Amin
    Lutfi, Abdalwali
    Shin, Seokjoo
    [J]. ELECTRONICS, 2023, 12 (18)