0% found this document useful (0 votes)
27 views30 pages

Narayan Edit

Uploaded by

youngthugsclan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views30 pages

Narayan Edit

Uploaded by

youngthugsclan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 30

EXPLORING SECURITY VULNERABILITIES AND

MITIGATION STRATEGIES IN INTERNET OF


THINGS (IOT) DEVICES

1
Abishek Niroula, 2Anjana Gurung, 3Galgen Lepcha,
4
Narayan Dahal, 5Pravesh Rai, 6Dhiraj Jaiswal
Student, 6Assistant Professor,
School of Information Technology,
The ICFAI University Sikkim, India
Email: [email protected], [email protected],
3
[email protected], [email protected],
5
[email protected], [email protected]

Abstract
In the rapidly expanding realm of the Internet of Things (IoT), the convergence of
revolutionary potential and significant security challenges necessitates innovative solutions.
This paper presents a detailed investigation into leveraging blockchain technology and a
software-defined approach (SD-IoT) to fortify IoT ecosystems against cyber threats. The
proposal introduces the Blockchain-IoT Sensor (BIoTS), a novel integration of blockchain
functionalities directly into IoT hardware to enhance security within IoT frameworks.
Employing components such as SHA-256 and Proof of Work (PoW), BIoTS ensure data
integrity and traceability. Implemented on FPGA Altera DE0-Nano, BIoTS enable IoT
devices to serve as miners in blockchain networks, thereby reinforcing security, particularly
in critical applications such as food traceability systems (FTS). Additionally, the paper
explores the software-defined approach (SD-IoT) to augment IoT security, offering methods
for detecting and preventing Distributed Denial-of-Service (DDoS) attacks in IoT
environments. Rigorous testing validates the efficacy of these strategies, especially pertinent
for the diverse and vulnerable landscape of IoT devices. Furthermore, the study delves into a
holistic understanding of IoT security challenges, from protocol vulnerabilities to user
education and legal hurdles. It identifies deficiencies in major IoT protocols such as BLE,
Zigbee, and 6LoWPAN and proposes remedies. The paper underscores the importance of
interdisciplinary collaboration, user education, and policy frameworks in mitigating IoT
security risks.
Technical measures encompass robust encryption, authentication mechanisms,
software/firmware updates, and intrusion detection systems tailored to IoT environments.
Policy and regulatory strategies involve compliance with industry standards/regulations and
formulating legal frameworks for IoT security. User education initiatives focus on training
programs and the promotion of secure IoT practices. Challenges and future directions
highlight the imperative for adaptable security approaches, dynamic threat modeling, privacy-
preserving technologies, standardization, certification, and exploration of blockchain
integration. The paper concludes with a comprehensive plan to counter cybersecurity risks in
IoT devices, advocating for the adoption of NIST-style guidelines and further research into
blockchain-based security solutions.

Keywords: Internet of Things (IoT), Food traceability systems (FTS), Blockchain-IoT


Sensor (BIoTS), FPGA Altera DE0-Nano, Proof of Work (PoW).

I. INTRODUCTION
The integration of the Internet of Things (IoT) into various facets of contemporary life marks
a paradigm shift in connectivity and innovation, permeating diverse sectors with
unprecedented levels of interconnectedness and functionality. From smart homes to industrial
automation, the proliferation of IoT devices has ushered in a new era of convenience and
efficiency. However, this rapid expansion has also unveiled significant security concerns that
must be addressed to ensure the integrity and safety of IoT ecosystems.

One of the foremost challenges facing the IoT landscape revolves around security
vulnerabilities inherent in interconnected devices. Notably, the swift growth of IoT devices
has intensified the risk of cyber threats, particularly in critical domains such as food
traceability systems (FTS), where data integrity is paramount. This necessitates innovative
solutions to fortify security at the fundamental hardware level.

Enter Blockchain-IoT Sensor (BIoTS), a pioneering approach aimed at enhancing security by


imbuing IoT devices with blockchain functionalities. By leveraging blockchain technology,
BIoTS seek to mitigate vulnerabilities and safeguard data integrity, particularly in contexts
critical to public safety and quality assurance, such as food safety.

Figure 1. Internet of Things (IoT) architecture on the consumer-level [1].

Moreover, comprehensive examinations of IoT procedures and user awareness are imperative
to address the intricate nexus of security challenges inherent in IoT ecosystems. From
uncovering vulnerabilities in popular IoT protocols to recommending robust mitigation
measures, a multi-faceted approach is essential to fortify IoT infrastructure and ensure user
privacy and safety.

The sheer diversity of IoT devices, coupled with their resource-constrained nature, presents a
complex landscape for implementing standardized security protocols. From insecure
communication channels to inadequate authentication mechanisms, the array of
vulnerabilities demands proactive measures encompassing both hardware and software
considerations.

To this end, secure boot mechanisms, encrypted communication protocols, and robust
authentication methods are integral components of a comprehensive security framework.
Regular software updates and intrusion detection systems further bolster defense mechanisms
against evolving cyber threats.
Figure 2. IoT architecture on the industry-level [1].

Furthermore, collaboration among stakeholders, including manufacturers, policymakers, and


cybersecurity experts, is imperative to establish industry standards and regulatory
frameworks that prioritize security without impeding innovation. By fostering a collaborative
ecosystem focused on proactive security measures, the IoT landscape can realize its
transformative potential while mitigating risks posed by malicious actors.

