To see the other types of publications on this topic, follow the link: Iot security solutions.

Journal articles on the topic 'Iot security solutions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Iot security solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kotaiah, Dharavath, and Chitti Ravi Kiran. "Network Security Key Areas of IoT and IIOT- with Connected Devices Privacy and Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 2076–82. http://dx.doi.org/10.22214/ijraset.2023.49873.

Full text
Abstract:
Abstract: With the accelerating pace of technological advancement, demand for IoT app development is at an all-time high. Statistic predicts that $1.1 trillion will be spent globally on IoT. (approx.).Modern IoT apps and solutions will unquestionably become more popular as a result of this. Who will get the newest item into consumers' hands first among manufacturers is still a point of contention. Companies can profit much from IoT app development, but one of the key considerations is security. This post focused on IoT security issues and solutions. IoT solutions can be implemented by businesses of any size and in any industry to boost productivity and customer satisfaction. This article all about the security of IoT and IIoT how to overcome them. Organizations regardless of industry and size can make IoT solutions a part of their business to increase customer satisfaction and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
2

Abosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (2021): 3654. http://dx.doi.org/10.3390/s21113654.

Full text
Abstract:
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications. This paper mainly classifies the attacks and possible security solutions regarding IoT layers architecture. Consequently, each attack is connected to one or more layers of the architecture accompanied by a literature analysis on the various IoT security countermeasures. It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems. Additionally, there is a discussion of the emerging tools and simulations used for testing and evaluating security mechanisms in IoT applications. Last, this survey outlines several other relevant research issues and challenges for IoT/IIoT security.
APA, Harvard, Vancouver, ISO, and other styles
3

Минаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.

Full text
Abstract:
Одной из основных проблем при обеспечении безопасности Интернета вещей (IoT) является, с одной стороны, огромное количество устройств, масштабирующее угрозы и риски безопасности их использования, а с другой – слабая разработанность или даже отсутствие стандартизированных протоколов безопасности. Нередко устройства IoT имеют ограниченную вычислительную мощность и память в угоду цене и коммерческой выгоде, что затрудняет реализацию надежных мер безопасности. Расширение IoT достигло критической инфраструктуры - системы здравоохранения, транспорта и других особо важных отраслей. Поскольку современные устройства IoT имеют доступ к персональной и конфиденциальной информации, нарушения их информационной безопасности могут иметь весьма серьезные последствия, поэтому крайне важно обосновать и реализовать надежные меры безопасности для их защиты от компьютерных атак. Проводится сравнительный анализ основных сетевых протоколов IoT. Выделяются наиболее вероятные компьютерные атаки на устройства IoT: нарушение безопасности сети, нарушение безопасности устройства, физический доступ к устройству, сбои в работе устройства, технологии социальной инженерии. Рассматриваются следующие меры для обеспечения безопасности устройств IoT: совершенствование нормативно-правовой базы; обучение и повышение квалификации сотрудников; развитие взаимодействия с производителями IoT; улучшение мониторинга IoT-устройств; улучшение методов анализа данных, связанных с функционированием IoT. Для реализации предложенных мер приводятся программные и аппаратные решения задач безопасности IoT-устройств. One of the main problems in ensuring the security of the Internet of Things (IoT) is, on the one hand, a huge number of devices that scale the threats and security risks of their use, and on the other hand, weak development or even lack of standardized security protocols. Often, IoT devices have limited computing power and memory for the sake of price and commercial benefits, which makes it difficult to implement reliable security measures. The expansion of IoT has reached critical infrastructure - healthcare, transport and other particularly important areas. Since modern IoT devices have access to personal and confidential information, violations of their information security can have very serious consequences, therefore it is extremely important to justify and implement reliable security measures to protect them from computer attacks. A comparative analysis of the main IoT network protocols is carried out. The most likely computer attacks on IoT devices are highlighted: network security violation, device security violation, physical access to the device, device malfunctions, social engineering technologies. The following measures to ensure the security of IoT devices are considered: improvement of the regulatory and legal framework; training and professional development of employees; development of interaction with IoT manufacturers; improvement of monitoring of IoT devices; improvement of data analysis methods related to the functioning of IoT. To implement the proposed measures, software and hardware solutions to the security problems of IoT devices are provided.
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Qiang, Daoming Li, and Lun Wang. "Network Security in the Internet of Things (IoT) Era." Journal of Industrial Engineering and Applied Science 2, no. 4 (2024): 36–41. https://doi.org/10.5281/zenodo.12789562.

Full text
Abstract:
The Internet of Things (IoT) represents a significant transformation in how devices communicate and interact, offering unprecedented convenience and efficiency. However, this interconnected environment also introduces substantial security challenges. Traditional network security measures are often inadequate for IoT environments due to their unique characteristics, such as resource constraints and diverse device types. This paper explores the current state of network security in the IoT era, examines the specific challenges posed by IoT environments, and presents innovative solutions and best practices for securing IoT networks. Through comprehensive analysis and experimental data, we demonstrate the effectiveness of these solutions in mitigating security risks associated with IoT.Specifically, we investigate the implementation of lightweight cryptography for resource-constrained devices, the use of blockchain technology for secure and decentralized authentication, the application of machine learning algorithms for anomaly detection, and the integration of fog computing to enhance real-time security services. Experimental results indicate significant improvements in security posture and performance, validating the proposed methodologies as viable solutions for IoT security challenges.
APA, Harvard, Vancouver, ISO, and other styles
5

Sonali Pandurang Doifode and Vishnukant Madhukar Biradar. "Cybersecurity in the Internet of Things (IoT): Challenges and Solutions." International Journal of Scientific Research in Modern Science and Technology 3, no. 7 (2024): 17–21. http://dx.doi.org/10.59828/ijsrmst.v3i7.222.

Full text
Abstract:
The IOT is changing the way we communicate and interact across businesses, enabling unprecedented productivity, efficiency, and data storage simulation. Development of IOT has brought many benefits but also significant challenges to network security. This article explores the key challenges in securing IoT environments, including device diversity, limited budgets, lack of security protocols, and vulnerability of transmitted information. Evaluate solutions such as the use of lightweight encryption algorithms, zerotrust architectures, and AI driven security systems to assess their potential effectiveness. The findings of this study highlight requirement of a multilayered and adaptive approach to securing the IoT ecosystem that can counter current and emerging threats.
APA, Harvard, Vancouver, ISO, and other styles
6

Raimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.

Full text
Abstract:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited, as far as machine resources are concerned. In this way, traditional security does not fit in IoT systems. The issue of cybersecurity has become paramount to the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) in mitigating cybersecurity risk for organizations and end users. New cybersecurity technologies/applications present improvements for IoT security management. Nevertheless, there is a gap in the effectiveness of IoT cyber risk solutions. This review article discusses the literature trends around opportunities and threats in cybersecurity for IIoT, by reviewing 70 key articles discovered from a profound Scopus literature survey. It aims to present the current debate around the issue of IIoT rather than suggesting any particular technical solutions to solve network security problems.
APA, Harvard, Vancouver, ISO, and other styles
7

Kuraś, Paweł, Patryk Organiściak, Bartosz Kowal, et al. "IOT COMMUNICATION SECURITY: CHALLENGES AND SOLUTIONS." Zeszyty Naukowe SGSP 2, no. 88 (2024): 69–90. http://dx.doi.org/10.5604/01.3001.0054.3829.

