SecuritychallengesinIoT Springer
SecuritychallengesinIoT Springer
net/publication/379278792
CITATIONS READS
0 828
4 authors, including:
SEE PROFILE
All content following this page was uploaded by Kingsley Theophilus Igulu on 01 May 2024.
Abstract The concept of the Internet of Things (IoT) revolves around the exchange
of information among low-power embedded devices, linked to the internet, in order
to enable seamless communication. The IoT has a profound impact on various
aspects of modern life, from mobile devices and sensors that keep track of the
surrounding environment to smart industrial gadgets. While the Internet of Things
offers numerous advantages, it also presents security and privacy concerns. The
information transmitted through the IoT includes sensitive data such as banking
information, geographic data, environmental data, medical information, and other
personal information. Hence, it is crucial to acknowledge the security challenges
posed by the IoT and address them appropriately. This chapter presents comprehen-
sive insights into the security challenges associated with the Internet of Things, while
considering the vast scope of the topic and existing literature. It discusses various IoT
security challenges, IoT security architectures, IoT security solution trust zones and
boundaries, potential risks of IoT devices, notable cases of IoT security breaches,
solutions to IoT security breaches, strategies for securing IoT data and best IoT
security practices.
B. Johnson
Department of Computer Science, Ignatius Ajuru University of Education, Port Harcourt, Nigeria
K. Igulu (B) · A. N. Stephen
Department of Computer Science, Ken Saro-Wiwa Polytechnic, Rivers State, Bori, Nigeria
e-mail: igulukt@[Link]
T. K. Bhatia
School of Computer Science, UPES, Dehradun, India
e-mail: drtarandeepkaurbhatia@[Link]
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024 51
A. Prasad et al. (eds.), Communication Technologies and Security Challenges in IoT,
Internet of Things, [Link]
Security
52 Challenges in IOT K. Igulu et 52
al.
Introduction
The IoT has the potency to completely alter the way human engage with the physical
world from our homes and workplaces to our vehicles and cities. But with this
revolution comes a host of security challenges, from data privacy and hacking to
cyber-attacks and malware. As the IoT revolution progresses, it is essential that we
understand the risks and develop effective strategies to protect ourselves [13].
The IoT is a rapidly evolving field that is transforming industries such as agricul-
ture, healthcare transportation, and manufacturing. It is projected that by 2030, there
will be 50 billion IoT devices, with an associated economy worth of $11 trillion [53].
Nevertheless, the growth of IoT devices raises various security concerns that must
be addressed to guarantee that the benefits of IoT do not outweigh the hazards.
IoT devices are vulnerable to attacks from hackers who can exploit their weak-
nesses to gain unauthorized access to data, manipulate systems, and cause disrup-
tions. These security challenges are compounded by the fact that IoT devices are
often constructed with small memory, restricted processing power, and battery life,
which limits the implementation of robust security protocols. Furthermore, many
IoT devices are deployed in remote and harsh environments where maintenance and
security updates are challenging to implement [78].
In this chapter, we shall look at the security challenges facing the IoT revolution
and what can be done to address them. We shall explore the potential risks of IoT
technology, the need for robust security measures, and the steps that can be taken to
protect ourselves and our data. With the right approach, we can ensure that the IoT
revolution is a safe and secure one.
The term “IoT security architecture” refers to the planning and execution of protective
measures for the IoT devices, networks, and applications from cyber threats. An IoT
security architecture typically involves several layers of security controls to ensure
the confidentiality, availability, and integrity of transmitted data between IoT devices
and systems. Here are some key components of an IoT security architecture [13, 15,
57, 73]:
• Device security: This layer involves securing IoT devices at the hardware and
firmware levels, which includes secure boot, encryption, and device authentica-
tion. In addition to this, it involves making sure that the devices in question have
the most recent security patches and firmware updates installed.
• Network security: This layer involves securing communication between devices
in IoT and networks. This includes authorization and authentication, secure data
transmission, encryption, and intrusion detection.
Security
53 Challenges in IOT K. Igulu et 53
al.
