Internet of Things (IoT) Cybersecurity Challenges and Mitigation Mechanisms


Joshua Ebere Chukwuere(1*)

(1) Department of Information Systems, North-West University, South Africa
(*) Corresponding Author

Abstract


This study deployed desktop research methodology in seeking to understand the cybersecurity challenges confronting Internet of Things (IoT) and the mitigation mechanisms. Objects are no longer independent from each other; rather, connectivity through the power of the internet has connected them. IoT is no longer a new invention or innovation in the technology industry and human lives. The concept is widely used in different industries such as healthcare, food, finance, manufacturing, government, insurance, oil and gas, transportation, postal services, defence, and many more. These industries are using the ability of IoT to function optimally in facilitating different activities. Users of technology devices use IoT devices in homes, offices, and other places to increase productivity and efficiency daily. This article analyses the cybersecurity challenges of IoT and its mitigation mechanisms. The findings identified different cybersecurity challenges confronting IoT and the ways to mitigate them.

Keywords


Cybersecurity, Internet of everything, Internet of things, Internet, IoT, Security

Full Text:

PDF

References


Abomhara, M., & Køien, G. M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 65–88.

Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., & Saadi, M. (2017). Big data security and privacy in healthcare: A Review. Procedia Computer Science, 113, 73–80.

Ali, B., & Awad, A. I. (2018). Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors, 18(3), 817.

Banafa, A. (2017). The Internet of Everything (IoE). Dostupno Na.

Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K. N., Nadeau,

E., O’Rourke, D. G., Piccarreta, B., & Scarfone, K. (2019). Considerations for managing Internet of Things (IoT) cybersecurity

and privacy risks. US Department of Commerce, National Institute of Standards and Technology ….

Farias da Costa, V. C., Oliveira, L., & de Souza, J. (2021). Internet of everything (IoE) taxonomies: A survey and a novel knowledge-based taxonomy. Sensors, 21(2), 568.

Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36–49.

Langley, D. J., van Doorn, J., Ng, I. C. L., Stieglitz, S., Lazovik, A., & Boonstra, A. (2021). The Internet of Everything: Smart things and their impact on business models. Journal of Business Research, 122, 853–863.

Lee, I. (2020). Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet, 12(9), 157.

Lu, Y., & Da Xu, L. (2018). Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103–2115.

Maple, C. (2017). Security and privacy in the internet of things. Journal of Cyber Policy, 2(2), 155–184.

Poyner, I. K., & Sherratt, R. S. (2018). Privacy and security of consumer IoT devices for the pervasive monitoring of vulnerable people. Living in the Internet of Things: Cybersecurity of the IoT-2018, 1–5.

Raj, A., & Prakash, S. (2018). Internet of Everything: A survey based on Architecture, Issues and Challenges. 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), 1–6.

Saad, M., & Soomro, T. R. (2018). Cyber Security and Internet of Things. Pakistan Journal of Engineering, Technology & Science, 7(1).

Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.

Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. (2017). Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. Workshops at the Thirty-First AAAI Conference on Artificial Intelligence.




DOI: https://doi.org/10.15575/ks.v4i2.17638

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Joshua Ebere Chukwuer

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


UIN Sunan Gunung Djati

Kota Bandung, Jawa Barat
Handphone: +6285961137790

E-mail: KSosial@uinsgd.ac.id

Lisensi Creative Commons

Khazanah Sosial  are licensed under Attribution-ShareAlike 4.0 International


Click Her For See Stats