The Emergence Of The "Internet Of Things": Analyze And Address Research Questions Concerning The Recognition And Mitigation Against Iot-Based Security Attacks
DOI:
https://doi.org/10.64252/cwp74985Keywords:
Internet of Things, Cybersecurity, Security Attacks, Blockchain Technology.Abstract
As the Internet of Things (IoT) permeates more aspects of our daily lives, serious worries about potential cybersecurity threats and the need for trustworthy solutions are raised. Since there are now billions of devices online, the Internet of Things is becoming a necessary part of daily life. Because Internet of Things devices are networked, they are also susceptible to cyberattacks. This paper offers a thorough and comprehensive overview of the methods used to identify and resolve different kinds of Internet of Things security breaches. It is intended for Internet of Things practitioners, academics, and software developers who want to learn how to recognize and prevent these kinds of crimes. Nonetheless, we examined the most recent innovative IoT security solutions and concentrated on four key areas: (1) The process involves selecting example attacks by hand, (2) identifying possible solutions, (3) carrying out a threat analysis for each attack and solution, and (4) evaluating solutions based on the risks that they successfully mitigate. Using this paradigm, we were able to identify five primary categories of defense mechanisms: anomaly detection, distributed denial of service detection and prevention, encryption techniques, default password protection, and intrusion detection and prevention.
In terms of utility and usability, these solutions are comparatively advanced. However, the security analysis only looks at a subset of attacks, which may or may not affect actual deployment. Every Internet of Things security solution should include threat modeling.
However, they must also consider other factors like implementation effort and resource utilization. Owing to the intricacy of IoT operating systems, heterogeneous IoT devices, and restricted laws for intellectual property disclosure, evaluating IoT security solutions is challenging. Furthermore, we see that there is still a deficiency in research that thoroughly evaluates the state-of-the-art with regard to proposed mechanisms as well as frameworks/methodologies.