Cyber Risk in Internet of Things World

Internet of Things (IoT) is an emerging technology which has revolutionized the network in the global world. It is estimated that about 38.5 billion IoT devices will be connected by 2020. These devices are used in every part of life. Large number of data are collected by these IoT devices and transmitted from one device to another and from devices to enterprise systems. As large numbers of devices are connected with each other and to the world network and the number is increasing every day, there is a major risk of security threat, vulnerabilities, data manipulation, stealing, identity, device manipulation, and hacking. Due to the ease of automation and digitization, these devices bring with them numerous security issues. Poor security of these devices can provide an entry point for cyberattacks which may compromise sensitive data, threaten users’ privacy and weaponize the device. The IoT ecosystem needs proper security at device level, application level, and network level. Different vendors with diverse goals but inadequate cybersecurity expertise manufacture these devices. The purpose of this paper is to identify the current security and privacy issues in IoT devices and propose recommendations for the solution of Cyber security issues in IoT devices

[1]  Takahiro Hara,et al.  Dummy-Based User Location Anonymization Under Real-World Constraints , 2016, IEEE Access.

[2]  Kyungho Lee,et al.  Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective , 2019, Sensors.

[3]  Mohammad S. Jalali,et al.  The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products , 2019, IEEE Security & Privacy.

[4]  Xi Jin,et al.  Accelerating Eulerian Video magnification using FPGA , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[5]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[6]  Qinghua Li,et al.  Enhancing privacy through caching in location-based services , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[7]  Eleonora Borgia,et al.  The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..

[8]  Rahul Hans,et al.  Mobile Agents System Security , 2017, ACM Comput. Surv..

[9]  Andrea Zanella,et al.  IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices , 2019, IEEE Internet of Things Journal.

[10]  Mohammad S. Obaidat,et al.  Biometric Security and Internet of Things (IoT) , 2018, Biometric-Based Physical and Cybersecurity Systems.

[11]  Peter Burnap,et al.  Cyber Risk Management for the Internet of Things , 2019 .

[12]  Ali Ismail Awad,et al.  Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes , 2018, Sensors.

[13]  Jong Kim,et al.  Protecting location privacy using location semantics , 2011, KDD.