Security Challenges and Attacks in IoT: A Survey

Authors

  • Qurra tul Aain Department of Information Technology, Lahore Garrison University, Lahore, 54000, Pakistan.
  • Irshad Ahmed Sumra Department of Computer Science, Lahore Garrison University, Lahore, 54000, Pakistan.
  • Mariam Khan Department of Information Technology, Lahore Garrison University, Lahore, 54000, Pakistan.

Keywords:

Internet of Things, IoT Devices, Security, Communication Protocols, Security Challenges

Abstract

A network of interconnected devices with the ability to gather, analyze, and exchange data is known as the Internet of Things, or IoT. This technology has various benefits, including simplicity of use, efficiency, and automation. Additionally, there's a serious security concern. One of the challenges is the variety of IoT devices with various hardware, software, and communication protocols. Among the many advantages of this technology are its ease of use, automation, and efficiency. It does, however, also come with a number of very real security risks. The vast array of IoT devices with different operating systems, hardware, and communication protocols, as well as the intricate and large-scale IoT networks with several domains, levels and stakeholders, are some of these issues. Moreover, it commonly occurs that some features are absent from IoT devices. The younger generation is growing more and more interested in blockchain technology since it is specifically tailored to the information age. In this survey paper, it will discuss in detail the security challenges and possible solution to secure the Internet of Things (IoT). The Secure IoT give benefits to end users through its applications in different fields. Significant advancements in distributed systems have resulted from the development of IoT technology across several sectors.

Downloads

Published

2025-01-24

How to Cite

Qurra tul Aain, Irshad Ahmed Sumra, & Mariam Khan. (2025). Security Challenges and Attacks in IoT: A Survey. Journal of Computing & Biomedical Informatics, 8(01). Retrieved from https://jcbi.org/index.php/Main/article/view/788