Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions

The Internet of Things (IoT) interconnects physical and virtual objects embedded with sensors, software, and other technologies, which exchange data using the Internet. This technology allows billions of devices and people to communicate, share data, and personalize services to make our lives easier...

Full description

Bibliographic Details
Main Authors: Esra Altulaihan, Mohammed Amin Almaiah, Ahmed Aljughaiman
Format: Article
Language:English
Published: MDPI AG 2022-10-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/11/20/3330
_version_ 1797473631809306624
author Esra Altulaihan
Mohammed Amin Almaiah
Ahmed Aljughaiman
author_facet Esra Altulaihan
Mohammed Amin Almaiah
Ahmed Aljughaiman
author_sort Esra Altulaihan
collection DOAJ
description The Internet of Things (IoT) interconnects physical and virtual objects embedded with sensors, software, and other technologies, which exchange data using the Internet. This technology allows billions of devices and people to communicate, share data, and personalize services to make our lives easier. Despite the multiple benefits offered by IoT, it may also represent a critical issue due its lack of information security. Since the number of IoT devices has been rapidly increasing all over the world, they have become a target for many attackers, who try to steal sensitive information and compromise people’s privacy. As part of the IoT environment, data and services should be protected with features such as confidentiality, accuracy, comprehensiveness, authentication, access control, availability, and privacy. Cybersecurity threats are unique to the Internet of Things, which has unique characteristics and limitations. In consideration of this, a variety of threats and attacks are being launched daily against IoT. Therefore, it is important to identify these types of threats and find solutions to mitigate their risks. Therefore, in this paper, we reviewed and identified the most common threats in the IoT environment, and we classified these threats based on three layers of IoT architecture. In addition, we discussed the most common countermeasures to control the IoT threats and mitigation techniques that can be used to mitigate these threats by reviewing the related publications, as well as analyzing the popular application-layer protocols employed in IoT environments and their security risks and challenges.
first_indexed 2024-03-09T20:19:52Z
format Article
id doaj.art-dbc0fffd6a7447a79ab7fa05d5641034
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-09T20:19:52Z
publishDate 2022-10-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-dbc0fffd6a7447a79ab7fa05d56410342023-11-23T23:53:26ZengMDPI AGElectronics2079-92922022-10-011120333010.3390/electronics11203330Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research DirectionsEsra Altulaihan0Mohammed Amin Almaiah1Ahmed Aljughaiman2Department of Computer Networks and Communications, King Faisal University, Al-Ahsa 31982, Saudi ArabiaDepartment of Computer Networks and Communications, King Faisal University, Al-Ahsa 31982, Saudi ArabiaDepartment of Computer Networks and Communications, King Faisal University, Al-Ahsa 31982, Saudi ArabiaThe Internet of Things (IoT) interconnects physical and virtual objects embedded with sensors, software, and other technologies, which exchange data using the Internet. This technology allows billions of devices and people to communicate, share data, and personalize services to make our lives easier. Despite the multiple benefits offered by IoT, it may also represent a critical issue due its lack of information security. Since the number of IoT devices has been rapidly increasing all over the world, they have become a target for many attackers, who try to steal sensitive information and compromise people’s privacy. As part of the IoT environment, data and services should be protected with features such as confidentiality, accuracy, comprehensiveness, authentication, access control, availability, and privacy. Cybersecurity threats are unique to the Internet of Things, which has unique characteristics and limitations. In consideration of this, a variety of threats and attacks are being launched daily against IoT. Therefore, it is important to identify these types of threats and find solutions to mitigate their risks. Therefore, in this paper, we reviewed and identified the most common threats in the IoT environment, and we classified these threats based on three layers of IoT architecture. In addition, we discussed the most common countermeasures to control the IoT threats and mitigation techniques that can be used to mitigate these threats by reviewing the related publications, as well as analyzing the popular application-layer protocols employed in IoT environments and their security risks and challenges.https://www.mdpi.com/2079-9292/11/20/3330Internet of Things (IoT)cybersecurityattackvulnerabilitiesthreatcountermeasures
spellingShingle Esra Altulaihan
Mohammed Amin Almaiah
Ahmed Aljughaiman
Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
Electronics
Internet of Things (IoT)
cybersecurity
attack
vulnerabilities
threat
countermeasures
title Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
title_full Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
title_fullStr Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
title_full_unstemmed Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
title_short Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
title_sort cybersecurity threats countermeasures and mitigation techniques on the iot future research directions
topic Internet of Things (IoT)
cybersecurity
attack
vulnerabilities
threat
countermeasures
url https://www.mdpi.com/2079-9292/11/20/3330
work_keys_str_mv AT esraaltulaihan cybersecuritythreatscountermeasuresandmitigationtechniquesontheiotfutureresearchdirections
AT mohammedaminalmaiah cybersecuritythreatscountermeasuresandmitigationtechniquesontheiotfutureresearchdirections
AT ahmedaljughaiman cybersecuritythreatscountermeasuresandmitigationtechniquesontheiotfutureresearchdirections