Internet of Things (IoT) Cybersecurity Challenges and Mitigation Mechanisms
DOI:
https://doi.org/10.15575/ks.v4i2.17638Keywords:
Cybersecurity, Internet of everything, Internet of things, Internet, IoT, SecurityAbstract
This study deployed desktop research methodology in seeking to understand the cybersecurity challenges confronting Internet of Things (IoT) and the mitigation mechanisms. Objects are no longer independent from each other; rather, connectivity through the power of the internet has connected them. IoT is no longer a new invention or innovation in the technology industry and human lives. The concept is widely used in different industries such as healthcare, food, finance, manufacturing, government, insurance, oil and gas, transportation, postal services, defence, and many more. These industries are using the ability of IoT to function optimally in facilitating different activities. Users of technology devices use IoT devices in homes, offices, and other places to increase productivity and efficiency daily. This article analyses the cybersecurity challenges of IoT and its mitigation mechanisms. The findings identified different cybersecurity challenges confronting IoT and the ways to mitigate them.References
Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 65–88.
Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., & Saadi, M. (2017). Big data security and privacy in healthcare: A Review. Procedia Computer Science, 113, 73–80.
Ali, B., & Awad, A. I. (2018). Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors, 18(3), 817.
Banafa, A. (2017). The Internet of Everything (IoE). Dostupno Na.
Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K. N., Nadeau,
E., O’Rourke, D. G., Piccarreta, B., & Scarfone, K. (2019). Considerations for managing Internet of Things (IoT) cybersecurity
and privacy risks. US Department of Commerce, National Institute of Standards and Technology ….
Farias da Costa, V. C., Oliveira, L., & de Souza, J. (2021). Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors, 21(2), 568.
Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36–49.
Langley, D. J., van Doorn, J., Ng, I. C. L., Stieglitz, S., Lazovik, A., & Boonstra, A. (2021). The Internet of Everything: Smart things and their impact on business models. Journal of Business Research, 122, 853–863.
Lee, I. (2020). Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet, 12(9), 157.
Lu, Y., & Da Xu, L. (2018). Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103–2115.
Maple, C. (2017). Security and privacy in the internet of things. Journal of Cyber Policy, 2(2), 155–184.
Poyner, I. K., & Sherratt, R. S. (2018). Privacy and security of consumer IoT devices for the pervasive monitoring of vulnerable people. Living in the Internet of Things: Cybersecurity of the IoT-2018, 1–5.
Raj, A., & Prakash, S. (2018). Internet of Everything: A survey based on Architecture, Issues and Challenges. 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), 1–6.
Saad, M., & Soomro, T. R. (2018). Cyber Security and Internet of Things. Pakistan Journal of Engineering, Technology & Science, 7(1).
Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.
Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017). Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. Workshops at the Thirty-First AAAI Conference on Artificial Intelligence.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).