Comprehensive Study of IoT Vulnerabilities and Countermeasures

被引:0
作者
Coston, Ian [1 ]
Plotnizky, Eadan [1 ]
Nojoumian, Mehrdad [1 ]
机构
[1] Florida Atlantic Univ, Dept Elect Engn & Comp Sci, 777 Glades Rd, Boca Raton, FL 33431 USA
来源
APPLIED SCIENCES-BASEL | 2025年 / 15卷 / 06期
关键词
internet of things; IoT security; intrusion detection system; IoT protocols; vulnerability analysis; attack mitigation; INTERNET; BLUETOOTH; SECURITY; ATTACKS; THINGS;
D O I
10.3390/app15063036
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
This comprehensive study provides an in-depth examination of the Internet of Things (IoT), which refers to the interconnection of multiple devices through various wireless protocols that facilitate data transfer and improve operational intelligence. IoT is widely used in numerous fields, including urban infrastructure, domestic settings, transportation systems, military operations, healthcare, and agriculture. However, with its growing prevalence comes a significant increase in security risks across multiple layers, such as hardware, software, cloud infrastructure, and networks. This study categorizes these vulnerabilities and explores how adversaries can exploit weaknesses to compromise IoT systems. In doing so, it highlights the risks associated with unauthorized access, data breaches, and system manipulation, all of which pose a direct threat to confidentiality, integrity, and availability. To address these concerns, this paper examines various mitigation strategies that aim to enhance IoT security by reducing attack surfaces, improving authentication methods, and securing communication protocols. By systematically analyzing existing vulnerabilities and countermeasures, this research contributes to the ongoing effort to fortify IoT devices and infrastructure against current and emerging threats. Through this study, we seek to advance the discussion on securing IoT environments while emphasizing the importance of proactive security measures in this rapidly evolving landscape.
引用
收藏
页数:37
相关论文
共 118 条
  • [21] A Review of IoT Firmware Vulnerabilities and Auditing Techniques
    Bakhshi, Taimur
    Ghita, Bogdan
    Kuzminykh, Ievgeniia
    [J]. SENSORS, 2024, 24 (02)
  • [22] Banerjee P., 2023, An Introduction to Modern Timekeeping and Time Transfer, P141
  • [23] Banerji Sourangsu., 2013, International Journal of Mobile Network Communications Telematics, V3, P45, DOI [10.5121/ijmnct.2013.3405, DOI 10.5121/IJMNCT.2013.3405]
  • [24] CoAP Congestion Control for the Internet of Things
    Betzler, August
    Gomez, Carles
    Demirkol, Ilker
    Paradells, Josep
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (07) : 154 - 160
  • [25] An overview of the Bluetooth wireless technology
    Bisdikian, C
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (12) : 86 - 94
  • [26] Communication Security for Smart Grid Distribution Networks
    Bou-Harb, Elias
    Fachkha, Claude
    Pourzandi, Makan
    Debbabi, Mourad
    Assi, Chadi
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (01) : 42 - 49
  • [27] CardiacSense, 2023, Heart Rate Monitor Watch
  • [28] Chen Y, 2016, INT CONF SEL TOP MOB, P159
  • [29] A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems
    Chettri, Lalit
    Bera, Rabindranath
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) : 16 - 32
  • [30] Coskun V., 2011, Near Field Communication (NFC): From Theory to Practice