The integration of the Internet of Things (IoT) into various facets of contemporary life marks
a paradigm shift in connectivity and innovation, permeating diverse sectors with
unprecedented levels of interconnectedness and functionality. From smart homes to industrial
automation, the proliferation of IoT devices has ushered in a new era of convenience and
efficiency. However, this rapid expansion has also unveiled significant security concerns that
must be addressed to ensure the integrity and safety of IoT ecosystems. One of the foremost
challenges facing the IoT landscape revolves around security vulnerabilities inherent in
interconnected devices. Notably, the swift growth of IoT devices has intensified the risk of
cyber threats, particularly in critical domains such as food traceability systems (FTS), where
data integrity is paramount. This necessitates innovative solutions to fortify security at the
fundamental hardware level. Enter Blockchain-IoT Sensor (BIoTS), a pioneering approach
aimed at enhancing security by imbuing IoT devices with blockchain functionalities. By
leveraging blockchain technology, BIoTS seek to mitigate vulnerabilities and safeguard data
integrity, particularly in contexts critical to public safety and quality assurance, such as food
safety. Moreover, comprehensive examinations of IoT procedures and user awareness are
imperative to address the intricate nexus of security challenges inherent in IoT ecosystems.
From uncovering vulnerabilities in popular IoT protocols to recommending robust mitigation
measures, a multi-faceted approach is essential to fortify IoT infrastructure and ensure user
privacy and safety. The sheer diversity of IoT devices, coupled with their resource-
constrained nature, presents a complex landscape for implementing standardized security
protocols. From insecure communication channels to inadequate authentication mechanisms,
the array of vulnerabilities demands proactive measures encompassing both hardware and
software considerations. To this end, secure boot mechanisms, encrypted communication
protocols, and robust authentication methods are integral components of a comprehensive
security framework. Regular software updates and intrusion detection systems further bolster
defence mechanisms against evolving cyber threats. Furthermore, collaboration among
stakeholders, including manufacturers, policymakers, and cybersecurity experts, is imperative
to establish industry standards and regulatory frameworks that prioritize security without
impeding innovation. By fostering a collaborative ecosystem focused on proactive security
measures, the IoT landscape can realize its transformative potential while mitigating risks
posed by malicious actors. In essence, this paper delves into the intricate landscape of IoT
security, highlighting specific vulnerabilities and proposing comprehensive mitigation
strategies to foster a safer and more resilient IoT ecosystem. By addressing security concerns
proactively, we can harness the full potential of IoT technology while safeguarding against
emerging threats, thereby ensuring a future of interconnectedness and innovation built on a
foundation of trust and resilience. As the Internet of Things (IoT) continues to proliferate and
evolve, its integration into various domains of contemporary life has fundamentally
transformed the way we interact with technology. The interconnectedness of IoT devices has
ushered in a new era of convenience, efficiency, and automation, revolutionizing industries
ranging from healthcare to manufacturing. However, alongside the myriad benefits of this
interconnected ecosystem, there exists a pressing need to address the significant security
challenges that accompany it. Security vulnerabilities inherent in interconnected IoT devices
represent one of the foremost challenges facing the IoT landscape. The exponential growth of
IoT devices has expanded the attack surface for cyber threats, posing risks to critical systems
such as healthcare infrastructure and industrial control systems. These vulnerabilities
highlight the importance of implementing robust security measures to safeguard data integrity
and protect against malicious actors. One innovative approach to enhancing IoT security is
the integration of blockchain technology, leading to the emergence of Blockchain-IoT Sensor
(BIoTS) systems. By leveraging the decentralized and immutable nature of blockchain,
BIoTS aims to mitigate security vulnerabilities and ensure the integrity of data transmitted by
IoT devices. This approach has particular relevance in sectors such as food traceability,
where maintaining the integrity of supply chain data is crucial for ensuring food safety and
quality assurance. Furthermore, comprehensive assessments of IoT procedures and user
awareness are essential to address the complex nexus of security challenges inherent in IoT
ecosystems. Vulnerability assessments can help identify weaknesses in IoT protocols and
recommend robust mitigation strategies to fortify infrastructure against potential threats.
Additionally, raising awareness among users about the importance of cybersecurity hygiene
can help mitigate risks associated with human error and social engineering attacks. The
diversity of IoT devices, coupled with their resource-constrained nature, poses unique
challenges for implementing standardized security protocols. Insecure communication
channels, inadequate authentication mechanisms, and insufficient encryption protocols are
among the common vulnerabilities that must be addressed to bolster IoT security. Secure boot
mechanisms, encrypted communication protocols, and robust authentication methods are
integral components of a comprehensive security framework designed to protect IoT devices
from cyber threats. Regular software updates and intrusion detection systems are essential for
maintaining the security posture of IoT devices and detecting anomalous behaviour indicative
of potential security breaches. Collaboration among stakeholders, including manufacturers,
policymakers, and cybersecurity experts, is crucial for establishing industry standards and
regulatory frameworks that prioritize security while fostering innovation in the IoT
landscape. By fostering a collaborative ecosystem focused on proactive security measures,
the IoT industry can realize its transformative potential while mitigating risks posed by
malicious actors. In conclusion, this paper emphasizes the importance of addressing security
concerns proactively to harness the full potential of IoT technology while ensuring a future of
interconnectedness and innovation built on a foundation of trust and resilience.

The integration of the Internet of Things (IoT) into various aspects of modern life represents
a significant change in how things are connected and innovated. It spreads across different
areas, bringing high levels of connectivity and functionality. From smart homes to industrial
automation, the widespread use of IoT devices has brought about a new level of convenience
and effectiveness. However, this rapid growth also reveals serious security issues that need
attention to protect the integrity and safety of IoT systems.

One of the main challenges facing the IoT is the security vulnerabilities in interconnected
devices. The fast expansion of IoT devices has increased the risk of cyber threats, especially
in critical areas like food traceability systems, where the accuracy of data is crucial. This
requires new solutions to strengthen security starting from the basic hardware level.

Enter Blockchain-IoT Sensor (BIoTS), an innovative method aimed at improving security by


adding blockchain features to IoT devices. By using blockchain, BIoTS aims to reduce
vulnerabilities and ensure data integrity, particularly in areas vital for public safety and
quality control, such as food safety.

Additionally, it's essential to thoroughly examine IoT procedures and raise user awareness to
tackle the complex security challenges inherent in IoT systems. This involves finding
vulnerabilities in popular IoT protocols and suggesting strong security measures to protect
infrastructure and user privacy and safety.

The wide variety of IoT devices, along with their limited resources, makes it difficult to
implement standardized security protocols. From insecure communication channels to weak
authentication methods, various vulnerabilities require proactive measures covering both
hardware and software aspects.

Therefore, secure boot mechanisms, encrypted communication protocols, and robust


authentication methods are crucial parts of a comprehensive security plan. Regular software
updates and intrusion detection systems further enhance defence mechanisms against
evolving cyber threats.

Moreover, cooperation among stakeholders, including manufacturers, policymakers, and


cybersecurity experts, is essential to set industry standards and regulations that prioritize
security while encouraging innovation. By creating a collaborative environment focused on
proactive security measures, the IoT industry can realize its potential while reducing risks
from malicious activities.
Figure 3. IoT security Testbed system components [3].

In essence, this paper delves into the intricate landscape of IoT security, highlighting specific
vulnerabilities and proposing comprehensive mitigation strategies to foster a safer and more
resilient IoT ecosystem. By addressing security concerns proactively, we can harness the full
potential of IoT technology while safeguarding against emerging threats, thereby ensuring a
future of interconnectedness and innovation built on a foundation of trust and resilience.

