Comprehensive Analysis of the Current State of Cyber Security Measures for IoT Devices

Chithik Raja Raja Mohamed Mohamed Sinnaiya, Mohamed Musallam Bakhit Al-Mahri, Devarajan Veerasamy, Sunil Thomas Karickom

Abstract


A new era of connectivity has been brought about by the Internet of Things (IoT), which presents unheard-of chances for innovation in a wide range of sectors and applications. IoT device proliferation does, however, also bring with it serious cybersecurity challenges. This systematic review examines the state of cyber security risk in the Internet of Things (IoT) space today, providing a thorough analysis of the research that has already been done and the approaches that have been used to assess and mitigate these risks. We study different aspects of cyber security risk within the IoT context, such as threat modeling, risk assessment techniques, vulnerability analysis, and mitigation strategies, drawing from a wide range of peer-reviewed articles, industry reports, and white papers. Additionally, the review draws attention to the unique qualities of IoT systems—such as heterogeneity, scalability, and resource constraints—that increase the risks associated with cyber security. The current status of cyber security protocols for Internet of Things devices is thoroughly examined in this paper. This paper will examine the distinct difficulties presented by the Internet of Things environment, the security flaws that these gadgets frequently display, and the possible risks they may encounter. Furthermore, the paper will examine the diverse approaches, tools, and methods presently utilized to enhance the security of Internet of Things devices. We will also talk about the regulatory environment that oversees IoT security and the ongoing research and development initiatives aimed at improving it. In order to help direct future efforts in safeguarding our digital, interconnected world, we hope to offer a comprehensive, perceptive analysis.

Keywords


Internet of Things, Cyber Security, Risk Analysis, Threat Modelling, Vulnerability Analysis, Mitigation Strategies

Full Text:

PDF

References


Ambarkar, S. S., & Shekokar, N. M. (2022). A comprehensive survey of existing security techniques in the IOT protocol stack. Cyber Security Threats and Challenges Facing Human Life, 57–69. https://doi.org/10.1201/9781003218555-7

ANDRIOAIA, D.-A. (2022). Cyber Security Analysis of IOT devices transmitting data in the THINGSPEAK Platform Cloud. Journal of Engineering Studies and Research, 28(3), 29–33. https://doi.org/10.29081/jesr.v28i3.003

Aziz Al Kabir, M., Elmedany, W., & Sharif, M. S. (2023). Securing IOT devices against emerging security threats: Challenges and mitigation techniques. Journal of Cyber Security Technology, 1–25. https://doi.org/10.1080/23742917.2023.2228053

C.P, S., & B.C, M. (2021). Analysis of security issues, threats and challenges in Cyber–physical system for IOT devices. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3882538

Kelly, C., Pitropakis, N., McKeown, S., & Lambrinoudakis, C. (2020). Testing and hardening IOT devices against the Mirai botnet. 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). https://doi.org/10.1109/cybersecurity49315.2020.9138887

Khan, A., & Cotton, C. (2021). Detecting attacks on IOT devices using featureless 1D-CNN. 2021 IEEE International Conference on Cyber Security and Resilience (CSR). https://doi.org/10.1109/csr51186.2021.9527910

Medwed, M., Nikov, V., Renes, J., Schneider, T., & Veshchikov, N. (2021). Cyber resilience for self-monitoring IOT devices. 2021 IEEE International Conference on Cyber Security and Resilience (CSR). https://doi.org/10.1109/csr51186.2021.9527995

R, M., K, G., & Rao, V. V. (2021). Proactive measures to mitigate cyber security challenges in IOT based Smart Healthcare Networks. 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). https://doi.org/10.1109/iemtronics52119.2021.9422615

Bandekar, A., & Javaid, A. Y. (2017). Cyber-attack mitigation and impact analysis for low-power IOT devices. 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). https://doi.org/10.1109/cyber.2017.8446380

Minchev, Z., & Gaydarski, I. (2020). Cyber Risks, Threats & Security Measures Associated with Covid-19. https://doi.org/10.11610/views.0037

Omotunde, H., & Ahmed, M. (2023). A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond. Mesopotamian Journal of Cyber Security, 115–133. https://doi.org/10.58496/mjcsc/2023/016

Palanivel, N., Sathiyanarayanan, P., Indumathi, R., & Selvi, V. (2022). IOT health care devices for patient monitoring. Cyber Security and Operations Management for Industry 4.0, 109–123. https://doi.org/10.1201/9781003212201-8

Rajan, C., Sharma, D., Samajdar, D. P., & Patel, J. (2020). Low power physical layer security solutions for IOT devices. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS), 229–248. https://doi.org/10.1201/9780429270567-10

Schmitt, A., Chasar, T., Sivagnanam, M., & Kaleem, F. (n.d.). Capability Analysis of Internet of Things (IOT) devices in botnets and implications for Cyber Security Risk Assessment Processes. 2018 ASEE Annual Conference & Exposition Proceedings. https://doi.org/10.18260/1-2--30173

Tabassum, A., & Lebda, W. (2019). Security Framework for IOT devices against Cyber-attacks. 6th International Conference on Computer Science, Engineering and Information Technology (CSEIT-2019). https://doi.org/10.5121/csit.2019.91321

Tuscano, A., & Joshi, S. (2023). Significance of cyber security of IOT devices in the healthcare sector. 2023 Somaiya International Conference on Technology and Information Management (SICTIM). https://doi.org/10.1109/sictim56495.2023.10104657

Wu, C.-K. (2021). A comprehensive set of security measures for IOT. Internet of Things Security, 199–245. https://doi.org/10.1007/978-981-16-




DOI: http://dx.doi.org/10.21533/scjournal.v13i1.292

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Chithik Raja Raja Mohamed Mohamed Sinnaiya, Mohamed Musallam Bakhit Al-Mahri, Devarajan Veerasamy, Sunil Thomas Karickom

ISSN 2233 -1859

Digital Object Identifier DOI: 10.21533/scjournal

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License