Assessing the Security Vulnerabilities and Countermeasures of Connected and Smart Devices

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Conference on Cyber Warfare and Security (Jun 2025), p. 9-18
1. Verfasser: Almani, Dimah
Weitere Verfasser: Furnell, Steven
Veröffentlicht:
Academic Conferences International Limited
Schlagworte:
Online-Zugang:Citation/Abstract
Full Text
Full Text - PDF
Tags: Tag hinzufügen
Keine Tags, Fügen Sie das erste Tag hinzu!

MARC

LEADER 00000nab a2200000uu 4500
001 3244083166
003 UK-CbPIL
035 |a 3244083166 
045 2 |b d20250601  |b d20250630 
084 |a 142231  |2 nlm 
100 1 |a Almani, Dimah 
245 1 |a Assessing the Security Vulnerabilities and Countermeasures of Connected and Smart Devices 
260 |b Academic Conferences International Limited  |c Jun 2025 
513 |a Conference Proceedings 
520 3 |a Traditional devices are evolving into more automated, and smart entities forming Internet of Things (IoT) technology a huge complex network composed of millions of smart connected machines. The rapid proliferation of such a technology has a significant impact on various applications and domains daily, including domestic (smart home) devices, transportation, cities, energy, healthcare, manufacturing, and many others. However, in parallel with providing convenience to users, this technology comes with many concerns, risks, and vulnerabilities that threaten both the security and privacy of the users. Poor authentication practices include weak password policies and no multi-factor authentication, which can make devices vulnerable to unauthorized control, thereby giving the attacker access to sensitive user data or hijacking the device itself. Inadequate encryption techniques further worsen the problem by leaving communications unsecured and sensitive data open to interception and theft. Insecure network interfaces are common because of the lack of proper security measures in their design and thus give an attacker the entry point into otherwise secured devices. Moreover, due to the lack of consistent deployment of security by different manufacturers, some devices remain more open to attacks than others. While some of these vulnerabilities have been identified in the existing literature, there is still a need for a more holistic view that considers the spectrum of security issues in IoT devices and their application domains. In this paper, we assess the vulnerabilities, and the security challenges inherent in IoT networks including weak authentication practices, inadequate encryption, and insecure network interfaces, and lack of standardization. Through different case scenarios in transportation and health systems, we compare the effects and implications of inadequate systems towards security. For example, inadequate authentication in healthcare could compromise patient safety, while in transportation, it may lead to disruptions and safety hazards. The paper concludes by recommending some strategies that improve IoT security, encompassing policy development and standardization efforts along with areas of future research for mitigating associated risks effectively. 
653 |a Smart cities 
653 |a Encryption 
653 |a Data integrity 
653 |a Patient safety 
653 |a Smart devices 
653 |a Internet of Things 
653 |a Standardization 
653 |a Network security 
653 |a Trends 
653 |a Health care 
653 |a Communication 
653 |a Theft 
653 |a Smart buildings 
653 |a Devices 
653 |a Manufacturers 
653 |a Data encryption 
653 |a Privacy 
653 |a Health care industry 
653 |a Authentication 
653 |a Industrial safety 
653 |a Cybersecurity 
653 |a Efficiency 
653 |a Authenticity 
653 |a Safety 
653 |a Technology 
653 |a Transportation 
653 |a Policy making 
653 |a Hijacking 
653 |a Security 
653 |a Personal safety 
653 |a Cryptography 
653 |a Unauthorized 
653 |a Interfaces 
653 |a Health services 
653 |a Internet 
653 |a Deployment 
653 |a Networks 
653 |a Development policy 
653 |a Patients 
653 |a Machinery 
700 1 |a Furnell, Steven 
773 0 |t European Conference on Cyber Warfare and Security  |g (Jun 2025), p. 9-18 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3244083166/abstract/embedded/75I98GEZK8WCJMPQ?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3244083166/fulltext/embedded/75I98GEZK8WCJMPQ?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3244083166/fulltextPDF/embedded/75I98GEZK8WCJMPQ?source=fedsrch