II. REVIEW OF LITERATURE


[1] The use of Internet of Things (IoT) devices has brought many security risks alongside
convenience. This article provides a bold overview of the current state of IoT security issues
and their potential impact on user privacy and safety. It explores existing research on how
vulnerabilities are identified, addressed, and managed, highlighting both successes and areas
that need urgent improvement in this domain. By conducting a comprehensive assessment,
the article pinpoints the challenges and opportunities for enhancing IoT security.
Furthermore, it proposes a firm shift in focus towards securing individual IoT devices and
refining the categorization of security measures.

[2] The widespread adoption of Internet of Things (IoT) devices has led to a surge in cyber
threats targeting IoT networks. As these devices become integral parts of daily life across
various sectors such as education, healthcare, and business, it's imperative to prioritize robust
cybersecurity measures. Safeguarding sensitive data and ensuring the security of IoT systems
are paramount in light of the increasing frequency and sophistication of attacks.
Comprehensive security measures are essential to protect both physical devices and
intangible assets like services and data. Addressing IoT security challenges is crucial for
maximizing the benefits of IoT technology while effectively mitigating evolving cyber risks.

[3] The Internet of Things (IoT) connects diverse devices to the internet for data exchange,
yet faces significant security challenges due to device diversity. A novel solution involves a
comprehensive security testing framework tailored for IoT devices. This framework,
employing standard and advanced techniques including machine learning, effectively
identifies vulnerabilities and compromised devices. Its adaptability accommodates various
IoT devices lacking standardized security protocols, offering a flexible architecture for
thorough testing. This initiative marks progress in addressing IoT security risks, ensuring
devices are safe for widespread adoption in business and academic domains.

[4] The Internet of Things (IoT) has revolutionized device connectivity, yet its increased
integration poses significant security challenges. Vulnerabilities exist in device systems,
wireless communication, and device software, leading to costly cyber-attacks, especially in
healthcare. With approximately 8.4 billion connected devices in 2017 across various
industries, IoT has become ubiquitous, enhancing productivity but also increasing cyber risks.
Cybercriminals exploit IoT weaknesses, targeting networks for financial gain or to
compromise operations. Despite security efforts, evolving threats make it difficult to ensure
IoT network security, particularly for mobile devices. Manufacturers must prioritize security
to prevent cyber-attacks from exploiting IoT vulnerabilities, especially in critical sectors like
healthcare where patient safety is at stake.

[5] The Internet of Things (IoT) has transformed our interaction with everyday objects
through internet connectivity, yet its widespread adoption faces significant security
challenges. This article explores the critical issue of IoT security, highlighting risks such as
unsafe software, data breaches, identity theft, and service disruption from cyber-attacks. To
address these risks, a robust security plan is essential, encompassing physical access control,
secure remote access, and data protection. The study analyzes past attacks and recommends
preventive measures, emphasizing preparedness and the use of intelligent programs to predict
and prevent potential issues. With the global number of IoT devices reaching 21 billion by
2020, urgent action is needed to address security concerns, underscored by major attacks like
Stuxnet and Mirai botnet. Key challenges include the autonomous nature of IoT devices,
susceptibility to wireless network attacks, and difficulty in securing devices with limited
resources.

[6] The growing utilization of Internet of Things (IoT) applications brings about heightened
security threats, necessitating effective risk reduction measures. Traditional security
evaluation methods, often reliant on expert assessments, prove insufficient. To address this, a
proposed automated system utilizes machine learning and natural language processing to
analyze vulnerability descriptions and predict their severity. This system employs a graphical
security model comprising attack graphs and trees, automating the assessment process by
identifying potential attack paths in IoT networks. Testing on a smart building system model
demonstrates over 90% accuracy in predicting vulnerability severity and identifying
vulnerable attack paths. These findings aid cybersecurity experts in promptly mitigating risks,
particularly in scenarios where vital vulnerability-related information may be absent, thus
addressing the challenge of automating security assessments at the network level.

[7] This paper talks about how healthcare IoT devices highly rely on smart sensing devices
and are becoming more vulnerable to cyber threats like data breaches and unauthorized
access. It explains the basics of healthcare IoT and the challenges it faces in terms of privacy
and security, especially with machine learning and smart sensors. The paper suggests keeping
a close eye on different layers of healthcare IoT and using advanced authentication methods
like machine learning to protect them. It also suggests ways to make healthcare IoT systems
more resilient against cyber threats. Additionally, it highlights general security challenges for
IoT devices and stresses the importance of addressing these issues early on. Overall, it aims
to help researchers understand the main problems in IoT security and how to deal with threats
from various sources.
[8] This paper discusses how the Internet of Things (IoT) is becoming a reality changing lives
and connecting everyday devices to exchange data and provide services. However, it also
faces security issues that could affect its growth and users' interests. The paper examines the
definition, protocols, architecture, and security of IoT, using a case study to demonstrate the
importance of security across all IoT layers. Additionally, it presents the results of a security
audit on an IoT platform and suggests solutions and future research directions to improve IoT
security. In the future, the paper aims to explore access control in IoT environments to
enhance security as well as solutions further.

[9] This paper inquiries into the Internet of Things (IoT), which connects physical objects
from different areas like home automation, industry, health, and environmental monitoring.
However, the sheer number of connected devices and the way they're interconnected pose
major security challenges. The research aims to tackle these issues by suggesting ways to
improve cybersecurity. It points out that manufacturers and service providers haven't put
enough effort into securing IoT devices, leading to security breaches. The paper also looks at
various types of attacks on IoT systems and suggests a plan to make IoT deployments more
secure, involving everyone concerned.

[10] This paper highlights the increasing importance of security in IoT applications,
particularly after recent DDoS attacks exploiting IoT vulnerabilities. It presents a Software-
Defined IoT (SD-IoT) framework for secure device management, featuring controllers,
switches, gateways, and devices. An algorithm for detecting and mitigating DDoS attacks
using cosine similarity analysis is proposed, showing promising results in enhancing IoT
security. The paper also addresses broader IoT security challenges such as confidentiality,
privacy, and trust, stressing the need for collaborative efforts to develop better security
mechanisms and standards. It aims to provide insights for researchers into major IoT security
issues and threats posed by intruders.
[11] Blockchain technology offers a transformative solution for enhancing security in IoT
environments by safeguarding sensor data, authenticating devices, and enabling secure data
transmission. Its decentralized nature eliminates single points of failure, improving reliability
and reducing costs. Blockchain enables direct device addressability, scalability, and
transparent ownership tracking, while its immutable ledger enhances device management,
fosters accountability, and fortifies data integrity against unauthorized access. Embracing
Blockchain in IoT deployments represents a strategic investment in future-proofing against
cybersecurity threats, ensuring trust, efficiency, and long-term viability in interconnected
systems.

