EconPapers    
Economics at your fingertips  
 

Obstacles and countermeasures for protecting Internet of Things devices from emerging security risks

Chahak Mittal
Additional contact information
Chahak Mittal: Universal Logistics, USA

Cyber Security: A Peer-Reviewed Journal, 2024, vol. 8, issue 1, 48-62

Abstract: The rapid proliferation of Internet of Things (IoT) devices has ushered in a paradigm shift, revolutionising the way we interact with and perceive our environment. This phenomenon has given rise to a hyper-connected ecosystem, seamlessly integrating smart devices into the fabric of homes, cities and industries. While this interconnectedness holds tremendous promise for enhancing efficiency and convenience, it concurrently exposes a complex web of security challenges. This paper delves into the intricate interplay between the expansive scope of IoT deployment and the challenges it poses to security practitioners, policymakers and technology developers alike. By critically assessing current security gaps and potential weaknesses in IoT infrastructures, the research identifies key areas of vulnerability, ranging from insecure communication protocols and inadequate device authentication to insufficient data encryption. In response to these identified challenges, the paper proposes a set of innovative and pragmatic countermeasures aimed at mitigating emerging threats to IoT security. Emphasising the importance of a holistic security framework, the suggested countermeasures span technological enhancements, policy interventions and user education initiatives. The goal is to establish a resilient security posture that not only addresses current vulnerabilities but also adapts to the evolving threat landscape, thereby fostering a more secure and trustworthy IoT ecosystem. Through this research, we aim to contribute valuable insights to the ongoing discourse on IoT security, fostering a deeper understanding of the intricate dynamics at play and providing actionable recommendations for stakeholders invested in fortifying the security foundations of our increasingly interconnected world.

Keywords: IoT security; emerging threats; obstacles; countermeasures; secure-by-design; updates; zero-trust security; network segmentation; user education; threat intelligence (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/8632/download/ (application/pdf)
https://hstalks.com/article/8632/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2024:v:8:i:1:p:48-62

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2024:v:8:i:1:p:48-62