• Cloud security: This layer involves securing the cloud infrastructure and services
that store and process IoT data. This includes data encryption, access control, and
backup and recovery mechanisms.
• Application security: This layer involves securing the IoT applications that run
on top of the infrastructure. This includes authentication, authorization, input
validation, and encryption of sensitive data.
• Data security: This layer involves securing the data transmitted and stored by
IoT devices and systems. This includes data encryption, access control, and data
loss prevention mechanisms.
• Physical security: This layer involves securing the physical environment where
IoT devices and systems are deployed. This includes access control, surveillance,
and monitoring mechanisms.
Overall, an effective IoT security architecture should be designed to cater for the
peculiar security challenges eventuated by IoT devices and networks, such as the
massive scale of devices, the variety of communication protocols, and the diversity
of application domains.
The solution developed during the procedure of designing an architecture for the IoT
would have many different parts. Each of these parts serves a different purpose and
provides essential building blocks that may be put together in any way to create an
IoT solution. Any of these parts can be used in the design and construction of an IoT
system.
• Devices: The sensors and other parts of the Internet of Things are connected to
specific devices. Devices may also be linked to additional parts. The “things” in
“Internet of Things” come from the devices themselves.
• Field Gateway(s): This is a software or hardware component that acts as an
intermediary between the endpoint devices and the cloud. By acting as a hub for
both cloud-based and on-premises components, they can be leveraged to improve
security. Message or protocol translation, aggregation of events and messages in
communication, and other system-level services are only a few of the many uses
for field gateways.
• Edge Devices: One subset of Field Gateways are the Edge Gateways (also known
as edge devices). It’s superior because it allows Cloud functions to be executed
locally, in close proximity to other devices, hence minimizing delays in the feed-
back loop of real-time processing. Edge gateways can be outfitted to perform tasks
typically performed in the cloud, such as event stream processing and machine
learning.
Security
54 Challenges in IOT K. Igulu et 54
al.
• Cloud Gateway: These are equivalent to the popular Field Gateways; the main
difference is that they are hosted in the cloud rather than on a company’s own
servers. By being in the cloud rather than on a local device, Cloud Gateways can
perform the same duties as Field Gateways.
• Services: The Services section of an IoT system’s backend encompasses every-
thing else, such as REST APIs, databases, and so on. Depending on their role
in the overall IoT solution architecture, these services can be setup in the cloud,
on-premises, or hybridized.
The IoT has the potential to completely alter the way we engage with the physical
world, from our homes and workplaces to our vehicles and cities [20, 44, 56]. But with
this revolution comes a host of security challenges, from data privacy and hacking
to cyber-attacks and malware. As the IoT revolution progresses, it is essential that
we understand the risks and develop effective strategies to protect ourselves. In this
overview, we’ll look at the security challenges facing the IoT revolution and what
can be done to address them [78].
We shall explore the potential risks of IoT technology, the need for robust security
measures, and the steps that can be taken to protect ourselves and our data. With the
right approach, we can ensure that the IoT revolution is a safe and secure one.
The security challenges posed by the IoT revolution are numerous. Increases in the
number of Internet-connected devices have also increased the potential for malicious
actors to exploit weaknesses in these systems. IoT devices are often vulnerable to
a range of security challenges which are listed and discussed below according to
[60, 63].
Vulnerabilities in Devices
Typically, the processing power, memory, and battery life of IoT devices are all on
the low end. This often leads to vulnerabilities that can be exploited by attackers to
gain access to sensitive data or take control of the device. Manufacturers must ensure
that IoT devices are designed with security in mind, including secure communication
Security
56 Challenges in IOT K. Igulu et 56
al.
protocols, firmware updates, and secure data storage. In the context of IoT security,
device security is considered to be a crucial aspect according to the findings of
several researchers [83, 84, 87]. Yu et al. [84] have discussed the presence of known
vulnerable devices that can be exploited for DDoS attacks due to issues like hardcoded
administrative login credentials and open DNS resolvers. Airehrour et al. [3] have
reported a 2012 case where TRENDNET IP cameras streamed live footage without
the need for a password. Patton et al. [58] have conducted a thorough investigation of
35,737 different IoT devices, and the results show that the majority of devices were
openly accessible over the internet without any identification requirements.
