IoT Security: Solutions to Mitigate Attacks

Article Preview

Abstract:

The Internet of Things is one of the most revolutionary technologies since the past few years that has brought to humans unprecedented levels of connectivity, providing functionality and appliances in different industries across the world. However, as with everything that has connection to the internet, IoT is also not exempted from security attacks and risks. This technology faces various privacy and cybersecurity vulnerabilities, and if these vulnerabilities are taken advantage of by attackers it can bring severe consequences and threats to homes and industries. Conventional security methods seem to be not achievable for IoT devices, that is why this work presents an introduction on what is an IoT device, what is the magnitude of the risk in security they are exposed. The three pillars on security of IoT devices are discussed to understand the importance and how the security methods work to maintain all the three pillars. After introducing the topic, different mitigation solutions by multiple authors are discussed in this work to help us have a clear view on the landscape of the risk and vulnerabilities on IoT devices that can affect the usage and confidence on them.

You have full access to the following eBook

Info:

Periodical:

Pages:

107-114

Citation:

Online since:

January 2026

Keywords:

Export:

Share:

Citation:

* - Corresponding Author

[1] A.G. Menjivar, "Mobile App Development for Wireless Monitoring and Configuration of Sensors using ESP8266," in 2022 IEEE Central America and Panama Student Conference (CONESCAPAN), San Salvador, El Salvador: IEEE, Oct. 2022, p.1–6.

DOI: 10.1109/CONESCAPAN56456.2022.9959569

Google Scholar

[2] "Development of a Pure Sine Wave Current Inverter with IoT Monitoring | IEEE Conference Publication | IEEE Xplore." Accessed: Jan. 23, 2024. [Online]. Available: https://ieeexplore.ieee.org/document/9959240

Google Scholar

[3] M. H. Alsharif, A. Jahid, A. H. Kelechi, and R. Kannadasan, "Green IoT: A Review and Future Research Directions," Symmetry, vol. 15, no. 3, Art. no. 3, Mar. 2023

DOI: 10.3390/sym15030757

Google Scholar

[4] L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, "IoT Privacy and Security: Challenges and Solutions," Appl. Sci., vol. 10, no. 12, Art. no. 12, Jan. 2020.

DOI: 10.3390/app10124102

Google Scholar

[5] W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, and Y. A. Bangash, "An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via SoftwareDefined Security," IEEE Internet Things J., vol. 7, no. 10, p.10250–10276, Oct. 2020.

DOI: 10.1109/JIOT.2020.2997651

Google Scholar

[6] T. Varshney, N. Sharma, I. Kaushik, and B. Bhushan, "Architectural Model of Security Threats theirCountermeasures in IoT," in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India: IEEE, Oct. 2019, p.424–429

DOI: 10.1109/ICCCIS48478.2019.8974544

Google Scholar

[7] C. Wang and Z. Lu, "Cyber Deception: Overview and the Road Ahead," IEEE Secur. Priv., vol. 16, no. 2, p.80–85, Mar. 2018.

DOI: 10.1109/MSP.2018.1870866

Google Scholar

[8] D. Weissman, "IoT Security Using Deception – Measuring Improved Risk Posture," in 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), Jun. 2020, p.1–2.

DOI: 10.1109/wf-iot48130.2020.9221223

Google Scholar

[9] H. Galadima, A. Seeam, and V. Ramsurrun, "Cyber Deception against DDoS attack using Moving Target Defence Framework in SDN IOT-EDGE Networks," in 2022 3rd International Conference on Next Generation Computing Applications (NextComp), Oct. 2022, p.1–6.

DOI: 10.1109/NextComp55567.2022.9932172

Google Scholar

[10] M. S. Pour, J. Khoury, and E. Bou-Harb, "HoneyComb: A Darknet-Centric Proactive Deception Technique for Curating IoT Malware Forensic Artifacts," in NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, Apr. 2022, p.1–9.

DOI: 10.1109/NOMS54207.2022.9789827

Google Scholar

[11] "Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware.pdf."

Google Scholar

[12] "Design of Restaurant Billing System (E Bill Resto) by Applying Synchronization of Data Billing in Branch Companies to Main Companies Based on Rest API | IEEE Conference Publication | IEEE Xplore."

DOI: 10.1109/icosta48221.2020.1570615039

Google Scholar

[13] K. Košťál, P. Helebrandt, M. Belluš, M. Ries, and I. Kotuliak, "Management and Monitoring of IoT Devices Using Blockchain," Sensors, vol. 19, no. 4, Art. no. 4, Jan. 2019.

DOI: 10.3390/s19040856

Google Scholar

[14] "IoT Security Enhancement Using Blockchain | IEEE Conference Publication | IEEE Xplore." Accessed: Jan. 28, 2024. [Online]. Available: https://ieeexplore.ieee.org/document/9792693

Google Scholar

[15] R. Patel, Cyber Security in Domain of IoT: A Review Threats and Security. 2020.

Google Scholar

[16] ] Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, "Machine Learning-Based IoTBotnet Attack Detection with Sequential Architecture," Sensors, vol. 20, no. 16, Art. no. 16, Jan. 2020.

DOI: 10.3390/s20164372

Google Scholar

[17] "IoT Botnet Creation and Detection using Machine Learning | IEEE Conference Publication | IEEE Xplore." Accessed: Jan. 28, 2024. [Online]. Available: https://ieeexplore.ieee.org/document/10141717

Google Scholar

[18] "Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks | IEEE Journals Magazine|IEEE Xplore." Accessed: Jan. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9316792

Google Scholar

[19] "Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture | IEEE Journals Magazine | IEEE Xplore." Accessed: Jan. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8993716

DOI: 10.1109/jiot.2020.2973176

Google Scholar

[20] M. A. Lawal, R. A. Shaikh, and S. R. Hassan, "An Anomaly Mitigation Framework for IoT Using Fog Computing," Electronics, vol. 9, no. 10, Art. no. 10, Oct. 2020.

DOI: 10.3390/electronics9101565

Google Scholar