Internet of Things (IoT) Cybersecurity Challenges and Mitigation Mechanisms

Internet of Things (IoT) Cybersecurity Challenges and Mitigation Mechanisms

Authors

  • Joshua Ebere Chukwuere Department of Information Systems, North-West University

DOI:

https://doi.org/10.15575/ks.v4i2.17638

Keywords:

Cybersecurity, Internet of everything, Internet of things, Internet, IoT, Security

Abstract

This study deployed desktop research methodology in seeking to understand the cybersecurity challenges confronting Internet of Things (IoT) and the mitigation mechanisms. Objects are no longer independent from each other; rather, connectivity through the power of the internet has connected them. IoT is no longer a new invention or innovation in the technology industry and human lives. The concept is widely used in different industries such as healthcare, food, finance, manufacturing, government, insurance, oil and gas, transportation, postal services, defence, and many more. These industries are using the ability of IoT to function optimally in facilitating different activities. Users of technology devices use IoT devices in homes, offices, and other places to increase productivity and efficiency daily. This article analyses the cybersecurity challenges of IoT and its mitigation mechanisms. The findings identified different cybersecurity challenges confronting IoT and the ways to mitigate them.

References

Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 65–88.

Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., & Saadi, M. (2017). Big data security and privacy in healthcare: A Review. Procedia Computer Science, 113, 73–80.

Ali, B., & Awad, A. I. (2018). Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors, 18(3), 817.

Banafa, A. (2017). The Internet of Everything (IoE). Dostupno Na.

Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K. N., Nadeau,

E., O’Rourke, D. G., Piccarreta, B., & Scarfone, K. (2019). Considerations for managing Internet of Things (IoT) cybersecurity

and privacy risks. US Department of Commerce, National Institute of Standards and Technology ….

Farias da Costa, V. C., Oliveira, L., & de Souza, J. (2021). Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors, 21(2), 568.

Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36–49.

Langley, D. J., van Doorn, J., Ng, I. C. L., Stieglitz, S., Lazovik, A., & Boonstra, A. (2021). The Internet of Everything: Smart things and their impact on business models. Journal of Business Research, 122, 853–863.

Lee, I. (2020). Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet, 12(9), 157.

Lu, Y., & Da Xu, L. (2018). Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103–2115.

Maple, C. (2017). Security and privacy in the internet of things. Journal of Cyber Policy, 2(2), 155–184.

Poyner, I. K., & Sherratt, R. S. (2018). Privacy and security of consumer IoT devices for the pervasive monitoring of vulnerable people. Living in the Internet of Things: Cybersecurity of the IoT-2018, 1–5.

Raj, A., & Prakash, S. (2018). Internet of Everything: A survey based on Architecture, Issues and Challenges. 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), 1–6.

Saad, M., & Soomro, T. R. (2018). Cyber Security and Internet of Things. Pakistan Journal of Engineering, Technology & Science, 7(1).

Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.

Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017). Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. Workshops at the Thirty-First AAAI Conference on Artificial Intelligence.

Downloads

Published

2022-04-16
Loading...