IoT Security: Issues, Best Practices, and Open Challenges

Year : 2023 | Volume :01 | Issue : 02 | Page : 7-13
By

Srikanta Kolay

Tryambak Hiwarkar

  1. Research Scholar Department of Computer Science & Engineering, Sardar Patel University Balaghat MP India
  2. Professor & Dean Department of Computer Science & Engineering, Sardar Patel University Balaghat MP India

Abstract

The internet of things (IoT) provides the facility to connect different devices and communicate and share information over the internet. IoT has emerged as a transformative and pervasive technological paradigm, revolutionizing how we interact with our environment and infusing intelligence into everyday objects and devices. This interconnected ecosystem has unleashed a wave of innovative applications across diverse domains, including healthcare, transportation, agriculture, industrial automation, and smart cities. However, as the IoT footprint expands rapidly, it also brings to the forefront a multitude of complex and pressing security challenges that demand immediate attention and resolution. One of the primary security concerns in the IoT ecosystem is weak authentication and authorization mechanisms. Insufficient encryption measures can lead to data interception and manipulation, exposing confidential information to potential attackers. The lack of automated update mechanisms leaves numerous IoT devices susceptible to known exploits, necessitating the establishment of efficient update processes. With IoT devices deployed in the physical world, they become susceptible to tampering and theft, requiring robust physical security measures to safeguard their integrity. Standardization of security practices across the diverse IoT ecosystem is necessary to establish a unified and robust security framework. Security awareness and education are critical to empowering users and manufacturers to implement secure practices effectively. By comprehensively understanding and actively mitigating the key security issues, adopting best practices, and collaboratively addressing open challenges, we can forge a safer and more resilient IoT landscape that not only fosters innovation but also preserves user privacy and instills confidence in the trustworthiness of IoT technologies. This paper centers on addressing IoT security concerns and exploring the optimal practices to mitigate them. Finally, we point out open challenges as a scope of future research.

Keywords: Internet of things (IoT), IoT security, data security, data privacy, IoT ecosystem, security challenge, IoT devices

[This article belongs to International Journal of Information Security Engineering(ijise)]

How to cite this article: Srikanta Kolay, Tryambak Hiwarkar. IoT Security: Issues, Best Practices, and Open Challenges. International Journal of Information Security Engineering. 2023; 01(02):7-13.
How to cite this URL: Srikanta Kolay, Tryambak Hiwarkar. IoT Security: Issues, Best Practices, and Open Challenges. International Journal of Information Security Engineering. 2023; 01(02):7-13. Available from: https://journals.stmjournals.com/ijise/article=2023/view=124811


Browse Figures

References

Kolay S, Hiwarkar T. Evaluation of the privacy-protecting effects of learning-based IoT ecosystem behavior. J Data Acquisition Process. 2022; 37 (5): 1873–1883.
Yang Y, Wu L, Yin G, Li L, Zhao H. A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 2017; 4 (5): 1250–1258.
Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W. A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 2017;4 (5): 1125–1142.
Rajmohan T, Nguyen PH, Ferry N. A decade of research on patterns and architectures for IoT security. Cybersecurity. 2022; 5: 1–29.
Moinuddin K, Srikantha N, Lokesh KS, Narayana A. A survey on secure communication protocols for IoT systems. Int J Eng Computer Sci. 2017; 6 (6): 21802–21807.
Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L. Authentication protocols for internet of things: a comprehensive survey. Security Commun Netw. 2017; 2017: Article 6562953.
Fremantle P, Scott P. A survey of secure middleware for the internet of things. PeerJ Computer Sci. 2017; 3: e114.
Srivastava A, Gupta S, Quamara M, Chaudhary P, Aski VJ. Future IoT‐enabled threats and vulnerabilities: state of the art, challenges, and future prospects. Int J Commun Syst. 2020; 33 (12): e4443.
Verma V, Bhatia M. Analysis of security measures on the internet of things based applications. In: 2022 3rd International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, October 20–22, 2022. pp. 526–534.
da Cunha V, Carvalho V, Machado J, Soares F. Industrial networks protocols PROFIBUS and RS485–a description of the most common problems. In: Cioboată DD, editor. International Conference on Reliable Systems Engineering 2022. Cham, Switzerland: Springer International Publishing; 2022. pp. 367–374.
Koul N, Kumar N, Sayeed A, Verma C, Raboca MS. Data exchange techniques for internet of robotic things: recent developments. IEEE Access. 2022; 10: 102087–102106.
Liu Y, Yu W, Rahayu W, Dillon T. An evaluative study on IoT ecosystem for smart predictive maintenance (IoT-SPM) in manufacturing: multi-view requirements and data quality. IEEE Internet Things J. 2023; 10 (13): 11160–11184.
Zhou J, Cao Z, Dong X, Vasilakos AV. Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag. 2017; 55 (1): 26–33.
Sharbaf MS. IoT driving new business model, and IoT security, privacy, and awareness challenges. In: 2022 IEEE 8th World Forum on Internet of Things (WF-IoT), Yokohama, Japan, October 26–November 11, 2022. pp. 1–4.
Samaila MG, Neto M, Fernandes DA, Freire MM, Inácio PR. Challenges of securing internet of things devices: a survey. Security Privacy. 2018; 1 (2): e20.


Regular Issue Subscription Review Article
Volume 01
Issue 02
Received July 20, 2023
Accepted October 10, 2023
Published October 30, 2023