IoT devices have various potential vulnerabilities that can be exploited by
attackers. These vulnerabilities can be classified into three categories: physical,
software, and network.
Physical Vulnerabilities
Physical vulnerabilities are related to physical access to IoT devices. IoT devices can
be physically accessed by attackers to manipulate the device, extract sensitive data
or install malware. For example, attackers can physically tamper with the device to
extract passwords or install malware.
Software Vulnerabilities
Software vulnerabilities are related to the software running on the IoT devices. IoT
devices are often designed with limited resources, which means the software may
not be fully secure. Additionally, IoT devices may be running outdated or unpatched
software, which can leave them vulnerable to attacks. For example, attackers can
exploit a software vulnerability to remotely control the device.
Network Vulnerabilities
The network connections of IoT devices present security risks. Since many IoT
devices are online, they are susceptible to cybercriminal activity. Additionally, IoT
devices are often connected to other devices, which can be exploited to gain access to
the IoT device. For example, attackers can exploit a network vulnerability to intercept
data transmitted between the device and the cloud server.
Security
57 Challenges in IOT K. Igulu et 57
al.
Many As per industry experts, one of the major security challenges in the Internet of
Things (IoT) is the lack of authentication and authorization mechanisms in many IoT
devices. Attackers can easily exploit this vulnerability to gain unauthorized access
to the device and compromise its security. To combat this issue, manufacturers need
to implement robust authentication mechanisms such as multi-factor authentication
and role-based access control to restrict access to only authorized users.
The identification and authentication of devices are complex tasks in IoT due to the
vast number of devices connected. Authentication is crucial to ensure the integrity of
a device’s data stream. Additionally, authorization serves as a crucial access control
measure to prevent hacking attempts. A study by [56] indicates that current security
mechanisms lack access control and privacy protection. Therefore, it is imperative to
implement authorization servers in server-based protocols to ensure access control
in IoT.
Lack of Encryption
Encryption is critical to protect data transmitted between IoT devices and servers.
However, many IoT devices do not have built-in encryption capabilities or use weak
encryption algorithms. This leaves data vulnerable to interception and manipulation
by attackers. It is essential to implement strong encryption mechanisms to protect
data transmitted between devices and servers.
Environment Constraints
The environment presents a significant problem for loT security. Hossain et al. [35]
enumerate them. The computing power, memory, and battery life of devices are cited
as the first hardware restrictions. Therefore, operations that are computationally
complex and memory expensive are not a good fit for the IoT. Next, they focus on
software restrictions. Thin network stacks are a feature of loT devices’ operating
systems, which may prevent them from being remotely reprogrammed. This restricts
the development of security modules and the distribution of security updates for
certain platforms. Finally, they talk about the limits imposed by the network. The
security design is complicated by the networks’ mobility, scale, and heterogeneity.
The computational and network limits are agreed upon by [11, 19] as limitations to
loT security.
Security
58 Challenges in IOT K. Igulu et 58
al.
Legislative Issues
As Weber [78] pointed out, the loT business was mostly self-regulated at the time, but
new legal frameworks will be required to protect consumers’ privacy. Weber claimed
that such rules might not be sufficient to guarantee true anonymity or safety. Weber
argued that a global IoT necessitates a global regulatory framework. In the wake
of increasing global concerns over security, it is imperative that the IoT industry is
regulated by a comprehensive security framework. As emphasized by Weber [79,
71] the IoT poses significant challenges to national security, company secrets, and
personal privacy, and therefore, requires legal provisions to ensure its safe and secure
growth.
Enforcement Mechanisms
The enforcement mechanisms of the Internet of Things are either flawed or nonex-
istent, as stated in [83, 84]. Because IoT devices have limited resources and vary
widely in their characteristics, traditional security measures like antivirus software
are not available. Moreover, unlike regular networked devices, IoT devices do not
have automated software updates. Instead, they rely on firmware updates, which need
to be carried out separately by each manufacturer and for each device. Another issue
is that most network security approaches depend on strong static perimeter defenses,
such as firewalls, which become ineffective when insecure IoT devices are integrated
deeply within the network. Kumar et al. [44] also expressed concerns regarding the
absence of security updates for the Internet of Things.