Full text
Abstract:
This paper investigates the obstacles and resolutions concerning the security of communicationin the Internet of Things (IoT). It commences with a discussion of the remarkable proliferationof internet-connected devices, ranging from personal computers to mobile devices, and now tothe era of IoT and IoE. The paper illuminates the impact of IoT on network addresses, leading tothe depletion of IPv4 addresses and the necessity for address translation services. Subsequently,the article delves into the risks confronted by IoT systems, encompassing physical and digitalassaults, unauthorized access, system failures, as well as diverse forms of malicious software. Thesignificance of IoT security in industrial and agricultural systems is underscored. Finally, the paperconcludes by presenting strategies to combat these risks, including antivirus countermeasures,safeguards against Distributed Denial-of-Service (DDoS) attacks, and security considerations inIoT systems for agriculture. In essence, this paper offers valuable insights into the challenges andsolutions associated with ensuring the security of IoT communication.
APA, Harvard, Vancouver, ISO, and other styles
8

Tawalbeh, Lo’ai, Fadi Muheidat, Mais Tawalbeh, and Muhannad Quwaider. "IoT Privacy and Security: Challenges and Solutions." Applied Sciences 10, no. 12 (2020): 4102. http://dx.doi.org/10.3390/app10124102.

Full text
Abstract:
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. In this work, we are exploring the background of IoT systems and security measures, and identifying (a) different security and privacy issues, (b) approaches used to secure the components of IoT-based environments and systems, (c) existing security solutions, and (d) the best privacy models necessary and suitable for different layers of IoT driven applications. In this work, we proposed a new IoT layered model: generic and stretched with the privacy and security components and layers identification. The proposed cloud/edge supported IoT system is implemented and evaluated. The lower layer represented by the IoT nodes generated from the Amazon Web Service (AWS) as Virtual Machines. The middle layer (edge) implemented as a Raspberry Pi 4 hardware kit with support of the Greengrass Edge Environment in AWS. We used the cloud-enabled IoT environment in AWS to implement the top layer (the cloud). The security protocols and critical management sessions were between each of these layers to ensure the privacy of the users’ information. We implemented security certificates to allow data transfer between the layers of the proposed cloud/edge enabled IoT model. Not only is the proposed system model eliminating possible security vulnerabilities, but it also can be used along with the best security techniques to countermeasure the cybersecurity threats facing each one of the layers; cloud, edge, and IoT.
APA, Harvard, Vancouver, ISO, and other styles
9

Krishna, Prasad K. "Securing the Internet of Things: A Comprehensive Analysis of Lightweight Cryptographic Approaches for Resource-Constrained Devices." International Journal of Information Technology Research Studies (IJITRS) 1, no. 1 (2025): 20–35. https://doi.org/10.5281/zenodo.15309858.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges due to their resource constraints and widespread deployment in critical applications. This research examines lightweight cryptographic approaches that can provide robust security for IoT communication while operating within the severe computational, memory, and energy limitations of IoT devices. Through systematic analysis of existing lightweight cryptographic primitives, protocols, and frameworks, this paper identifies the most promising solutions for securing IoT ecosystems. Our findings indicate that optimized implementations of established algorithms like AES, novel lightweight block ciphers such as PRESENT and SIMON, and emerging post-quantum resistant schemes offer viable security options for different IoT deployment scenarios. The research also evaluates implementation challenges, performance metrics, and security-efficiency tradeoffs across various IoT application domains. This comprehensive analysis contributes to the growing body of knowledge on IoT security by providing a structured evaluation framework for selecting appropriate lightweight cryptographic solutions based on specific IoT device constraints and security requirements.
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Akshay, Kumar Gaurav, Edidiong, and Nitesh Kumar. "Security and Privacy for Internet of Things: Challenges and Solutions." JOURNAL OF INTELLIGENT SYSTEMS AND COMPUTING 6, no. 1 (2025): 12–22. https://doi.org/10.51682/jiscom.v6i1.68.

Full text
Abstract:
The Internet of Things (IoT) has grown to unprecedented scales in the healthcare, transportation, and even smart homes industries, bringing unprecedented convenience and operational efficiency. However, the strength of such proliferation of IoT devices has raised an exceptionally high and increasing level of security and privacy issues. Since many IoT devices are also resource-constrained devices that offer minimal encryption and authentication protocols, this makes them more vulnerable to cyberattacks. This paper comprehensively reviewed the security risks of IoT devices, networks, and data management. It elaborates more on significant issues in terms of vulnerabilities at the device level, network security gaps, and privacy issues relating to vast amounts of data collected by IoT systems. In response to these challenges, several security solutions, such as lightweight cryptography, secure boot processes, blockchain, and AI-driven anomaly detection, are evaluated. Edge computing and 5G are among the emerging technologies that have recently become available, with IoT, in some cases, creating challenges as well as opportunities with respect to securing such environments. The paper concludes by talking about future directions for enhancing IoT security and privacy and protecting billions of connected devices around the globe, mainly around scalability as well as those that are privacy-preserving.
APA, Harvard, Vancouver, ISO, and other styles
11

Farooq, Muhammad Shoaib, Muhammad Abdullah, Shamyla Riaz, et al. "A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry." Sensors 23, no. 21 (2023): 8958. http://dx.doi.org/10.3390/s23218958.

Full text
Abstract:
The Internet of Things (IoT) is an innovative technology that presents effective and attractive solutions to revolutionize various domains. Numerous solutions based on the IoT have been designed to automate industries, manufacturing units, and production houses to mitigate human involvement in hazardous operations. Owing to the large number of publications in the IoT paradigm, in particular those focusing on industrial IoT (IIoT), a comprehensive survey is significantly important to provide insights into recent developments. This survey presents the workings of the IoT-based smart industry and its major components and proposes the state-of-the-art network infrastructure, including structured layers of IIoT architecture, IIoT network topologies, protocols, and devices. Furthermore, the relationship between IoT-based industries and key technologies is analyzed, including big data storage, cloud computing, and data analytics. A detailed discussion of IIoT-based application domains, smartphone application solutions, and sensor- and device-based IIoT applications developed for the management of the smart industry is also presented. Consequently, IIoT-based security attacks and their relevant countermeasures are highlighted. By analyzing the essential components, their security risks, and available solutions, future research directions regarding the implementation of IIoT are outlined. Finally, a comprehensive discussion of open research challenges and issues related to the smart industry is also presented.
APA, Harvard, Vancouver, ISO, and other styles
12

Soofi, Aized Amin, Muhammad Tahir, and Naeem Raza. "Securing the Internet of Things: A Comprehensive Review of Security Challenges and Artificial Intelligence Solutions." Foundation University Journal of Engineering and Applied Sciences <br><i style="color:black;">(HEC Recognized Y Category , ISSN 2706-7351)</i> 4, no. 2 (2024): 1–20. http://dx.doi.org/10.33897/fujeas.v4i2.779.

Full text
Abstract:
One of the major needs and challenges of this century is the use of cutting-edge technology considering the industry 4.0 revolution. The Internet of Things (IoT) falls in the category of a cutting-edge example of such innovation in the computing and information industry. In IoT compared to classical networking methods practically; every device we employ is accessible at any time from any location. Nevertheless, IoT continues to encounter several security challenges, and the magnitude of cyber-physical security risks is escalating alongside the widespread use of IoT technologies considering Moore’s laws expected to be 30 billion devices by 2025. IoT will continue to face vulnerabilities and risks unless there is a comprehensive understanding and proactive approach towards tackling its security concerns. To ensure both the cyber and physical security of IoT devices during data gathering and sharing, it is imperative to evaluate security considerations, identify instances of cyber-attacks, and implement effective security protocols at multiple layers for making highly secured IoT. Conventional security measures like data classification, strict access controls, monitoring privileged account access, encrypting sensitive data, security awareness training, network segregation, segmentation cloud security, application security, patch management, and physical security employed in the realm of IoT are inadequate in light of the current security difficulties posed by the proliferation of sophisticated attacks and threats. Utilization of artificial intelligence (AI) techniques, especially machine and deep learning models is becoming a compelling and effective approach to enhance security of the IoT devices. This research article presents a comprehensive review of the key aspects of IoT security, including the challenges, potential opportunities, and AI-driven solutions. The primary goal of this article is to provide technical resources for cybersecurity experts and researchers working on IoT initiatives.
APA, Harvard, Vancouver, ISO, and other styles
13

Hussain, Faisal, Syed Ghazanfar Abbas, Ghalib A. Shah, et al. "A Framework for Malicious Traffic Detection in IoT Healthcare Environment." Sensors 21, no. 9 (2021): 3025. http://dx.doi.org/10.3390/s21093025.

