Unseen Dangers: The Hidden Vulnerabilities of IoTDevices
Description
IoT devices have also gained acceptance in healthcare, industrial automation, smart homes, and the transport sector. However, intense IoT device networks havementioned several vulnerabilities of the type that the adversary can attack. This review paper's thematic focus is knowing the extent of vulnerability attacks onIoT devices and the main observed weaknesses. These are non-strap authentication, low-level security communication, unpatched devices, and interactionwithsmart devices. These openings allow an attacker to execute DoS, MITM and RCE attacks, which lead to device compromise, user privacy infringement, andnetwork security threats. In this paper, we provide a detailed analysis of several recent IoT cyber threats as examples of the dangers associatedwithvulnerabilities in systems security. Additionally, in the present paper, new threats in the IoT environment are studied, and the existing approaches totheir mitigation are discussed. The sustainability of security-by-design ideas is kept alive by elements like point positing containing features like cryptography, biometrics, structure modification, and inspection. In the last section of the review, the conclusion then captures the analysis of the concern to developthepolicies and security frameworks for IoT technology and the interaction between the manufacturers and developers as well as security engineers to foster thefuture of IoT technology.
Files
Unseen Dangers The Hidden Vulnerabilities of IoTDevices.pdf
Files
(382.8 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:b5aa6b8457bfdcbdc9f03629aa197b3e
|
382.8 kB | Preview Download |
Additional details
Additional titles
- Alternative title
- The Hidden Vulnerabilities of IoTDevices
References
- IEEE