Privacy Concerns
The privacy aspect of the IoT is a significant concern due to the increased risks
of security threats like eavesdropping, unauthorized access, data manipulation, data
forgery, and remote tampering with devices. Researchers such as Ram Mohan Rao
et al. (2018), [65] have highlighted this issue. Data forgery, which involves unautho-
rized modification of device data by external parties, is another potential security risk,
as pointed out by [49]. The data collected in IoT, such as personal information like
names, addresses, and insurance policy numbers, is often sensitive, as emphasized
by [3], and transmitting it to cloud environments introduces additional challenges.
“A vast number of the services and apps offered by the internet of things (IoT)
give sensitive and personal information that is accessible and can be exploited by
an adversary” [49]. Sensitive information that is not encrypted may be accessed by
unauthorized persons.
Security
59 Challenges in IOT K. Igulu et 59
al.
IoT devices often collect and transmit personal data, such as location, health, and
biometric information. This data must be protected from unauthorized access and
use. Manufacturers must implement appropriate data privacy policies and ensure that
personal data is collected and stored securely.
Data privacy is another significant concern in IoT. The vast volumes of data
produced by Internet of Things (IoT) devices can encompass confidential and private
information pertaining to individuals and organizations. This data can include loca-
tion data, personal health information, and financial data. The following are some
data privacy challenges in IoT:
• Collection and Storage of Data: IoT devices collect and store large amounts of
data. This data can be vulnerable to theft or misuse.
• Data Ownership: Who exactly owns the information collected by IoT gadgets is
often not made apparent. This can create challenges when it comes to data privacy
and security.
• Consent: It is often unclear whether individuals have given consent for their data
to be collected and used. This can create challenges for organizations when it
comes to compliance with data privacy regulations.
Overall, data privacy in IoT requires a combination of technical and organizational
measures to ensure that data is protected at every stage of the data lifecycle.
IoT devices are often connected to the internet through home networks, which
are typically not designed to handle large-scale DDoS attacks. Attackers can use
compromised IoT devices to launch DDoS attacks, which can cripple servers and
websites. Manufacturers must ensure that IoT devices are designed with built-in
security mechanisms that can detect and prevent DDoS attacks.
Overall, the security challenges in IoT are complex and require a holistic approach
that involves manufacturers, users, and regulators. Manufacturers must build security
into their devices from the ground up, while users must be educated on how to use IoT
devices safely and responsibly. Regulators must also develop policies and standards
to ensure that IoT devices meet minimum security requirements [17, 30, 85].
Cross-Device Dependencies
a few examples: There are 188 cross-device policies available through the NEST
Protect home security system, 227 through the Wemo Plugin, and 63 through the
Scout Alarm.
Data Theft
Data Tampering
IoT devices also pose various risks that can have serious consequences. These risks
can be classified into three categories: privacy, financial, and physical [53, 53].
Security
62 Challenges in IOT K. Igulu et 62
al.
Privacy Risks
Privacy risks are related to the protection of personal information of the user. IoT
devices collect and transmit sensitive personal data, such as health data or location
data. If this data is intercepted, it can be used for malicious purposes. For example,
attackers can steal personal data and use it for identity theft or blackmail.
Financial Risks
Financial risks are related to the financial loss of the user. IoT devices can be used for
financial transactions, such as online shopping or banking. If an IoT device is compro-
mised, attackers can steal financial information and use it to make unauthorized
purchases or transfers.
Several high-profile IoT security breaches have occurred in recent years, highlighting
the need for better security measures. Some notable examples include:
• Mirai Botnet: In 2016, the Mirai botnet infected more than 600,000 IoT devices,
including cameras, routers, and digital video recorders. In order to disrupt DNS
services, the botnet was utilized to perform a massive, distributed denial of service
(DDoS) attack [5, 86].
Security
63 Challenges in IOT K. Igulu et 63
al.