Full text
Abstract:
The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life. The rapid growth of IoT technology has revolutionized human life by inaugurating the concept of smart devices, smart healthcare, smart industry, smart city, smart grid, among others. IoT devices’ security has become a serious concern nowadays, especially for the healthcare domain, where recent attacks exposed damaging IoT security vulnerabilities. Traditional network security solutions are well established. However, due to the resource constraint property of IoT devices and the distinct behavior of IoT protocols, the existing security mechanisms cannot be deployed directly for securing the IoT devices and network from the cyber-attacks. To enhance the level of security for IoT, researchers need IoT-specific tools, methods, and datasets. To address the mentioned problem, we provide a framework for developing IoT context-aware security solutions to detect malicious traffic in IoT use cases. The proposed framework consists of a newly created, open-source IoT data generator tool named IoT-Flock. The IoT-Flock tool allows researchers to develop an IoT use-case comprised of both normal and malicious IoT devices and generate traffic. Additionally, the proposed framework provides an open-source utility for converting the captured traffic generated by IoT-Flock into an IoT dataset. Using the proposed framework in this research, we first generated an IoT healthcare dataset which comprises both normal and IoT attack traffic. Afterwards, we applied different machine learning techniques to the generated dataset to detect the cyber-attacks and protect the healthcare system from cyber-attacks. The proposed framework will help in developing the context-aware IoT security solutions, especially for a sensitive use case like IoT healthcare environment.
APA, Harvard, Vancouver, ISO, and other styles
14

Toka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.

Full text
Abstract:
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most of the security deficiencies of heavily IoT based systems. The Hyperledger Fabric blockchain network used in this study provides confidentiality, data integrity, authentication, and data security for data obtained from IoT devices. Widely used IoT data transfer MQTT protocol is included in the proposed approach. The approach is demonstrated in a simple demo Hyperledger network with simulated IoT devices. The proposed approach is discussed in terms of network security dimensions. Based on the features of the Hyperledger Blockchain network, it is displayed that the IoT security deficiencies can largely be remedied with the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
15

CAZACU, Andrei-Robert. "IoT Security: Threats and Possible Solutions." Informatica Economica 26, no. 2/2022 (2022): 57–64. http://dx.doi.org/10.24818/issn14531305/26.2.2022.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Alfahaid, Abdullah, Easa Alalwany, Abdulqader M. Almars, Fatemah Alharbi, Elsayed Atlam, and Imad Mahgoub. "Machine Learning-Based Security Solutions for IoT Networks: A Comprehensive Survey." Sensors 25, no. 11 (2025): 3341. https://doi.org/10.3390/s25113341.

Full text
Abstract:
The Internet of Things (IoT) is revolutionizing industries by enabling seamless interconnectivity across domains such as healthcare, smart cities, the Industrial Internet of Things (IIoT), and the Internet of Vehicles (IoV). However, IoT security remains a significant challenge due to vulnerabilities related to data breaches, privacy concerns, cyber threats, and trust management issues. Addressing these risks requires advanced security mechanisms, with machine learning (ML) emerging as a powerful tool for anomaly detection, intrusion detection, and threat mitigation. This survey provides a comprehensive review of ML-driven IoT security solutions from 2020 to 2024, examining the effectiveness of supervised, unsupervised, and reinforcement learning approaches, as well as advanced techniques such as deep learning (DL), ensemble learning (EL), federated learning (FL), and transfer learning (TL). A systematic classification of ML techniques is presented based on their IoT security applications, along with a taxonomy of security threats and a critical evaluation of existing solutions in terms of scalability, computational efficiency, and privacy preservation. Additionally, this study identifies key limitations of current ML approaches, including high computational costs, adversarial vulnerabilities, and interpretability challenges, while outlining future research opportunities such as privacy-preserving ML, explainable AI, and edge-based security frameworks. By synthesizing insights from recent advancements, this paper provides a structured framework for developing robust, intelligent, and adaptive IoT security solutions. The findings aim to guide researchers and practitioners in designing next-generation cybersecurity models capable of effectively countering emerging threats in IoT ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
17

Sebestyen, Hannelore, Daniela Elena Popescu, and Rodica Doina Zmaranda. "A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories." Computers 14, no. 2 (2025): 61. https://doi.org/10.3390/computers14020061.

Full text
Abstract:
With the proliferation of IoT-based applications, security requirements are becoming increasingly stringent. Given the diversity of such systems, selecting the most appropriate solutions and technologies to address the challenges is a complex activity. This paper provides an exhaustive evaluation of existing security challenges related to the IoT domain, analysing studies published between 2021 and 2025. This review explores the evolving landscape of IoT security, identifying key focus areas, challenges, and proposed solutions as presented in recent research. Through this analysis, the review categorizes IoT security efforts into six main areas: emerging technologies (35.2% of studies), securing identity management (19.3%), attack detection (17.9%), data management and protection (8.3%), communication and networking (13.8%), and risk management (5.5%). These percentages highlight the research community’s focus and indicate areas requiring further investigation. From leveraging machine learning and blockchain for anomaly detection and real-time threat response to optimising lightweight algorithms for resource-limited devices, researchers propose innovative and adaptive solutions to address emerging threats. The review underscores the integration of advanced technologies to enhance IoT system security, while also highlighting ongoing challenges. The paper concludes with a synthesis of security challenges and threats of each identified category, along with their solutions, aiming to support decision-making during the design approach of IoT-based applications and to guide future research toward comprehensive and efficient IoT frameworks.
APA, Harvard, Vancouver, ISO, and other styles
18

Manoj, Reddy Kichaiah Gari. "Lightweight Security Solutions for IoT Devices in Cloud Ecosystems." Journal of Scientific and Engineering Research 11, no. 6 (2024): 168–72. https://doi.org/10.5281/zenodo.14715738.

Full text
Abstract:
The integration of Internet of Things (IoT) devices into cloud ecosystems introduces significant security challenges due to the constrained computational and power resources of IoT devices. This research presents lightweight cryptographic and security solutions tailored for resource-constrained IoT devices within cloud environments. The proposed framework leverages lattice-based cryptography, a quantum-resistant approach, and lightweight algorithms to secure IoT devices without compromising performance. This study includes detailed experiments, scalability tests, mathematical formulations, and IEEE-recommended standards to evaluate the framework&rsquo;s efficacy. Results demonstrate improved security resilience, resource optimization, and adaptability across diverse IoT applications, contributing to the advancement of secure cloud-integrated IoT ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
19

Sharma, Ravi, and Nonita Sharma. "Attacks on Resource-Constrained IoT Devices and Security Solutions." International Journal of Software Science and Computational Intelligence 14, no. 1 (2022): 1–21. http://dx.doi.org/10.4018/ijssci.310943.

Full text
Abstract:
An IoT is a complex system of interconnected electronic devices that exchange data over the network. Due to the sensitive nature of the data involved in this new technological paradigm, security measures must be taken with great care. Researchers can better understand the threats and weaknesses of the IoT if attacks are categorized to facilitate the development of a more robust defense system. This study discusses various attacks and statistical data related to IoT. These attacks are divided into two categories: physical and cyber-attacks. Based on the literature review, the authors found that social engineering and DoS are the most common attacks in the physical and cyber categories. This study demonstrates the security solutions inherent to securing the IoT environment. Cryptography, blockchain, software-defined networks, and machine learning techniques were reviewed. They also discussed steps that should be taken to make a safe IoT environment.
APA, Harvard, Vancouver, ISO, and other styles
20

M. S. Minu. "Enhancing IoT Security with Lightweight Cryptographic Operations Using Temporal Spatial Hyperdimensional Computing." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 138–49. https://doi.org/10.52783/jisem.v10i13s.2013.