[12] As the Internet of Things (IoT) expands, ensuring the security of connected devices
becomes crucial. This paper addresses key challenges and solutions for securing IoT devices,
examining various communication protocols like LoRaWAN and 6LoWPAN and
highlighting their vulnerabilities. For instance, LoRaWAN's encryption key can be easily
compromised, and 6LoWPAN requires better user authentication. Additionally, BLE and
Zigbee face security issues, such as easily broken BLE connections. Securing these devices is
essential to safeguard people and their belongings from potential harm.

[13] The rapid growth of Internet of Things (IoT) devices brings promising benefits but also
significant security challenges due to limited resources and weak security measures. This
survey highlights the urgent need to address IoT security vulnerabilities through Internet-
scale solutions and tailored measures. It emphasizes research directions such as identifying
and mitigating IoT-specific attacks, integrating security into firmware development, and
enhancing detection and response strategies against malicious IoT activity.

[14] IoT software platforms facilitate data and service exchange among networked devices,
requiring robust security measures. These include ensuring data integrity, secure storage,
device identification, and user authorization. Platforms can be closed-source, integrating IoT
and cloud computing, or open-source, allowing code customization. Emerging security
solutions involve AI and ML for threat detection and Blockchain for data encryption and
secure updates. Customized security measures like encryption and authentication protocols
address specific threats faced by various IoT devices. Hardware security solutions, especially
lightweight cryptographic implementations, offer superior performance and security
compared to software-based approaches, crucial for resource-constrained IoT devices.

[15] The paper delves into the pervasive presence of IoT in society, highlighting its
susceptibility to malicious actors due to a vast attack surface and lack of standardized
protocols. It provides an introductory overview of IoT, discussing layer models, topologies,
and protocols, while emphasizing the significant security challenges posed by resource
constraints and the absence of standards. The paper outlines various IoT vulnerabilities and
proposes specific countermeasures, including the use of protocols like DTLS and
IPSec/IKEv2, secure routing protocols like SIGF, object-based security for application data,
and IoT-specific intrusion detection systems such as SVELTE. It underscores the pressing
need for standardized protocols, channel-based security solutions, and enhanced legislative
directives to ensure high-security standards in IoT deployments, given the exponential growth
of IoT devices and their critical role in diverse domains.

[16] The research paper delves into the intricate realm of IoT device security, unraveling
multifaceted risks and proposing nuanced mitigation strategies. Through a comprehensive
literature review, it identifies common security threads and assesses the current state of IoT
security measures. Key security risks such as unauthorized access, encryption lapses,
authentication weaknesses, physical vulnerabilities, and privacy concerns are analyzed.
Mitigation strategies encompass technical measures, policy frameworks, and user education,
aiming for a holistic approach. The paper concludes by outlining recommendations for future
research, stressing interdisciplinary collaboration, dynamic threat modeling, privacy-
preserving technologies, standardization, certification, and blockchain integration.
Emphasizing the pivotal roles of manufacturers, policymakers, and users, the research
envisions a secure and connected future, shaping a resilient IoT landscape.

[17] The analysis explores vulnerabilities associated with UPnP-enabled IoT devices,
focusing on the Universal Plug and Play (UPnP) protocol and its implementation. It likely
examines security risks, potential attack vectors, and strategies for mitigation in UPnP-
enabled IoT deployments. Additionally, the study may discuss unspecified vulnerabilities in
cybersecurity, identifying weaknesses and proposing mitigation strategies. Another
exploration may focus on cybersecurity risks in automotive systems, identifying weaknesses
in network architecture, protocols, software, and hardware infrastructure. It aims to provide
insights into potential threats and suggest measures to enhance security in automotive
systems.

[18] The study provides an overview of previous surveys on IoT threats, attacks, and
countermeasures, addressing classification approaches and highlighting existing studies'
limitations. It poses questions regarding securing IoT devices in new environments and
protecting them from compromised devices. Proposed security measures focus on the device
life cycle, emphasizing a comprehensive approach from network entry to decommissioning.
Hardware-based approaches for defending against physical and cyber threats are discussed,
including Hardware Trojans detection, Design for Trust (DFT), split manufacturing, and
others. Additionally, mitigation techniques against side-channel and fault injection attacks,
along with hardware-assisted malware detection, are explored. While offering significant
benefits, hardware protection may entail increased costs and overhead, suitable for
applications where these factors are justified.

[19] The discussion delves into various facets of the Internet of Things (IoT) and its security
considerations. IoT encompasses layer models, topologies, and protocols. Layer models
include variations like the three-layer model and Cisco's seven-layer model, organizing
functions differently. Topologies can be point-to-point, star, or mesh, with mesh being
favored for its decentralization. Protocols like 6LoWPAN, CoAP, and MQTT are prominent
in IoT, but fragmentation poses challenges. Security in IoT involves vulnerabilities and
attacks such as sinkhole, Sybil, and conventional network attacks like eavesdropping and
DoS. RFID-specific attacks exploit weaknesses in IoT RFID protocols. Mitigations involve
employing secure protocols, intrusion detection systems, and legislative measures to enforce
security standards. Future research should focus on lightweight cryptography, improved
intrusion detection, and addressing device mobility issues to bolster IoT security against
evolving threats.

[20] The research on IoT security underscores the need for a comprehensive classification
of security challenges across all layers of IoT systems. It introduces a unique classification
of security attacks into Physical, Network, Software, and Encryption attacks, providing
detailed examples within each class. Future directions for IoT security include advocating
for multi-layered security approaches and emphasizing risk assessment, physical security,
and trust management. The paper also calls for research into new encryption and
authentication mechanisms suitable for low-power IoT devices, alongside the development
of standardized security protocols for various IoT applications like eHealth.

[21] Exploring security vulnerabilities in Internet of Things (IoT) devices reveals


significant risks due to their interconnected nature, including unauthorized access and
privacy violations. Effective mitigation strategies are crucial, encompassing robust
authentication, encryption, secure firmware updates, and continuous network monitoring.
Cultivating security awareness among users and manufacturers is also vital. By proactively
identifying vulnerabilities and implementing robust measures, IoT device security can be
significantly enhanced, ensuring safe operation in our increasingly digitized world.