• Jeep Hack: In 2015, a group of hackers demonstrated how they could take control
of a Jeep Cherokee remotely. The hackers were able to manipulate the car’s air
conditioning, radio, and even its brakes [6, 24, 54].
• St. Jude Medical Hack: In 2017, a security researcher discovered that it was
possible to hack into St. Jude Medical’s pacemakers and defibrillators. The vulner-
ability could have been exploited to remotely control the devices or to drain their
batteries [10, 26, 29].
• Smart Home Device Hacks: Many smart home gadgets, including smart locks
and security cameras, were discovered to be hackable in 2020. Because of this,
hackers may be able to enter people’s houses or spy on them [55, 57, 73] (Shilpa
Sharma 2021).
• Target breach: Using a flaw in a contracted HVAC (Heating, Ventilation, and
Air Conditioning) system, hackers were able to breach Target’s payment system
in [Link] hackers’ success in stealing credit card information for millions of
Target consumers highlights the dangers of interconnected Internet of Things
(IoT) devices and vital infrastructure [50, 59, 66].
• Baby monitor hack: In 2015, a family in Houston, Texas, discovered that their
baby monitor had been hacked when they heard a stranger’s voice coming from
the device. The baby monitor had been connected to the internet without proper
security measures, allowing the attacker to access the device and monitor the
family’s activities [23, 32, 33].
• Stuxnet worm: In 2010, Iran’s nuclear program was attacked using the Stuxnet
worm, which specifically targeted the country’s industrial control systems. The
centrifuges used in uranium enrichment were controlled by programmable logic
controllers (PLCs), which the worm exploited, causing them to malfunction and
destroying the program [38].
These examples demonstrate the importance of IoT security, and the potential risks
associated with insecure IoT devices and systems. It is essential to implement proper
security measures, including access control, network segmentation, and behavioral
analytics, to protect IoT devices and data from potential security breaches.
Physical Risks
Physical risks are related to the safety of the user. IoT devices can be used to control
physical systems, such as door locks or medical equipment. If an IoT device is
compromised, attackers can control the physical system and cause harm to the user.
For example, attackers can remotely unlock the door of a house and break into it.
Security
64 Challenges in IOT K. Igulu et 64
al.
Even though Internet of Things comes with tremendous security issues when
compared to traditional systems, numerous researchers have also provided solutions
for the challenges that Internet of Things presents to security. In the parts that follow,
we’ll talk about some of the ways in which the problems with IoT security could be
fixed. Vasilomanolakis et al. [76] provide a taxonomy of such approaches.
Trust Management
According to both Yu et al. [84] and Hossain et al. [35], trust management is crucial
to the IoT. Having a system in place to manage trust can help individuals deal with
the risks and uncertainties of the Internet of Things. Trust involves guaranteeing
someone’s safety and keeping their business private. According to Bekkali et al.
[11], Ferraris et al. [20] and Tsunoda et al. [74], trust is a key component of the
IoT. They claim that consumers’ experiences with the Internet of Things’ various
features are crucial to their faith in the network as a whole. Users need agency over
their service experiences and transparency into their interactions with systems. They
also think that establishing a reliable governance system can boost people’s faith in
IoT.
Trust management in the IoT is multidimensional as explored in [42]. New decen-
tralized trust models, trust mechanisms for cloud computing, and the creation of
trust-based apps at the node level are the three focus areas for IoT trust research.
They argue that trust evaluations must be automated and unbiased.
Authentication
Zhang and Green [85] provide several different authentication models for use with the
internet of things. Some examples of these models are the gateway model, the trust
chain model, the security token model, and the global trust tree model of authentica-
tion. Every model comes with both positives and negatives specific to it. Mahmoud
et al. [47] discusses authentication mechanisms as well. They describe a method that
only requires one cipher and one time to use it, and utilizes a request-reply technique.
Though very trivial but strong passwords and multi-factor authentication should
be adopted.
Strong Passwords: Strong passwords are essential for IoT devices. Passwords
should be long and complex, and different for each device.
Multi-Factor Authentication (MFA): With MFA, users are required to submit
not one but two different types of authentication before getting access to an IoT
device.
Security
65 Challenges in IOT K. Igulu et 65
al.
