Content area

Abstract

Traditional devices are evolving into more automated, and smart entities forming Internet of Things (IoT) technology a huge complex network composed of millions of smart connected machines. The rapid proliferation of such a technology has a significant impact on various applications and domains daily, including domestic (smart home) devices, transportation, cities, energy, healthcare, manufacturing, and many others. However, in parallel with providing convenience to users, this technology comes with many concerns, risks, and vulnerabilities that threaten both the security and privacy of the users. Poor authentication practices include weak password policies and no multi-factor authentication, which can make devices vulnerable to unauthorized control, thereby giving the attacker access to sensitive user data or hijacking the device itself. Inadequate encryption techniques further worsen the problem by leaving communications unsecured and sensitive data open to interception and theft. Insecure network interfaces are common because of the lack of proper security measures in their design and thus give an attacker the entry point into otherwise secured devices. Moreover, due to the lack of consistent deployment of security by different manufacturers, some devices remain more open to attacks than others. While some of these vulnerabilities have been identified in the existing literature, there is still a need for a more holistic view that considers the spectrum of security issues in IoT devices and their application domains. In this paper, we assess the vulnerabilities, and the security challenges inherent in IoT networks including weak authentication practices, inadequate encryption, and insecure network interfaces, and lack of standardization. Through different case scenarios in transportation and health systems, we compare the effects and implications of inadequate systems towards security. For example, inadequate authentication in healthcare could compromise patient safety, while in transportation, it may lead to disruptions and safety hazards. The paper concludes by recommending some strategies that improve IoT security, encompassing policy development and standardization efforts along with areas of future research for mitigating associated risks effectively.

Details

Title
Assessing the Security Vulnerabilities and Countermeasures of Connected and Smart Devices
Pages
9-17
Number of pages
10
Publication year
2025
Publication date
Jun 2025
Publisher
Academic Conferences International Limited
Place of publication
Reading
Country of publication
United Kingdom
Publication subject
Source type
Conference Paper
Language of publication
English
Document type
Conference Proceedings
ProQuest document ID
3244083166
Document URL
https://www.proquest.com/conference-papers-proceedings/assessing-security-vulnerabilities/docview/3244083166/se-2?accountid=208611
Copyright
Copyright Academic Conferences International Limited 2025
Last updated
2025-11-14
Database
ProQuest One Academic