[22] The Internet of Things, or IoT, enables a wide range of devices to communicate with
one another and cooperate to improve our services. While some gadgets are more intelligent
than others, some aren't. Modern technology even assists in delivering improved services.
But a lot of Internet of Things devices are low-power/energy consumers. There will be
more than 75 billion internet-connected gadgets by 2025. We are forced to switch from
IPv4 to IPv6 due to their sheer number. Sensors gather a lot of data, but some devices can't
process it all, so they have to pass the data to larger devices that have the capacity. The
larger devices can then determine what to do with the data. IPv6 is a unique system that
operates via low-power wireless.

[23] The rapid growth of wearable technology has brought convenience but also raised
security concerns due to potential vulnerabilities. To address this, Integrated Circuit Metric
(ICMetric) technology is proposed to enhance security by creating unique identifiers using
device characteristics, particularly accelerometer and gyroscope sensors. The paper
explores generating group identifiers for authentication, confidentiality, and secure access
in group environments. Experimental findings demonstrate high security levels without
resource overuse. With the expanding Internet of Things (IoT) ecosystem, securing
wearable technology is crucial for protecting data privacy and user well-being.
[24] The Internet of Things (IoT) allows electronic devices to communicate and interact
with each other without human intervention, revolutionizing various aspects of our lives. By
2020, it's estimated that there will be over 50 billion uniquely identifiable IoT devices.
However, this interconnected network poses new security, privacy, and trust threats,
requiring urgent attention. This paper focuses on defining security goals for IoT and
classifying the most important attacks on IoT systems into four types: physical, network,
software, and encryption attacks. It also proposes guidelines for future security measures to
mitigate these challenges. The IoT encompasses various applications, including consumer
services, smart homes, smart energy, smartphones, connected cars, wearable devices, and
wireless sensor networks for environmental monitoring, health care, and industrial
applications.

[25] This paper explores the growth of the Internet of Things (IoT) and the associated
challenges, particularly regarding security and privacy. It highlights the increasing threats to
security and privacy as IoT devices become more widespread and aims to summarize
existing research on IoT security threats and countermeasures. The paper begins by
presenting a comprehensive reference model for IoT and discusses information, assurance,
and security requirements. It then addresses threats in the edge-side layer of the reference
model and reviews proposed countermeasures, while also introducing two emerging
security challenges. The main goal is to provide readers with insights into past attacks, their
mitigation, and ongoing threats, organized into sections covering the reference model, IoT
applications, security requirements, attacks, countermeasures, emerging challenges, and
future research directions..

III. COMPARISON TABLE


S. Author/Paper Name Outcome Parameter Algorithm Limitations
N Monitored Used
o.
1. Miao Yu1, Jianwei Assessment Research on Various Lack of
Zhuge, Ming Cao, of IoT IoT security methods for comprehensi
Zhiwei Shi and Lin security vulnerabiliti vulnerability ve solutions
Jiang./A Survey of vulnerabilitie es, their analysis and for IoT
Security Vulnerability s and impact, and risk security,
Analysis, Discovery, proposals for potential assessment. potential
Detection, and improvement solutions. gaps in
Mitigation on IoT . vulnerability
Devices. detection
and
mitigation
strategies.
2. Mohamed Abomhara Strengthened Monitoring Advanced Challenges
and Geir M. Køien. cybersecurity of IoT threat in ensuring
/Cyber Security and defenses to networks detection compatibility
the Internet of Things: protect IoT and devices algorithms and
Vulnerabilities, ecosystems. for and machine scalability of
Threats, Intruders and suspicious learning security
Attack activities and techniques solutions
potential for anomaly across
cyber detection in diverse IoT
threats. IoT traffic. platforms
and devices.
3. Shachar Siboni, Vinay Improved Monitoring Machine Challenges
Sachidananda, security and of IoT learning may arise in
YairMeidan, Asaf privacy for devices for analysis ensuring
Shabtai, Michael IoT devices vulnerabiliti integrated compatibility
Bohadana, Yael through a es and into security and
Mathov, and Yuval comprehensi compromise testing effectiveness
Elovici./Security ve testing d states. techniques across
Testbed for Internet- framework. for diverse IoT
of-Things Devices identifying device types
vulnerabiliti and
es. protocols.
4. Jose Custodio Najar- Enhanced Monitoring Advanced Challenges
Pacheco, John security of IoT threat in
Alexander Bohada- measures to devices and detection maintaining
Jaime, Wilmar Yovany mitigate networks for algorithms security
Rojas-Moreno. cyber-attacks vulnerabiliti to identify across
/Vulnerabilities in the targeting IoT es and and respond diverse IoT
Internet of things. networks. suspicious to cyber devices and
activities. threats in protocols,
real time. especially in
healthcare
where the
stakes are
higher due to
potential
patient
safety risks.
5. Shamneesh Sharma, Enhanced Monitoring Intelligent Challenges
Manoj Manuja, IoT security for computer
in securing
Keshav Kishore. through vulnerabiliti programs
/Vulnerabilities, proactive es, for IoT devices
Attacks, and their measures and unauthorized predictive
with limited
Mitigation: An intelligent access, and analysis and
Implementation on predictive potential prevention resources
Internet of Things algorithms. cyber threats of cyber-
and
(IoT). targeting IoT attacks on
devices and IoT systems. susceptibility
networks.
to wireless
network
attacks are
compounded
by the
automatic
nature of IoT
devices.