Privacy Solutions
Finally, businesses need to test and monitor their systems frequently for problems.
Automated tools for incident detection and response, as well as routine security
audits, fall under this category. To further guarantee the safety of their data in the
event of a security breach, businesses must also have a thorough backup and recovery
plan in place.
Encryption can help in privacy management by securing data that is transmitted
between IoT devices and servers, as well as data that is stored on the devices them-
selves. End-to-end encryption ensures that only the intended recipients can read the
data.
Manufacturers of IoT devices should develop privacy policies that are open, simple
to comprehend, and compliant with industry standards.
Policy Enforcement
Fault Tolerance
In order for Internet of Things systems to be reliable, [74] list a number of require-
ments. There are three necessities for fault tolerance in the loT to be realized. First
and foremost, security needs to be turned on by default for all devices. The second
essential requirement is to provide all IoT devices with the capability to contin-
uously monitor the network and its services without restrictions. Moreover, it is
crucial for every device to possess self-defense mechanisms against potential threats
and network failures. These components should be capable of promptly responding
to service attacks and efficiently restoring them to their normal functioning state.
Secure Communication
According to [44], the protocol stack of IoT devices will seek to mimic that of conven-
tional Internet hosts in order to provide the groundwork for an enlarged internet. They
argue that this allows the Internet of Things to take advantage of many existing secu-
rity measures. In addition, secure communication protocols for the IoT are explored
Security
67 Challenges in IOT K. Igulu et 67
al.
in [56]. They look into both asymmetric key-based security solutions and symmetric
pre-distributed-key-based security solutions.
Secure communication protocols can reduce the network vulnerabilities of IoT
devices. In today’s digital era, security has become a top priority for almost every
business. With the expanding use of Internet of Things devices, guaranteeing the
security of transmitted data has become a major challenge. To limit the hazards
connected with IoT devices, it is vital to employ secure communication protocols
that encrypt the transferred data, such as TLS or SSL. In order to strengthen the
overall security of IoT devices, it is essential to prioritize the deployment of these
protocols.
Secure Routing
In the realm of IoT security, secure routing protocols play a crucial role. These
protocols ensure that sensitive data transmitted across networks remains secure
and protected from potential attacks. There are several examples of such proto- cols,
including the trust-aware secure routing framework (TSFR), the secure multi- hop
routing protocol (SMRP), the group-based trust management scheme (GTMS), the
two-way acknowledgment-based trust (2-ACKT) protocol, and the collaborative
lightweight trust-based routing protocol [3]. As IoT continues to evolve, the need for
robust security measures will only increase, making secure routing protocols a top
priority for organizations and businesses alike.
DDoS Protection
threat and will immediately discard any packets that originate from the attacker’s IP
address [17, 22, 30, 69, 85].
[80] present a method based on this principle for detecting and averting DDoS
attacks in IoT networks. Taking a copy of the sink node’s configuration is another
option (a node that collects data from sensors). This new node would function as
a redundant channel, performing a portion of the sink node’s duties. It has been
calculated that this strategy is financially viable [62, 85].
Spam Prevention
Secure software development can reduce the software vulnerabilities of IoT devices.
IoT devices must be designed with security in mind from the beginning. This includes
regular software updates and patches to fix vulnerabilities [22, 72].
LoT Architectures
Several other IoT architectures are presented in the literature [76]. The objective of
an IoT architecture is to link physical devices with their digital counterparts that
generate services and the like. IoT architectures include Open source cloud solutions
for the Internet of Things (OpenioT), the IoT at Work (IoT@Work), and the Internet
of Things architecture (IoT-A) [76].
Security
69 Challenges in IOT K. Igulu et 69
al.
Regulatory Solutions
The Internet of Things (IoT) is a rapidly evolving concept that has caught the attention
of governments around the world. As Weber [78] explains, the European government
has been proactive in its efforts to regulate the IoT. In 2007, the European Union
recognized the IoT as a legitimate concept and in 2009, a 14-point strategic action
plan was developed. However, as the technology continued to advance, concerns
about data protection and security emerged.