Full text
Abstract:
Introduction: Network-based security challenges related to the Internet of Things (IoT) are rising, network-based security challenges have become more prominent, raising concerns about the vulnerability of systems to severe security threats. Cyberattacks such as command injection, denial of service, surveillance, and backdoors exploit abnormal patterns in network behavior. Traditional machine learning techniques, including logistic regression and feature-based support vector machines, have been integrated with end-to-end deep neural networks to enhance intrusion detection. However, these approaches struggle with small sample sizes and fail to adapt efficiently to evolving threats and dynamic IoT environments. Additionally, the resource constraints of IoT devices necessitate secure and efficient cryptographic solutions to ensure data integrity and confidentiality. Objectives: The primary objective of this study is to develop a robust and adaptive cryptographic framework that addresses the challenges of lightweight security in IoT environments. The proposed Temporal-Spatial Hyper Dimensional Computing (TS-HDC) method aims to enhance key generation, encryption, and authentication by incorporating time-dependent and location-specific data. This novel approach seeks to mitigate risks such as key reuse, replay attacks, and unauthorized access while maintaining low computational and energy costs suitable for resource-constrained IoT devices. Methods: The TS-HDC framework leverages high-dimensional vectors combined with dynamic geographical and temporal data encoding to enhance cryptographic adaptability. Hyper vectors with embedded contextual information allow real-time adjustments in security processes based on the IoT environment. The system's efficiency was evaluated using the WUSTL-IIOT-2021 dataset, where various cryptographic metrics, including key strength, computational overhead, and resistance to attacks, were analyzed. Performance comparisons with traditional cryptographic techniques were conducted to assess improvements in scalability, efficiency, and security. Results: The experimental evaluation demonstrated that TS-HDC significantly enhances the security of IoT networks by dynamically adjusting cryptographic functions in response to environmental changes. The method outperformed conventional cryptographic solutions in terms of adaptability, energy efficiency, and protection against attacks such as key reuse and replay exploits. Results from WUSTL-IIOT-2021 trials indicated a notable reduction in computational overhead, making TS-HDC a viable security solution for IoT applications with limited processing power and battery life. Conclusion: The proposed TS-HDC framework provides a scalable and efficient cryptographic solution for securing IoT devices against emerging threats. By integrating temporal and spatial factors into cryptographic processes, it ensures enhanced adaptability to dynamic IoT environments while maintaining low computational costs. The findings highlight the potential of TS-HDC in securing IoT applications across various domains, including smart homes, healthcare, and industrial systems. Future research will explore further optimizations and real-world deployments to strengthen IoT security against evolving cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
21

Tiwari, Naman, Abhay Kumar Pandey, and Abhilash Kokala. "Challenges and Solutions for Countering Emerging Security Threats to IoT Devices." International Journal of Experimental Research and Review 47 (April 30, 2025): 59–68. https://doi.org/10.52756/ijerr.2025.v47.005.

Full text
Abstract:
The Internet of Things (IoT) has transformed how devices communicate and interact, making daily life more connected and efficient. However, as IoT adoption increases, so do security risks. IoT devices are a target for cybercriminals who want to steal data, control operations, and disrupt services. This research examines the major security issues that IoT devices face and potential solutions to protect them from new threats. Insufficient authentication and authorization are one of the most significant obstacles in IoT security. Due to their lack of security updates and default passwords, many IoT devices are easy targets for cyberattacks. Additionally, the likelihood of data breaches is raised by the fact that IoT devices frequently transmit data without encryption. The lack of standard security protocols is another major problem because different manufacturers use different security measures, which creates inconsistencies and vulnerabilities. This paper discusses a variety of solutions to these issues, such as encryption methods, regular security updates, and strong authentication mechanisms. By ensuring that only authorized users can access IoT devices, using multi-factor authentication (MFA) can improve security. Attackers can't get their hands on sensitive data if it is encrypted. Additionally, real-time security threat detection and prevention can be made possible by utilizing AI and ML. Governments and organizations also play a vital role in improving IoT security. When designing and developing IoT devices, manufacturers may adhere to best practices if global security standards and regulations are established. Vulnerabilities can be further reduced by educating users about cybersecurity threats and best practices. In conclusion, a combination of robust authentication, encryption, regular updates, and global security policies is required to safeguard IoT devices from security threats. To create an IoT environment that is safer and more secure as technology advances, ongoing research and development are required.
APA, Harvard, Vancouver, ISO, and other styles
22

M. Sultan, Mohammed. "Securing the internet of things: challenges, strategies, and emerging trends in IoT Security Systems." International Journal of Research in Engineering and Innovation 07, no. 06 (2023): 266–73. http://dx.doi.org/10.36037/ijrei.2023.7607.

Full text
Abstract:
The Internet of Things (IoT) has revolutionized how we interact with technology, enabling seamless connectivity among various devices. However, this interconnected ecosystem also presents significant security challenges that demand comprehensive solutions. This paper explores IoT security systems, focusing on understanding the unique challenges and devising effective strategies to mitigate risks. By analyzing the diverse landscape of IoT networks and protocols, we identify potential vulnerabilities and threats that could compromise integrity and data confidentiality. Additionally, we delve into emerging technologies and trends, such as blockchain-based solutions and decentralized identity management, which hold promise for enhancing IoT security. Throughout the paper, we emphasize the importance of ongoing monitoring, prompt firmware updates, and efficient incident response strategies. Organizations can ensure compliance and create a more secure IoT environment by adhering to established regulatory frameworks and standards. This research paper serves as a comprehensive guide for practitioners and researchers, offering valuable insights into IoT security systems' challenges, best practices, and future directions.
APA, Harvard, Vancouver, ISO, and other styles
23

Pratik Shah,, Et al. "Designing and Executing Security Solutions for IoT-5G Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 903–9. http://dx.doi.org/10.17762/ijritcc.v11i9s.9714.

Full text
Abstract:
The integration of the Internet of Things (IoT) with 5G networks presents a transformative approach to modern connectivity solutions, yet it introduces significant security challenges. This paper focuses on the design and implementation of robust security techniques tailored for IoT-5G systems. We commence by analyzing the unique security requirements posed by the confluence of IoT devices and 5G technology, emphasizing the need for advanced security protocols to address increased data volumes, device heterogeneity, and potential vulnerabilities. Subsequently, we propose a comprehensive security framework that includes innovative encryption methods, intrusion detection systems, and secure communication protocols specifically developed for the IoT-5G environment. Our approach integrates multi-layered security mechanisms to ensure data integrity, confidentiality, and availability across the network. The effectiveness of our proposed techniques is demonstrated through a series of simulations and real-world deployments, showcasing significant enhancements in security and resilience for IoT-5G systems. This study contributes to the field by providing a practical and scalable security solution, paving the way for secure and reliable IoT-5G integration in various applications, from smart cities to industrial automation.
APA, Harvard, Vancouver, ISO, and other styles
24

Alotaibi, Bandar. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities." Sensors 23, no. 17 (2023): 7470. http://dx.doi.org/10.3390/s23177470.

Full text
Abstract:
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. One of the unrivaled characteristics of IIoT is the inter-connectivity provided to industries; however, this characteristic might open the door for cyber-criminals to launch various attacks. In fact, one of the major challenges hindering the prevalent adoption of the IIoT paradigm is IoT security. Inevitably, there has been an inevitable increase in research proposals over the last decade to overcome these security concerns. To obtain an overview of this research area, conducting a literature survey of the published research is necessary, eliciting the various security requirements and their considerations. This paper provides a literature survey of IIoT security, focused on the period from 2017 to 2023. We identify IIoT security threats and classify them into three categories, based on the IIoT layer they exploit to launch these attacks. Additionally, we characterize the security requirements that these attacks violate. Finally, we highlight how emerging technologies, such as AI and edge/fog computing, can be adopted to address security concerns and enhance IIoT security.
APA, Harvard, Vancouver, ISO, and other styles
25

Mashiya Afroze F and Dr. Jose Reena K. "A Survey Study on IoT Application and its Attacks." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 02 (2024): 80–86. http://dx.doi.org/10.47392/irjaeh.2024.0016.