6. Xuanyu Duan, Automated Monitoring Machine Dependency


Mengmeng Ge, Triet system for and analysis learning and on the
Huynh Minh Le, assessing of natural availability
Faheem Ullah, Shang security in vulnerability language and accuracy
Gao, Xuequan Lu, and IoT descriptions processing of
M. Ali Babar networks, to predict for severity vulnerability
/Automated Security enhancing severity and prediction, descriptions,
Assessment for the risk identify integrated potential
Internet of Things. mitigation. potential into a challenges in
attack paths. graphical handling
security diverse IoT
model network
comprising architectures
attack and
graphs and protocols.
trees.
7. Mirza Akhi Khatun, Strengthened Monitoring Machine Challenges
Ciarán Eising, Sanober security for of different learning for in
Farheen Memon, and healthcare layers of advanced implementin
Lubna Luxmi IoT devices healthcare authenticati g advanced
Dhirani/Machine through IoT systems on and security
Learning for advanced for potential protection measures
Healthcare-IoT authenticatio cyber of across
Security: A Review n methods threats, healthcare diverse
and Risk Mitigation. like machine including IoT devices. healthcare
learning. data IoT devices
breaches and and ensuring
unauthorized compatibility
access. with existing
systems.
8. Salim El Bouanani, Enhanced Monitoring Security Challenges
Omar Achbarou, My security in of IoT audit in
Ahmed Kiram, Aissam IoT protocols, algorithms implementin
Outchakoucht/Underst environments architecture, for g access
anding the Internet of through and platform identifying control
Things Security and its access security for vulnerabiliti across
Empirical control vulnerabiliti es in IoT diverse IoT
Vulnerabilities. measures. es and platforms, environment
potential potentially s and
breaches. incorporatin ensuring
g access compatibility
control with existing
algorithms systems, as
for future well as
improvemen addressing
ts. evolving
security
threats.
9. Sanjay Kumar Gupta Improved Monitoring Not Lack of
and Sandeep cybersecurity of IoT specified in specific
Vanjale/Cyber Security for IoT devices and the given details
Measures for Internet deployments networks for paper. regarding
of Things Devices. through security algorithms
enhanced breaches and used;
security vulnerabiliti challenges in
measures. es. ensuring
comprehensi
ve security
across
diverse IoT
devices and
networks.
10 Da Yin, Lianming Enhanced Monitoring Cosine Limited
. Zhang, and security for of IoT similarity- discussion
Kunyang/A DDoS IoT devices devices and based on broader
Attack Detection and through a network algorithm security
Mitigation with Software- traffic for for detecting challenges
Software-Defined Defined DDoS and beyond
Internet of Things Internet of attacks. mitigating DDoS
Framework. Things (SD- DDoS attacks;
IoT) attacks in challenges in
framework. SD-IoT implementin
networks. g SD-IoT
framework
across
diverse IoT
environment
s.
11 Hossein Pourrahmani Improved Monitoring Blockchain Challenges
. a,∗ , Adel Yavarinasab security and of sensor consensus in scalability
b , Amir Mahdi integrity in data, device algorithms and
Hosseini Monazzah IoT authenticatio for ensuring interoperabil
c,d , Jan Van herle environments n, and data data ity of
a/Security through transmission integrity and Blockchain
vulnerabilities and Blockchain for security authenticati solutions
countermeasures in the technology. and integrity. on within across
Internet of Things IoT diverse IoT
solutions. networks. devices and
ecosystems.
12 Kurdistan Ali & Enhanced Monitoring Not Lack of
. Shavan Askar/Security security for of IoT specified in specific
Issues and IoT devices device the given algorithms
Vulnerability of IoT to protect communicati paper. mentioned
Devices. users and on protocols for
belongings. (e.g., addressing
LoRaWAN, security
6LoWPAN, vulnerabilitie
BLE, s; challenges
Zigbee) for in ensuring
vulnerabiliti robust
es and security
weaknesses. across
diverse IoT
communicati
on protocols.
13 Nataliia Neshenko, Improved Monitoring Not Lack of
. Elias Bou-Harb, Jorge IoT security for specified in specific
Crichigno, Georges through vulnerabiliti the given algorithms
Kaddoum and Nasir tailored es in IoT paper. mentioned
Ghani/Demystifying security devices, for
IoT Security: An measures and focusing on addressing
Exhaustive Survey on Internet-scale weaknesses security
IoT Vulnerabilities and solutions. such as open vulnerabilitie
a First Empirical Look ports and s; challenges
on Internet-scale IoT inadequate in
Exploitations. access implementin
controls. g Internet-
scale
solutions
across
diverse IoT
ecosystems.
14 Phillip Williams a,* , Enhanced Monitoring Artificial Challenges
. Indira Kaylan Dutta b , security for for security Intelligence in
Hisham Daoud a,c , IoT software threats and implementin
Magdy Bayoumi/A platforms including Machine g hardware
survey on security in through data Learning for security
the Internet of Things measures like breaches, threat solutions for
with a focus on the data integrity, unauthorized detection, resource-
impact of emerging secure access, and and constrained
technologies. storage, and device Blockchain IoT devices,
device compromise. for data and ensuring
authenticatio encryption compatibility
n. and secure across
firmware diverse IoT
updates. platforms
and devices.
15 Stuart Millar, Rapid7 Improved Monitoring Various Challenges
. LLC /IoT Security security for IoT security in
Challenges and standards for vulnerabiliti protocols implementin
Mitigations. IoT es and including g
deployments malicious DTLS, standardized
through the activities, IPSec/IKEv protocols
adoption of focusing on 2, SIGF, and across
standardized resource SVELTE for diverse IoT
protocols and constraints secure ecosystems
enhanced and the communicat and ensuring
legislative absence of ion, routing, compatibility
directives. standards. and with existing
intrusion infrastructur
detection in e, as well as
IoT potential
networks. limitations in
resource-
constrained
IoT devices.
16 Uzoamaka Enhanced Monitoring Not Lack of
. Iwuanyanwua , security for for specified in specific
Olajumoke Omotola IoT devices unauthorized the given algorithms
Oyewoleb, Ololade through access, paper. mentioned
Gilbert Fakeyedec*, holistic encryption for
Evelyn Chinedu mitigation lapses, addressing
Okeleked, Apeh strategies. authenticatio security
Jonathan Apehe/IoT n vulnerabilitie
Device Security Risks weaknesses, s; challenges
A Comprehensive physical in
Overview And vulnerabiliti implementin
Mitigation Strategies. es, and g
privacy interdisciplin
breaches. ary
collaboration
and
standardizati
on across
diverse IoT
ecosystems.
17 Golam Improved Monitoring Not Lack of
. Kayas/Exploring security for for specified in specific
Vulnerability and UPnP- vulnerabiliti the given algorithms
Security Schemes Of enabled IoT es in UPnP paper. mentioned
Service-Oriented devices implementati for
Internet Of Things through on within addressing
And Protocols. vulnerability IoT vulnerabilitie
mitigation environment s; potential
strategies. s. challenges in
implementin
g mitigation
strategies
across
diverse
UPnP-
enabled IoT
deployments
.
18 MARWA SALAYMA, Enhanced Monitoring Various Increased
. /Risk and Threat security for for physical hardware- costs and
Mitigation Techniques IoT devices and cyber based overhead
in the Internet of through threats to techniques associated
Things. hardware- IoT devices, including with
based focusing on Hardware hardware-
protection hardware- Trojans based
measures. level detection, protection
vulnerabiliti Design for measures,
es. Trust (DFT), potentially
split limiting their
manufacturi applicability
ng, Key in certain
Injection, IoT
Physically applications.
Unclonable
Functions
(PUF),
Hardware
Security
Modules
(HSM),
Remote
Attestation
(RA), and
mitigation
techniques
against side-
channel
attacks and
fault
injection
attacks.
19 Stuart Millar, Rapid7 Strengthened Monitoring Intrusion Challenges
. LLC/Internet of security for for detection in addressing
Things Security IoT networks vulnerabiliti systems for fragmentatio
Challenges and through the es and detecting n issues in
Mitigations: An adoption of attacks in and IoT
Introduction. secure IoT mitigating protocols,
protocols and networks, attacks in ensuring
legislative including IoT compatibility
measures. RFID- networks. across
specific diverse IoT
attacks. ecosystems,
and
managing
device
mobility
effectively.
20 Ioannis Andrea, Enhanced Monitoring Not Lack of
. Chrysostomos understandin for physical, specified in specific
Chrysostomou, George g and network, the given algorithms
Hadjichristofi/IoT: classification software, paper. mentioned
Security of IoT and for
Vulnerabilities and security encryption addressing
Challenges. challenges attacks security
for across all threats;
comprehensi layers of IoT potential
ve protection. systems. challenges in
implementin
g multi-
layered
security
approaches
across
diverse IoT
ecosystems.
21 Arsalan Mohsen Nia/A Enhanced Monitoring Not Lack of
. Comprehensive Study security for for specified in specific
of Security of Internet- IoT devices unauthorized the given algorithms
of-Things. through access, data paper. mentioned
effective breaches, for
mitigation and privacy addressing
strategies. violations in security
IoT vulnerabilitie
networks. s; potential
challenges in
implementin
g robust
mitigation
measures
across
diverse IoT
ecosystems.
22 Aryan Mohammadi Improved Monitoring Not Lack of
. Pasikhani, John A. communicati data specified in specific
Clark, Prosanta Gope , on and transmission the given algorithms
Senior Member, IEEE, cooperation and paper. mentioned
and Abdulmonem among IoT processing for
Alshahran/Intrusion devices to among IoT managing
Detection Systems in enhance devices, data
RPL-Based services. particularly transmission
6LoWPAN: A focusing on and
Systematic Literature low-power processing in
Review. devices. IoT
networks;
potential
challenges in
transitioning
from IPv4 to
IPv6 and
ensuring
compatibility
across
diverse IoT
devices and
networks.
23 HasanTahir, Enhanced Monitoring Integrated Lack of
. RuhmaTahir, Klaus security for and Circuit detailed
McDonald-Maier wearable generation of Metric discussion
(2018)/On the security technology unique (ICMetric) on specific
of consumer wearable through identifiers technology algorithms
devices in the Internet Integrated using for creating used in
of Things. Circuit acceleromete unique ICMetric
Metric r and identifiers technology;
(ICMetric) gyroscope and potential
technology. sensors for cryptographi challenges in
cryptographi c purposes. implementin
c purposes. g group
identifiers
for
authenticatio
n and secure
access in
wearable
devices.
24 Ismail Butun, Member, Enhanced Monitoring Not Lack of
. IEEE, Patrik security for physical, specified in specific
Osterberg, ¨ Member, measures for network, the given algorithms
IEEE, and Houbing IoT systems software, paper. mentioned
Song/Security of the to mitigate and for
Internet of Things: threats. encryption addressing
Vulnerabilities, attacks on security
Attacks and IoT systems. threats;
Countermeasures. potential
challenges in
implementin
g future
security
measures
across
diverse IoT
applications
and
ecosystems.
25 Ioannis Andrea, Improved Monitoring Not Lack of
. Chrysostomos understandin for security specified in specific
Chrysostomou, George g of IoT threats and the given algorithms
Hadjichristofi/Internet security countermeas paper. mentioned
of Things: Security threats and ures in IoT for
Vulnerabilities and countermeas systems. addressing
Challenges. ures. security
threats;
potential
challenges in
implementin
g
countermeas
ures across
diverse IoT
applications
and
ecosystems.

