Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
The Internet of Things (IoT) interconnects physical and virtual objects embedded with sensors, software, and other technologies, which exchange data using the Internet. This technology allows billions of devices and people to communicate, share data, and personalize services to make our lives easier...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-10-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/11/20/3330 |
_version_ | 1797473631809306624 |
---|---|
author | Esra Altulaihan Mohammed Amin Almaiah Ahmed Aljughaiman |
author_facet | Esra Altulaihan Mohammed Amin Almaiah Ahmed Aljughaiman |
author_sort | Esra Altulaihan |
collection | DOAJ |
description | The Internet of Things (IoT) interconnects physical and virtual objects embedded with sensors, software, and other technologies, which exchange data using the Internet. This technology allows billions of devices and people to communicate, share data, and personalize services to make our lives easier. Despite the multiple benefits offered by IoT, it may also represent a critical issue due its lack of information security. Since the number of IoT devices has been rapidly increasing all over the world, they have become a target for many attackers, who try to steal sensitive information and compromise people’s privacy. As part of the IoT environment, data and services should be protected with features such as confidentiality, accuracy, comprehensiveness, authentication, access control, availability, and privacy. Cybersecurity threats are unique to the Internet of Things, which has unique characteristics and limitations. In consideration of this, a variety of threats and attacks are being launched daily against IoT. Therefore, it is important to identify these types of threats and find solutions to mitigate their risks. Therefore, in this paper, we reviewed and identified the most common threats in the IoT environment, and we classified these threats based on three layers of IoT architecture. In addition, we discussed the most common countermeasures to control the IoT threats and mitigation techniques that can be used to mitigate these threats by reviewing the related publications, as well as analyzing the popular application-layer protocols employed in IoT environments and their security risks and challenges. |
first_indexed | 2024-03-09T20:19:52Z |
format | Article |
id | doaj.art-dbc0fffd6a7447a79ab7fa05d5641034 |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-09T20:19:52Z |
publishDate | 2022-10-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-dbc0fffd6a7447a79ab7fa05d56410342023-11-23T23:53:26ZengMDPI AGElectronics2079-92922022-10-011120333010.3390/electronics11203330Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research DirectionsEsra Altulaihan0Mohammed Amin Almaiah1Ahmed Aljughaiman2Department of Computer Networks and Communications, King Faisal University, Al-Ahsa 31982, Saudi ArabiaDepartment of Computer Networks and Communications, King Faisal University, Al-Ahsa 31982, Saudi ArabiaDepartment of Computer Networks and Communications, King Faisal University, Al-Ahsa 31982, Saudi ArabiaThe Internet of Things (IoT) interconnects physical and virtual objects embedded with sensors, software, and other technologies, which exchange data using the Internet. This technology allows billions of devices and people to communicate, share data, and personalize services to make our lives easier. Despite the multiple benefits offered by IoT, it may also represent a critical issue due its lack of information security. Since the number of IoT devices has been rapidly increasing all over the world, they have become a target for many attackers, who try to steal sensitive information and compromise people’s privacy. As part of the IoT environment, data and services should be protected with features such as confidentiality, accuracy, comprehensiveness, authentication, access control, availability, and privacy. Cybersecurity threats are unique to the Internet of Things, which has unique characteristics and limitations. In consideration of this, a variety of threats and attacks are being launched daily against IoT. Therefore, it is important to identify these types of threats and find solutions to mitigate their risks. Therefore, in this paper, we reviewed and identified the most common threats in the IoT environment, and we classified these threats based on three layers of IoT architecture. In addition, we discussed the most common countermeasures to control the IoT threats and mitigation techniques that can be used to mitigate these threats by reviewing the related publications, as well as analyzing the popular application-layer protocols employed in IoT environments and their security risks and challenges.https://www.mdpi.com/2079-9292/11/20/3330Internet of Things (IoT)cybersecurityattackvulnerabilitiesthreatcountermeasures |
spellingShingle | Esra Altulaihan Mohammed Amin Almaiah Ahmed Aljughaiman Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions Electronics Internet of Things (IoT) cybersecurity attack vulnerabilities threat countermeasures |
title | Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions |
title_full | Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions |
title_fullStr | Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions |
title_full_unstemmed | Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions |
title_short | Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions |
title_sort | cybersecurity threats countermeasures and mitigation techniques on the iot future research directions |
topic | Internet of Things (IoT) cybersecurity attack vulnerabilities threat countermeasures |
url | https://www.mdpi.com/2079-9292/11/20/3330 |
work_keys_str_mv | AT esraaltulaihan cybersecuritythreatscountermeasuresandmitigationtechniquesontheiotfutureresearchdirections AT mohammedaminalmaiah cybersecuritythreatscountermeasuresandmitigationtechniquesontheiotfutureresearchdirections AT ahmedaljughaiman cybersecuritythreatscountermeasuresandmitigationtechniquesontheiotfutureresearchdirections |