Full text
Abstract:
The Internet of Things (IoT) has witnessed exponential growth in recent years, with billions of interconnected devices seamlessly communicating and exchanging data. While IoT offers unprecedented opportunities for innovation and convenience, it also introduces a plethora of security challenges. This abstract provides an overview of the key security concerns in IoT and explores emerging solutions to address them. Security in IoT is paramount due to the potential consequences of breaches. IoT devices are often resource-constrained and lack robust security features. Malicious actors can exploit this vulnerability to gain unauthorized access, compromise privacy, launch cyberattacks, and disrupt critical services. Therefore, securing IoT ecosystems is imperative for the continued growth and adoption of IoT technologies.
APA, Harvard, Vancouver, ISO, and other styles
26

Manoj, Reddy Kichaiah Gari. "Lightweight Security Solutions for IoT Devices in Cloud Ecosystems." Journal of Scientific and Engineering Research 11, no. 6 (2024): 168–72. https://doi.org/10.5281/zenodo.14710964.

Full text
Abstract:
The integration of Internet of Things (IoT) devices into cloud ecosystems introduces significant security challenges due to the constrained computational and power resources of IoT devices. This research presents lightweight cryptographic and security solutions tailored for resource-constrained IoT devices within cloud environments. The proposed framework leverages lattice-based cryptography, a quantum-resistant approach, and lightweight algorithms to secure IoT devices without compromising performance. This study includes detailed experiments, scalability tests, mathematical formulations, and IEEE-recommended standards to evaluate the framework&rsquo;s efficacy. Results demonstrate improved security resilience, resource optimization, and adaptability across diverse IoT applications, contributing to the advancement of secure cloud-integrated IoT ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
27

IBRAHIM ABDUL ABDULRAHMAN, GABRIEL TOSIN AYODELE, GRACE EFAHN EGBEDION, JACOB ALEBIOSU, EZEAGBA JETTA SOMTOCHUKWU, and OMOTOLANI ENIOLA AKINBOLAJO. "Securing Internet of Things (IoT) ecosystems: Addressing scalability, authentication, and privacy challenges." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 523–34. https://doi.org/10.30574/wjarr.2025.26.1.0999.

Full text
Abstract:
The rapid expansion of the Internet of Things (IoT) has revolutionized industries, enhancing automation, connectivity, and data-driven decision-making. However, as IoT ecosystems grow, they face significant security challenges related to scalability, authentication, and privacy. This study explores these challenges, emphasizing the need for robust security measures to protect vast networks of interconnected devices. The research identifies scalability as a major concern, highlighting issues such as managing millions of IoT devices, network congestion, and resource limitations. Authentication mechanisms are examined, focusing on lightweight security protocols, multi-factor authentication, and blockchain-based solutions to mitigate unauthorized access. Furthermore, privacy risks associated with large-scale data collection and transmission are analyzed, underscoring the importance of encryption, anonymization, and user-controlled data access. The findings suggest that integrating AI-driven security solutions, decentralized authentication models, and regulatory compliance measures can significantly improve IoT security. This study provides a roadmap for securing IoT ecosystems, ensuring resilience against evolving cyber threats while maintaining efficiency and user privacy.
APA, Harvard, Vancouver, ISO, and other styles
28

Dorage, Sachin Vasant. "Cybersecurity in Industrial Management within the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–16. http://dx.doi.org/10.55041/ijsrem37081.

Full text
Abstract:
Recently, it has become important to integrate cybersecurity threat management policies in the management of any organization that uses information systems, whether large, medium or even small organizations. People live in the center of the field of smart homes, business opportunities of smart industrial cities and healthcare. Even as IoT security issues become increasingly ubiquitousin the industrial realm, they face the added challenge of evolving networks. Architecture towards the integration of information technology (IT) and operational technology (OT) networks. This article analyzes the underlying cybersecurity risks, attack landscape in the Industrial IoT (IIoT), and suggests possible countermeasures for future hybrid IoT applications, based on lessons learned from IIoT projects. Security is essential for IoT systems to protect sensitive data and infrastructure, while security issues are becoming increasingly costly, especially in the industrial sector. The domains of the Internet of Things (IIoT). With this in mind, the issue of cybersecurity has become paramount for the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) to mitigate cybersecurity risks for organizations and end users. New cybersecurity technologies and applications have improved IoT security management. However, there is a disparity in the effectiveness of solutions for IoT cyber risks. Key Words: Cybersecurity; Computer security; IT security; Internet of things (IoT); Safety; Industrial internet of things (IIoT); Blockchain and SDN (Software Defined Networking); 5G
APA, Harvard, Vancouver, ISO, and other styles
29

Bour, Guillaume, Camillo Bosco, Rita Ugarelli, and Martin Gilje Jaatun. "Water-Tight IoT–Just Add Security." Journal of Cybersecurity and Privacy 3, no. 1 (2023): 76–94. http://dx.doi.org/10.3390/jcp3010006.

Full text
Abstract:
The security of IoT-based digital solutions is a critical concern in the adoption of Industry 4.0 technologies. These solutions are increasingly being used to support the interoperability of critical infrastructure, such as in the water and energy sectors, and their security is essential to ensure the continued reliability and integrity of these systems. However, as our research demonstrates, many digital solutions still lack basic security mechanisms and are vulnerable to attacks that can compromise their functionality. In this paper, we examine the security risks associated with IoT-based digital solutions for critical infrastructure in the water sector, and refer to a set of good practices for ensuring their security. In particular, we analyze the risks associated with digital solutions not directly connected with the IT system of a water utility. We show that they can still be leveraged by attackers to trick operators into making wrong operational decisions.
APA, Harvard, Vancouver, ISO, and other styles
30

Papoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (2021): 1396. http://dx.doi.org/10.3390/app11041396.

Full text
Abstract:
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be an asset in alleviating said barrier. More specifically, patterns can be used to encode dependencies between SP properties of individual smart objects and corresponding properties of orchestrations (compositions) involving them, facilitating the design of IoT solutions that are secure and privacy-aware by design. Motivated by the above, this work presents a survey and taxonomy of SP patterns towards the creation of a usable pattern collection. The aim is to enable decomposition of higher-level properties to more specific ones, matching them to relevant patterns, while also creating a comprehensive overview of security- and privacy-related properties and sub-properties that are of interest in IoT/IIoT environments. To this end, the identified patterns are organized using a hierarchical taxonomy that allows their classification based on provided property, context, and generality, while also showing the relationships between them. The two high-level properties, Security and Privacy, are decomposed to a first layer of lower-level sub-properties such as confidentiality and anonymity. The lower layers of the taxonomy, then, include implementation-level enablers. The coverage that these patterns offer in terms of the considered properties, data states (data in transit, at rest, and in process), and platform connectivity cases (within the same IoT platform and across different IoT platforms) is also highlighted. Furthermore, pointers to extensions of the pattern collection to include additional patterns and properties, including Dependability and Interoperability, are given. Finally, to showcase the use of the presented pattern collection, a practical application is detailed, involving the pattern-driven composition of IoT/IIoT orchestrations with SP property guarantees.
APA, Harvard, Vancouver, ISO, and other styles
31

Balogh, Stefan, Ondrej Gallo, Roderik Ploszek, Peter Špaček, and Pavol Zajac. "IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques." Electronics 10, no. 21 (2021): 2647. http://dx.doi.org/10.3390/electronics10212647.