IV. RESEARCH GAP


Exploring security vulnerabilities in IoT devices entails identifying potential weaknesses that
could be exploited by hackers. Mitigation strategies involve implementing measures such as
regular software updates, strong authentication methods, and data encryption to minimize the
risk of unauthorized access and ensure the safety of connected devices. The following are the
research gaps based on the study:

1. Challenges in healthcare: IoT security encompass vulnerabilities, compatibility issues, and


resource limitations.

2. Literature Gap: Despite recognition of challenges, there's a lack of concrete strategies or


methodologies in existing literature.
3. Vague Discussions: Current discussions often lack specific proposals for
mitigating vulnerabilities, enhancing compatibility and scalability, and
implementing advanced security measures.

4. Need for Detailed Research: There is a pressing need for detailed research to offer practical
solutions tailored to the unique requirements of healthcare IoT environments.

5. Bridging the Gap: Detailed research is essential for bridging the gap between theoretical
understanding and actionable implementation in healthcare IoT security.

V. PROPOSED WORK
Title: Enhancing Security in the Internet of Things (IoT) Ecosystem: A Comprehensive
Approach

Introduction: The Internet of Things (IoT), which provides previously unavailable


connectivity and convenience, has completely changed how gadgets interact and
communicate. IoT technology has become widely used, but this has also brought forth serious
vulnerabilities that put user safety and privacy at risk. The purpose of this research study is to
analyze current threats, vulnerabilities, and mitigation strategies in order to address the
security issues that are present in the Internet of Things environment. Through the integration
of findings from several research projects, the study suggests a comprehensive strategy for
enhancing IoT security, combining both technological and policy-oriented remedies.

Proposed Work:

1. Perform a thorough examination of the literature to determine the state of the art regarding
IoT security risks, vulnerabilities, and solutions.
2. Determine the security issues that are common to many Internet of Things applications,
such as wearable technology, smart homes, healthcare, and industrial automation.
3. Study modern IoT security standards and technologies, like blockchain, artificial
intelligence, and hardware-based security measures.
4. Create a system for evaluating the performance of the IoT security measures in place and
pinpointing areas in need of enhancement.
5. Provide end users, service providers, and makers of IoT devices with thorough security
standards and best practices.
6. Use simulations and empirical research to assess the viability and effectiveness of
suggested security solutions in actual IoT scenarios.
7. Offer suggestions to cybersecurity experts, industry stakeholders, and legislators on how to
strengthen the IoT ecosystem's resilience.
Expected Results:
identifying the main security flaws and attack methods used in IoT installations across
various industries.
creation of an all-encompassing framework that includes organizational, legislative, and
technical controls to reduce IoT security threats.
validation of suggested security measures using simulations and empirical research, proving
how well they guard IoT networks and devices.
creation of practical suggestions that stakeholders may implement to improve IoT system
security and protect user privacy and safety.