In 2012, it became evident that there were significant differences of opinion
between users and industry stakeholders regarding data protection in the context
of the IoT. The European Commission recognized the need for clear, comprehensive
rules governing the use of IoT devices, and in 2013, the task of developing such rules
was assigned to the European firm RAND [14, 48, 68].
Since then, the issue of IoT security has remained at the forefront of public debate,
with governments and industry leaders working together to find solutions that will
safeguard personal information and protect against cyber-attacks [16, 48, 70, 77, 83].
However, things are less cut and unambiguous in the United States. Most discus-
sions happen inside the many federal departments that focus on different aspects of
the Internet of Things. In 2013, the Federal Trade Commission (FTC) initially asked
for public feedback on the privacy and security of the Internet of Things. More than
60% of the 27 responses were negative to regulatory intervention. The FTC hosted
a session on the IoT later that year. The study’s authors concluded that regulation
should be based on whether or not businesses expect to make money solely from
selling IoT devices, or whether or not they expect to make money from selling user
data as well [48, 70].
IoT (Internet of Things) devices and the data they collect and transmit are only
as safe and private as the security standards and regulations that govern them. The
healthcare, transportation, and energy sectors all rely heavily on IoT devices, making
them prime targets for destructive cyberattacks [48].
Security standards and regulations set guidelines and requirements for manufac-
turers and service providers to follow when designing, developing, and deploying
IoT devices. They provide a framework for assessing and managing security risks,
implementing security controls, and ensuring that the devices comply with industry
best practices.
Some of the key security standards and regulations in IoT include:
ISO/IEC 27,001: Information security management systems should adhere to this
standard since it has international credibility. Protecting private information, such
as that gathered by Internet of Things gadgets, is made easier with this methodical
approach [14, 75].
NIST Cybersecurity Framework: The National Institute of Standards and Tech-
nology developed the NIST framework as a set of standards, recommendations, and
best practices to aid in the control of cyber risks. It helps organizations better prepare
for, respond to, and recover from cyberattacks [48, 77].
Security
70 Challenges in IOT K. Igulu et 70
al.
Physical Security
Locking cabinets or rooms in which IoT devices are stored can help prevent illegal
physical access to these devices. Physical security on the IoT refers to the precautions
taken to prevent the loss, compromise, or tampering of IoT hardware and infrastruc-
ture. Protecting IoT devices and infrastructure against unauthorized physical access
and tampering is a crucial part of overall IoT security [7, 82].
Here are some ways physical security can be implemented in IoT [12, 81, 82]:
• Device placement: IoT devices should be placed in secure locations where they
are less likely to be accessed by unauthorized individuals. For example, devices
can be placed in locked rooms or cabinets, or secured to walls or floors.
• Access control: Access to Internet of Things devices must be controlled to only
authorized individuals. This is possible using physical keys, access cards, or
biometric authentication.
• Video surveillance: Video cameras can be used to monitor the physical environ-
ment where IoT devices are deployed. This can help to deter theft or vandalism
and provide evidence in case of a security incident.
Security
71 Challenges in IOT K. Igulu et 71
al.
Network Segmentation
Network segmentation can help prevent a compromised IoT device from spreading
malware or other threats to other devices on the same network. Network segmentation
in IoT involves dividing an IoT network into smaller, more secure subnetworks or
segments. This can help to improve security by limiting the scope or spread of a
potential security breach and reducing the attack surface of IoT devices and systems
[12, 36].
Here are some ways network segmentation can be used in IoT [16, 36, 37]:
• Device segmentation: IoT devices can be grouped into smaller subnetworks based
on device type, location, or function. This can assist in limiting the spread of
a potential security breach and lower the likelihood of unauthorized access to
sensitive data or essential systems.
• Application segmentation: IoT applications can be separated into smaller subnet-
works based on their function or sensitivity. This can help to protect critical
applications and data from unauthorized access or tampering.
• User segmentation: Users can be assigned to specific subnetworks based on their
role or access requirements. This can help to limit the exposure of sensitive data
or systems to unauthorized users.
• Data segmentation: IoT data can be separated into smaller subnetworks based
on its sensitivity or importance. This can help to protect critical data from
unauthorized access or tampering.
