A Comprehensive Survey of IoT Threats Assessment and Mitigation Strategies

Authors

  • Salman Mushtaq Qureshi Department of Risk Management, Sauid Credit Bureau, Riyadh, Saudi Arabia.
  • Syed Muhammad Sajjad Department of Cyber Security, Air University, Kharian, Pakistan.
  • Faisal Fiaz Department of Cyber Security, Air University, Kharian, Pakistan.
  • Komal Batool Faculty of Computing, Riphah University, Islamabad, Pakistan.
  • Muhammad Kaleem Department of IT , Faculty of Computing & IT , University of Sargodha, Pakistan.
  • Sayyid Kamran Hussain Department of Computer Science, Faculty of Science and Technology, TIMES Institute, Multan, Pakistan.
  • Sadaqat Ali Ramay Department of Computer Science, Faculty of Science and Technology, TIMES Institute, Multan, Pakistan.

Keywords:

IoT Security, Internet of Things, Security Threats, Mitigation Strategies, Autonomous Devices, Connected Devices, Cybersecurity, Vulnerabilities

Abstract

As the quantity of gadgets linked to the internet rises, cybersecurity has emerged to be an essential topic especially with the emergence of the IoT. It is crucial to shield IoT systems from numerous threats to avoid possible vulnerabilities and preserve the users’ security. This survey aims at revealing the sphere of influence of the IoT which is a technique that makes it possible for messages to be sent across different physical items.. Used massively in industrial and social contexts, IoT improves ease of life while posing significant risks to security. As IoT devices feature an autonomous functionality and rather limited human intervention, they require smart and secure design. further more, through paper explains the security risks associated with IoT and gives relative attention about different layers and need for effective solution. Through pointing out the issues of portability, resource limitation, and open environments, this work is intended to help researchers and manufacturers strengthen the IoT devices against possible attacks and contribute to the proper, secure, and productive IoT development.

 

Downloads

Published

2024-09-30

How to Cite

Salman Mushtaq Qureshi, Syed Muhammad Sajjad, Faisal Fiaz, Komal Batool, Muhammad Kaleem, Sayyid Kamran Hussain, & Sadaqat Ali Ramay. (2024). A Comprehensive Survey of IoT Threats Assessment and Mitigation Strategies. Journal of Computing & Biomedical Informatics. Retrieved from https://jcbi.org/index.php/Main/article/view/656

Issue

Section

Articles