Full text
Abstract:
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT devices are especially damaging and need to be addressed. In this treatise, we overview current security issues of IoT with the perspective of future threats. We identify three main trends that need to be specifically addressed: security issues of the integration of IoT with cloud and blockchains, the rapid changes in cryptography due to quantum computing, and finally the rise of artificial intelligence and evolution methods in the scope of security of IoT. We give an overview of the identified threats and propose solutions for securing the IoT in the future.
APA, Harvard, Vancouver, ISO, and other styles
32

Varga, Pal, Jozsef Peto, Attila Franko, et al. "5G support for Industrial IoT Applications— Challenges, Solutions, and Research gaps." Sensors 20, no. 3 (2020): 828. http://dx.doi.org/10.3390/s20030828.

Full text
Abstract:
Industrial IoT has special communication requirements, including high reliability, low latency, flexibility, and security. These are instinctively provided by the 5G mobile technology, making it a successful candidate for supporting Industrial IoT (IIoT) scenarios. The aim of this paper is to identify current research challenges and solutions in relation to 5G-enabled Industrial IoT, based on the initial requirements and promises of both domains. The methodology of the paper follows the steps of surveying state-of-the art, comparing results to identify further challenges, and drawing conclusions as lessons learned for each research domain. These areas include IIoT applications and their requirements; mobile edge cloud; back-end performance tuning; network function virtualization; and security, blockchains for IIoT, Artificial Intelligence support for 5G, and private campus networks. Beside surveying the current challenges and solutions, the paper aims to provide meaningful comparisons for each of these areas (in relation to 5G-enabled IIoT) to draw conclusions on current research gaps.
APA, Harvard, Vancouver, ISO, and other styles
33

Hlybovets, Andrii, Serhii Shcherbyna, and Oksana Kyriienko. "Security Vulnerabilities and Protection Solutions in Internet of Things Systems." NaUKMA Research Papers. Computer Science 7 (May 12, 2025): 89–97. https://doi.org/10.18523/2617-3808.2024.7.89-97.

Full text
Abstract:
The Internet of Things (IoT) has begun transforming our digital space, in which everyday objects are interconnected and capable of communicating with each other. This transformation not only simplifies our lives but also creates unprecedented opportunities and enhances efficiency in areas such as smart homes, healthcare, industrial manufacturing, and urban management. However, as with any technological breakthrough, IoT requires a careful and well-planned implementation. The large-scale and unregulated deployment of IoT devices raises significant security concerns that must be mitigated.At the core of IoT devices lies the ability to autonomously collect, process, and transmit information independently of human intervention. While this autonomy is the primary innovation, it also introduces numerous security vulnerabilities. For instance, IoT devices often operate on private and public networks, increasinf the attack surface for malicious actors capable of compromising data confidentiality and integrity. However, security is not the sole concern. The reliability and availability of the critical functions these devices provide are equally crucial. From thermostats and smartwatches to autonomous vehicles and urban infrastructure, compromised IoT devices can cause anything from minor inconveniences to catastrophic failures affecting millions.IoT devices typically have limited computational power and memory. These constraints often render the implementation of traditional security measures, such as complex encryption algorithms, impractical. Given these limitations and the explosive growth in the number of IoT devices, the potential for unauthorized interference with systems also increases. According to Cybersecurity Ventures, the number of IoT devices worldwide is expected to reach 25.1 billion by 2025. Each device represents a potential entry point for attackers. This widespread proliferation creates a vast, often poorly secured, network of interconnected devices susceptible to exploitation by malicious actors for data theft, DDoS attacks, and other cyber threats.The infrastructure surrounding IoT devices can be divided into four levels: perception (node capture, node impersonation, replay attack, timing attack, sleep deprivation attack), network (eavesdropping, DoS/DDoS attacks, Man-in-the-Middle attacks), data processing (resource exhaustion, exploits), and application (exploits). Therefore, key security challenges in IoT include unauthorized access to devices and data, communication interception, data manipulation, and depletion of system and device resources.The purpose of this article is to describe a comprehensive proposed solution for securing IoT systems. There is an urgent need for scalable and reliable solutions. Our approach considers the unique characteristics of IoT ecosystems, particularly their diversity, limited computational resources, and the physical nature of the devices.
APA, Harvard, Vancouver, ISO, and other styles
34

Gopal, Khorwal, and Sharma Reena. "Security and Privacy in IoT Systems: Challenges, Solutions, and Emerging Trends." Recent Trends in Information Technology and its Application 8, no. 2 (2025): 37–40. https://doi.org/10.5281/zenodo.15074274.

Full text
Abstract:
<em>The Internet of Things (IoT) is revolutionizing industries by interconnecting devices to collect and share data. While IoT offers numerous benefits, it also introduces significant security and privacy risks. This paper examines the challenges related to security and privacy in IoT systems and explores various solutions, including encryption, decentralized networks, and privacy-enhancing technologies. Furthermore, we discuss the emerging trends in IoT security and privacy, such as blockchain integration, edge computing, and AI-driven threat detection. Our findings suggest that a multi-layered approach to security, combined with proactive privacy measures, is essential to mitigate the risks associated with IoT devices.</em>
APA, Harvard, Vancouver, ISO, and other styles
35

Rahman, Md Aminur, and AKM Nuruzzaman Laskar. "Securing IoT Networks: Challenges and Solutions for Next-Generation Smart Devices." Journal of Information Technology and Sciences 10, no. 3 (2024): 15–20. http://dx.doi.org/10.46610/joits.2024.v10i03.002.

Full text
Abstract:
The rapid growth of the Internet of Things (IoT) has revolutionized connectivity and brought significant security challenges. IoT devices often have limited computational power and energy, making them vulnerable to cyber threats. This research addresses the need for tailored security solutions for next-generation IoT networks, focusing on challenges such as device authentication, data privacy, and network integrity in decentralized environments. The study explores solutions like lightweight cryptography for secure communication, machine learning-based anomaly detection for real-time threat mitigation, and blockchain for decentralized security management. A multi-layered approach is recommended, combining various strategies to ensure robust protection across the IoT lifecycle. Additionally, the research highlights the importance of industry collaboration and standardized protocols to improve security across different platforms. It emphasizes the role of regulatory frameworks in establishing stringent security standards, advocating for a collaborative approach to secure IoT networks. This study contributes valuable insights into addressing IoT security challenges and offers practical solutions for a more resilient digital future.
APA, Harvard, Vancouver, ISO, and other styles
36

Rebecca Ling Ze Siew, Brendan Chan Kah Le, Lee Kai Yue, Nuri Nazirah Binti Ismail, Xavier Liong Zhi Hao, and Muhammad Faisal. "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology." International Journal of Computer Technology and Science 1, no. 3 (2024): 87–105. http://dx.doi.org/10.62951/ijcts.v1i3.29.

Full text
Abstract:
The rapid advancement of Industrial Internet of Things (IIoT) technology necessitates robust authentication solutions to ensure security, scalability, and efficiency. This project, titled "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain," examines various blockchain-based authentication methods for IIoT and identifies their strengths and weaknesses. Despite the enhanced security and decentralized nature of blockchain, issues such as scalability, high latency, and computational load persist. To address these challenges, we propose the integration of Multi-Factor Authentication (MFA) as a supplementary solution. MFA can distribute the authentication load, enhance flexibility and security, and reduce latency by utilizing quick-to-verify factors. Moreover, MFA ensures high availability and scalable storage and processing through cloud services, seamlessly integrating with existing systems to provide a superior user experience. This comprehensive approach not only mitigates the inherent limitations of blockchain technology in IIoT but also reinforces the overall security framework, ensuring resilient and efficient authentication mechanisms. The results demonstrate significant improvements in system performance and user satisfaction, establishing MFA as a viable enhancement to blockchain-based IIoT security solutions.
APA, Harvard, Vancouver, ISO, and other styles
37

Dickson, Solomon Makasda, and Ijeoma Peace OKECHUKWU. "Cyber Security in the Age of the Internet of Things, Constraints, and Solutions." JOURNAL OF DIGITAL LEARNING AND DISTANCE EDUCATION 2, no. 11 (2023): 829–37. http://dx.doi.org/10.56778/jdlde.v2i11.233.