Conclusion: In conclusion, this research paper aims to contribute to the ongoing efforts to
enhance security in the Internet of Things (IoT) ecosystem. By synthesizing insights from
existing literature and proposing innovative solutions, we seek to address the pressing
challenges posed by IoT security vulnerabilities. Through collaboration between researchers,
industry stakeholders, and policymakers, we can work towards building a more secure and
resilient IoT infrastructure, ensuring the continued growth and prosperity of the IoT
ecosystem.

VI. METHODOLOGY AND IMPLEMENTATION

VII. RESULT AND DISCUSSION


The amalgamation of diverse perspectives on IoT security vulnerabilities and
countermeasures yields valuable insights into the multifaceted nature of the challenge and the
potential avenues for mitigation. Across the summaries, several key themes emerge,
underscoring both the urgency of addressing IoT security concerns and the promise of
innovative solutions.
Firstly, blockchain technology emerges as a transformative solution for bolstering IoT
security. Its decentralized nature not only eliminates single points of failure but also ensures
the integrity and confidentiality of data transmission within IoT ecosystems. By providing
transparent ownership tracking and streamlining device management, blockchain offers a
strategic investment in fortifying IoT deployments against emerging cybersecurity threats.
Concurrently, the pervasive presence of IoT devices in society highlights their susceptibility
to malicious actors. Various communication protocols, including LoRaWAN, 6LoWPAN,
BLE, and Zigbee, exhibit vulnerabilities that could compromise the security of connected
devices. From easily decipherable encryption keys to weak user authentication mechanisms,
these weaknesses underscore the pressing need for comprehensive security measures to
protect individuals and their belongings.
Moreover, the rapid proliferation of IoT devices presents significant security challenges,
exacerbated by limited resources and inadequate security measures. Open ports and
insufficient access controls render IoT devices vulnerable to malicious attacks, posing risks
of device malfunction and abuse. Addressing these vulnerabilities requires Internet-scale
solutions and tailored security measures that integrate seamlessly into IoT ecosystems.
Furthermore, emerging technologies such as artificial intelligence, machine learning, and
lightweight cryptographic implementations hold promise for enhancing IoT security. AI and
ML algorithms enable proactive threat detection, while lightweight cryptographic
implementations offer superior performance and security for resource-constrained IoT
devices. Additionally, standardized protocols, channel-based security solutions, and
legislative directives are essential for ensuring high security standards in IoT deployments.
In light of these findings, it is evident that securing IoT environments requires a multifaceted
approach that leverages both technological innovations and regulatory frameworks. By
embracing blockchain technology, implementing robust security measures, and fostering
collaboration among stakeholders, it is possible to mitigate the security risks associated with
IoT deployments and ensure the trust, efficiency, and long-term viability of interconnected
systems.

VIII. CONCLUSION
The widespread use of Internet of Things (IoT) devices has drastically changed how things
connect and how convenient things are in different areas. But, as more and more of these
devices are being used, there are also more chances for security problems to happen. This
means we need to pay close attention to keeping them safe. Studies in this area always say it's
really important to deal with these security problems well. This is not just to keep people's
private information safe and make sure data is correct, but also to make sure everything runs
smoothly. They suggest we should focus more on making each device safe and improving the
ways we keep things secure from online threats. These studies also show that there are lots of
ways these IoT systems can be vulnerable, like problems with the software they run or
weaknesses in the wireless networks they use. They suggest new ideas, like using smart
computer programs to look for problems and better ways to organize the software, to help
solve these issues. What all this research is saying is that we need to work together to make
sure IoT systems are safe. This means everyone involved, like the people making the devices,
the companies providing services, researchers, and even the people using the devices, needs
to team up. If we focus on being proactive about security, setting strong rules, and
understanding new problems that come up, we can make IoT systems much safer for
everyone.

VIII. REFERENCES
[1] Yu M, Zhuge J, […] Jiang LFuture Internet (2020) 12(2)
[2] Abomhara M, Køien GJournal of Cyber Security and Mobility (2015) 4(1) 65-88
[3] Siboni S, Sachidananda V, […] Elovici YIEEE Transactions on Reliability (2019)
68(1) 23-44
[4] Electrónica V, Msc ;(2019) 13(2) 312-321
[5] Sharma S, Manuja M, Kishore KInternational Journal of Innovative Technology and
Exploring Engineering (2019) 8(10)…
[6] Duan X, Ge M, […] Babar M(2021)
[7] Tahir H, Tahir R, McDonald-Maier KPLoS ONE (2018) 13(4)
[8] Yin D, Zhang L, Yang KIEEE Access (2018) 6 24694-24705
[9] Gupta S, Vanjale S(2020) 1830-1839
[10] Abomhara M, Køien GJournal of Cyber Security and Mobility (2015) 4(1) 65-88
[11] Khatun M, Memon S, […] Dhirani LIEEE Access (2023) 11 145869-145896
[12] Bouanani S, Achbarou O, […] Outchakoucht A(2019)
[13] Neshenko N, Bou-Harb E, […] Ghani NIEEE Communications Surveys and Tutorials
(2019) 21(3) 2702-2733
[14] Millar S(2021)
[15] Salayma M(2023)
[16] Andrea I, Chrysostomou C, Hadjichristofi GProceedings - IEEE Symposium on
Computers and Communications (2016) 2016-February 180…
[17] Pasikhani A, Clark J, […] Alshahrani AIEEE Sensors Journal
[18] Butun I, Osterberg P, Song HIEEE Communications Surveys and Tutorials (2020)
22(1) 616-644
[19] Iwuanyanwu U, Omotola Oyewole O, […] Jonathan Apeh AJOURNAL OF
TECHNOLOGY & INNOVATION (2023) 3(1) 38-43
[20] Payton J, Wang Y
[21] Mosenia A, Jha NIEEE Transactions on Emerging Topics in Computing (2017) 5(4)
586-602
[22] Pourrahmani H, Yavarinasab A, […] Van herle JInternet of Things (Netherlands)
[23] Ali K, Askar S, Author A(2021)
[24] Williams P, Dutta I, […] Bayoumi MInternet of Things (Netherlands)
[25] Millar S(2021)

PLAGIARISM REPORT

You might also like