Overall, network segmentation in IoT can help to improve security by limiting
the scope of a potential security breach, reducing the attack surface of IoT devices
and systems, and providing more granular control over access to sensitive data or
critical systems. However, network segmentation can also increase complexity and
management overhead, so it should be implemented carefully and with consideration
of the overall security posture of the IoT network.
Security
72 Challenges in IOT K. Igulu et 72
al.
Data Anonymization
Behavioral Analytics
Behavioral analytics can help identify unusual behavior on IoT devices that may
indicate a security threat. It involves using data analytics techniques to monitor
and analyze the behavior of IoT devices and users. It helps to identify patterns
and anomalies in device behavior, which can indicate potential security threats or
performance issues [18, 21].
Here are some ways behavioral analytics can be used in IoT [4, 34, 45]:
• Anomaly detection: Behavioral analytics can be used to detect anomalies in
device behavior that may indicate a security breach or malfunction. By analyzing
Security
73 Challenges in IOT K. Igulu et 73
al.
In today’s digital age, it is of the utmost importance to ensure the security of orga-
nizational systems. With the proliferation of IoT devices, the threat of hacking and
malware assaults has grown. Organizations must take proactive steps to protect their
systems from such malicious activities. Strong security measures such as the use of
complex passwords, two-factor authentication, and access control measures must be
adopted [39, 46, 64].
Moreover, it is essential to regularly update and patch the systems to address any
new vulnerabilities that may arise. The consequences of a security breach can be
disastrous, leading to data loss, financial loss, and reputational damage. Therefore,
organizations must make security a top priority and invest in the necessary resources
and technologies to safeguard their systems [1, 55, 61].
Given the evolving nature of cyber threats, it is crucial to stay vigilant and keep up
with the latest security trends. Organizations must conduct regular security audits to
identify potential weaknesses and take corrective measures. By adopting a proactive
security strategy, firms may reduce the likelihood of hacking and malware assaults,
thereby protecting the safety and confidentiality of their data [53].
Firms also need to do their part to make sure their users understand the secu-
rity dangers associated with the IoTs. This involves assessing security policies and
Security
74 Challenges in IOT K. Igulu et 74
al.
procedures on a regular basis and giving users the resources, they need to keep their
data safe. In addition, organizations should guarantee that their systems are routinely
tested and monitored for any problems [53].
Lastly, companies should ensure that their systems are routinely tested and moni-
tored for any problems. This includes the use of automated tools to detect and respond
to security incidents, as well as the implementation of regular security audits. Addi-
tionally, organizations should ensure that they have a comprehensive backup and
recovery plan in place to ensure that their data is safe in the event of a security breach
[53].
Given the potential security risks posed by the IoT revolution, it is essential that
organizations take steps to protect themselves. To protect data and ensure the secu-
rity of IoT devices, strict security measures must be implemented. Access control
techniques, encryption, and firewalls are all part of this effort to keep out intruders.
In addition, businesses must keep their systems patched and updated to close security
holes when they are discovered [51, 53].
Companies also need to do their part to make sure their customers understand
the security dangers associated with the Internet of Things. Giving users access to
security-related resources and conducting routine reviews of security policies and
procedures are both essential. Finally, businesses should make testing and monitoring
their systems a routine practice.
Conclusion
To provide a safe and secure environment, the IoT revolution brings numerous and
sophisticated security concerns that must be addressed. Organizations must take
proactive steps to protect their data and equipment. This involves implementing
robust security measures like strong passwords, two-factor authentication, and access
controls. Regularly updating and patching systems is also crucial to address emerging
vulnerabilities.
Furthermore, educating users about IoT security risks is essential. Providing users
with necessary tools and resources to protect their data and conducting regular
reviews of security policies and procedures are important steps. Continuous testing
and monitoring of systems are vital to identify and address potential issues. Auto-
mated tools can aid in detecting and responding to security incidents, while regular
security audits ensure ongoing evaluation.
Moreover, organizations should establish comprehensive backup and recovery
plans to ensure data safety in case of a security breach. By addressing these challenges