Full text
Abstract:
The Internet of Things (IoT) represents a paradigm shift in the way we interact with technology and the world around us. As the number of IoT devices continues to proliferate across various domains, ranging from smart homes to industrial settings, the vulnerabilities associated with this interconnected ecosystem become increasingly pronounced. This research aims to dissect the multifaceted challenges that arise in securing the vast network of interconnected devices, recognizing that the traditional approaches to cybersecurity may not suffice in this evolving environment. The objectives of the study are to comprehensively analyze these constraints, ranging from insecure IoT device configurations to potential data breaches and privacy concerns. The method adapted for this study is the V Model is a software development and testing methodology that emphasizes a structured approach to the development process. When applied to Cybersecurity and the Internet of Things (IoT) the V Model can be effectively utilized to address the unique complexities associated with securing interconnected devices. The adoption of a “security-by-design” philosophy emerges as a crucial aspect of mitigating IoT-related risks. Incorporating security measures from the inception of device development helps establish a robust foundation. The research anticipates contributing valuable insights to the ongoing discourse on cybersecurity, offering actionable recommendations for stakeholders navigating the intricate landscape of IoT security.
APA, Harvard, Vancouver, ISO, and other styles
38

Olieh, Ofuchi Ngozi Rich. "A Smart Contract-based Blockchain Solution in IoT Networks." European Journal of Computer Science and Information Technology 12, no. 2 (2024): 75–92. http://dx.doi.org/10.37745/ejcsit.2013/vol12n27592.

Full text
Abstract:
The emergence and growing use of advanced technologies has opened up new possibilities for addressing the security challenges of resource-constrained IoT net- works. As IoT devices exchange sensitive data, secure key management is essential for IoT network security, particularly during the key revocation phase. However, current IoT key management solutions require improvements due to the resource limitations of IoT devices. Despite these limitations, existing key revocation solutions still have several areas for improvement, including high communication overheads. Therefore, a decentralized and efficient solution is necessary to address these issues in IoT networks, with a focus on security. This paper proposes a new solution for key revocation based on Blockchain technology using smart contracts to minimize communication overhead and energy consumption in IoT networks. The paper presents a security and performance analysis to assess its correctness. The results indicate that our proposal outperforms other solutions by having a reduced communication overhead of 93.55%, 91.87%, and 99.75% compared to other solutions during the compromising, leaving, and draining cases, respectively. This demonstrates that our solution is efficient and suitable for IoT networks.
APA, Harvard, Vancouver, ISO, and other styles
39

Motwani, Dilip, Vidya Chitre, Varsha Bhosale, Mukesh Israni, Swapnil Sonawane, and Amit Nerurkar. "IoT security cryptographic solutions for trustworthy wireless sensor networks." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 4 (2024): 1283–94. http://dx.doi.org/10.47974/jdmsc-1982.

Full text
Abstract:
The increasing incorporation of wireless sensor networks into the Internet of Things (IoT) has revealed substantial security obstacles. This research paper examines the crucial field of IoT security and introduces a novel cryptographic solution to improve the reliability of wireless sensor networks. The proposed hybrid method of ELGamal + AES (EL-AES) as an innovative approach that synergistically combines the advantages of ELGamal and AES encryption techniques to protect IoT data. The presented study aims to assess the effectiveness of E-AES in enhancing security by comparing it to two commonly used cryptographic techniques Elliptic Curve Cryptography (ECC) and Advanced Encryption Standard (AES). This paper thoroughly examines the capabilities of these cryptographic approaches by conducting a comprehensive assessment using six key evaluation parameters: Throughput, Latency, Resource Utilization, Response Time, Efficiency, and Load Handling. The findings of the work indicate that the EL-AES method surpasses both ECC and AES in all evaluation parameters, highlighting its superior capability in ensuring IoT security. The EL-AES algorithm provides both enhanced security and impressive efficiency, making it a highly promising cryptographic solution for IoT applications that require strong data protection while operating under limited resources. This study adds to the current discussion on IoT security and establishes the EL-AES method as a reliable cryptographic solution for safeguarding wireless sensor networks in the growing IoT environment.
APA, Harvard, Vancouver, ISO, and other styles
40

Uddin, Md Shihab. "Addressing IoT Security Challenges through AI Solutions." International Journal of Computer Applications 186, no. 45 (2024): 50–55. http://dx.doi.org/10.5120/ijca2024924107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Vyshali Rao K P. "Analytical Study of Authentication and Lightweight Security Techniques in 5G-Enabled IoT Networks." Journal of Information Systems Engineering and Management 10, no. 15s (2025): 215–27. https://doi.org/10.52783/jisem.v10i15s.2445.

Full text
Abstract:
This study presents a comparative analysis of authentication mechanisms and lightweight security solutions within 5G-enabled IoT networks. With the advent of 5G technology, the proliferation of IoT devices necessitates robust yet efficient security protocols to safeguard sensitive data transmissions. We analyzed various authentication methods, including certificate-based, identity-based, and biometric-based authentication, to evaluate their effectiveness in providing secure and scalable solutions. Additionally, lightweight security protocols such as Advanced Encryption Standard (AES), Elliptic Curve Cryptography (ECC), and SHA-3 were assessed for suitability in resource-constrained IoT environments. We also examined post-quantum cryptographic approaches, including lattice-based cryptography and code-based cryptography, to address future quantum threats. The findings reveal that while traditional authentication methods ensure robust security, lightweight security solutions and post-quantum cryptographic approaches are essential for practical deployment in IoT devices with limited computational capabilities. This research highlights the importance of a tailored security approach in 5G IoT networks, balancing the diverse requirements of IoT devices with the critical need for efficient and secure data transmission. Ultimately, the study underscores the significance of selecting appropriate security mechanisms to achieve a harmonious blend of security and efficiency in 5G IoT deployments.
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.

Full text
Abstract:
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of the above-mentioned security issues, a security transmission and storage solution is proposed about sensing image for blockchain in the IoT. Firstly, this solution intelligently senses user image information, and divides these sensed data into intelligent blocks. Secondly, different blocks of data are encrypted and transmitted securely through intelligent encryption algorithms. Finally, signature verification and storage are performed through an intelligent verification algorithm. Compared with the traditional IoT data transmission and centralized storage solution, our solution combines the IoT with the blockchain, making use of the advantages of blockchain decentralization, high reliability, and low cost to transfer and store users image information securely. Security analysis proves that the solution can resist theft attacks and ensure the security of user image information during transmission and storage.
APA, Harvard, Vancouver, ISO, and other styles
43

Chmiel, Marta, Mateusz Korona, Fryderyk Kozioł, Krzysztof Szczypiorski, and Mariusz Rawski. "Discussion on IoT Security Recommendations against the State-of-the-Art Solutions." Electronics 10, no. 15 (2021): 1814. http://dx.doi.org/10.3390/electronics10151814.

Full text
Abstract:
The Internet of Things (IoT) is an emerging concept comprising a wide ecosystem of interconnected devices and services. These technologies collect, exchange and process data in order to dynamically adapt to a specific context. IoT is tightly bound to cyber-physical systems and, in this respect, has relevant security implications. A need for IoT security guidelines was identified by the industry in the early 2010s. While numerous institutions across the globe have proposed recommendations with a goal to help developers, distributors and users to ensure a secure IoT infrastructure, a strict set of regulations for IoT security is yet to be established. In this paper, we aim to provide an overview of security guidelines for IoT proposed by various organizations, and evaluate some of the existing technologies applied to ensure IoT security against these guidelines. We gathered recommendations proposed by selected government organizations, international associations and advisory groups, and compiled them into a set of the most common and important considerations, divided into eight categories. Then we chose a number of representative examples from IoT security technologies and evaluated them against these criteria. While none of the examined solutions fulfill all recommendations on their own, the existing technologies introduced by those solutions could be combined to create a design framework which satisfies all the requirements of a secure IoT device. Further research on this matter could be beneficial. To the best of our knowledge, this is the first comprehensive survey to evaluate different security technologies for IoT device security against the compilation of criteria based on existing guidelines.
APA, Harvard, Vancouver, ISO, and other styles
44

Shankar S Miraji and Jyothikumari G. "Security protocols for industrial IoT: Lightweight cryptography and authentication methods." World Journal of Advanced Research and Reviews 6, no. 1 (2020): 297–306. https://doi.org/10.30574/wjarr.2020.6.1.0144.

Full text
Abstract:
The Industrial Internet of Things (IIoT) represents a paradigm shift in manufacturing and industrial automation, connecting billions of devices to create smart factories and efficient production systems. However, the integration of IoT devices in industrial environments introduces significant security challenges due to resource constraints, heterogeneous networks, and critical operational requirements. This paper presents a comprehensive analysis of security protocols specifically designed for industrial IoT environments, with particular emphasis on lightweight cryptography and authentication methods. The research examines the unique security requirements of IIoT systems, evaluates existing lightweight cryptographic solutions, and proposes authentication frameworks suitable for resource- constrained industrial devices. Through systematic analysis of current literature and security protocols, this study identifies key vulnerabilities and presents recommendations for implementing robust security measures in industrial IoT deployments while maintaining operational efficiency and system performance.
APA, Harvard, Vancouver, ISO, and other styles
45

Hwang, Song-Yi, and Jeong-Nyeo Kim. "A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools." Sensors 21, no. 21 (2021): 6983. http://dx.doi.org/10.3390/s21216983.

Full text
Abstract:
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to apply existing security solutions to IoT devices. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are increasing every year. The most representative is the Mirai malware that caused distributed denial of service (DDoS) attacks by creating a massive IoT botnet. Moreover, Mirai malware has been released on the Internet, resulting in increasing variants and new malicious codes. One of the ways to mitigate distributed denial of service attacks is to render the creation of massive IoT botnets difficult by preventing the spread of malicious code. For IoT infrastructure security, security solutions are being studied to analyze network packets going in and out of IoT infrastructure to detect threats, and to prevent the spread of threats within IoT infrastructure by dynamically controlling network access to maliciously used IoT devices, network equipment, and IoT services. However, there is a great risk to apply unverified security solutions to real-world environments. In this paper, we propose a malware simulation tool that scans vulnerable IoT devices assigned a private IP address, and spreads malicious code within IoT infrastructure by injecting malicious code download command into vulnerable devices. The malware simulation tool proposed in this paper can be used to verify the functionality of network threat detection and prevention solutions.
APA, Harvard, Vancouver, ISO, and other styles
46

Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (2020): 3625. http://dx.doi.org/10.3390/s20133625.

Full text
Abstract:
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.
APA, Harvard, Vancouver, ISO, and other styles
47

Abdullah, Ahmed Y., Ibrahim M. Elhenawy, and Ahmed Abdelmonem. "Security Challenges and Solutions in the Internet of Things." Journal of Intelligent Systems and Internet of Things 6, no. 2 (2022): 67–78. http://dx.doi.org/10.54216/jisiot.060206.

Full text
Abstract:
The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout. It is employed in smart cities for things like highways and clinics, as well as in smart buildings for things like regulating doors and air conditioner units, avoiding fires, and many other things. The Internet of Things (IoT) refers to a set of interconnected computing devices that may communicate with one another by exchanging data over the internet. This provides the opportunity for the attacker to penetrate the IoT technologies and get the important data they contain. The restricted measure performance of IoT systems is the source of the issue, as they make it impossible to implement the conventional security mechanism on these devices. As a result of this constraint, it is necessary to propose lightweight algorithms that are capable of supporting IoT devices. However, Internet of Things (IoT) safety and confidentiality are important challenges that might impede the technology's long-term growth. In this study, we have addressed the security of the internet of things from two primary vantage points, namely, IoT design and protocols. We cover the many levels that make up the architecture of the Internet of Things (IoT), as well as the security problems that are connected with those layers and the possible alternatives to those concerns. We went through a variety of protocols that are used in the layered evolution of the Internet of Things, as well as the security mechanisms that were built for every protocol
APA, Harvard, Vancouver, ISO, and other styles
48

Buddula, Dheeraj Varun Kumar Reddy, Hari Hara Sudheer Patchipulusu, Achuthananda Reddy Polu, Bhumeka Narra, Navya Vattikonda, and Anuj Kumar Gupta. "CYBERSECURITY CHALLENGES IN INTERNET OF THINGS ECOSYSTEMS: AN ANALYSIS OF THREATS, COUNTERMEASURES, AND FUTURE RESEARCH DIRECTIONS." ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING 07, no. 04 (2025): 89–100. https://doi.org/10.63665/ajeee.v07i04.01.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) Devices has made cybersecurity more difficult, requiring strong security frameworks to safeguard private information and maintain system integrity. Conventional security solutions usually fall short of the dynamic and ever-evolving nature of cyber threats that target IoT ecosystems. This paper explores advanced security strategies, including artificial intelligence (AI)-driven threat detection, blockchain-based authentication, and post-quantum cryptographic algorithms, to enhance IoT security and their ecosystem. It also emphasizes the necessity of standardized regulatory frameworks to harmony security techniques worldwide and the significance of lightweight security solutions designed for IoT devices withlimited resources. In order to reduce risks and promote a more secure IoT environment, the study highlights the need for awareness and training. To ensure that IoT infrastructures are resilient, future research will concentrate on improving security procedures to adjust to new threats and technological developments.
APA, Harvard, Vancouver, ISO, and other styles
49

Dheeraj, Varun Kumar Reddy Buddula Hari Hara Sudheer Patchipulusu Achuthananda Reddy Polu Bhumeka Narra Navya Vattikonda and Anuj Kumar Gupta. "CYBERSECURITY CHALLENGES IN INTERNET OF THINGS ECOSYSTEMS: AN ANALYSIS OF THREATS, COUNTERMEASURES, AND FUTURE RESEARCH DIRECTIONS." ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING 07, no. 04 (2022): 89–100. https://doi.org/10.5281/zenodo.15335385.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) Devices has made cybersecurity more difficult, requiring strong security frameworks to safeguard private information and maintain system integrity. Conventional security solutions usually fall short of t he dynamic and ever - evolving nature of cyber threats that target IoT ecosystems. This paper explores advanced security strategies, including artificial intelligence (AI) - driven threat detection, blockchain - based authentication, and post - quantum cryptograph ic algorithms, to enhance IoT security and their ecosystem. It also emphasizes the necessity of standardized regulatory frameworks to harmony security techniques worldwide and the significance of lightweight security solutions designed for IoT devices with limited resources. In order to reduce risks and promote a more secure IoT environment, the study highlights the need for awareness and training. To ensure that IoT infrastructures are resilient, future research will concentrate on improving security proce dures to adjust to new threats and technological developments
APA, Harvard, Vancouver, ISO, and other styles
50

Ikrissi, G., and T. Mazri. "IOT-BASED SMART ENVIRONMENTS: STATE OF THE ART, SECURITY THREATS AND SOLUTIONS." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 279–86. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-279-2021.

Full text
Abstract:
Abstract. Smart environments provide many benefits to the users including comfort, convenience, energy efficiency, safety, automation, and service quality. The Internet of Things (IoT) has developed to become one of the widely used technologies in smart environments. Many security attacks and threats are generated by security flaws in IoT-based systems and devices, which may affect smart environments applications. As a result, security is one of the most important issues in any smart area or environment based on the IoT model. This paper presents an overview of smart environments based on IoT technology and highlights the main security issues and countermeasures in the four layers of smart environment IoT architecture. It also reviews some of the current solutions that ensure the security of information in smart environments applications.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography