Analysis of IoT Vulnerabilities and Proposed Solution Approach for Secure Real-Time IoT Communication

  • Conference paper
  • First Online:
ITNG 2024: 21st International Conference on Information Technology-New Generations (ITNG 2024)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1456))

Included in the following conference series:

  • 12 Accesses

Abstract

The growing reliance on real-time communication in Internet of Things (IoT) devices raises concerns about security vulnerabilities. Our research identifies vulnerabilities in prevalent IoT protocols that could enable attackers to disrupt communication, compromise data, or even seize control of devices. By analyzing various threats in a test environment, we found that insecure device configurations and weak authentication mechanisms were the primary culprits. We demonstrate the effectiveness of implementing robust authentication, end-to-end data encryption, and network segmentation in mitigating these vulnerabilities. Our findings emphasize the need for proactive security measures in develo** and deploying real-time IoT communication systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 213.99
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 267.49
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. **ong et al., A secure data deletion scheme for IoT devices through key derivation encryption and data analysis. Futur. Gener. Comput. Syst. 111, 741–753 (2020)

    Article  Google Scholar 

  2. S. Amanlou, M.K. Hasan, K.A. Abu Bakar, Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model. Comput. Netw. 199, 108465 (2021)

    Article  Google Scholar 

  3. L.F. Khalid, S.Y. Ameen, Secure IoT integration in daily lives: A review. J. Inf. Technol. Inform 01(01), 6–12 (2021)

    Google Scholar 

  4. W. ** et al., Keep: Secure and Efficient Communication for Distributed IoT Devices (IEEE, 2020)

    Google Scholar 

  5. A.M. Taha, A.M. Rashwan, H.S. Hassanein, Secure Communications for Resource-Constrained IoT devices. Sensors 20, 3637 (2020)

    Article  Google Scholar 

  6. I. Ahmad, R.A. Ziar, M.S. Niazy, Survey on IoT: Security threats and applications. J. Robot. Control 2(1), 42 (2021)

    Google Scholar 

  7. J. Zhang, H. Chen, L. Gyong, J. Cao, Z. Gu, The Current Research of IoT Security (IEEE, 2019)

    Book  Google Scholar 

  8. S. Narang, T. Nalwa, T. Choudhury, N. Kashyap, An efficient method for security measurement in internet of things. 2018 international conference on communication, computing and Internet of Things (IC3IoT), Feb 2018

    Google Scholar 

  9. S. Naoui, M.E. Elhdhili, L.A. Saidane, Security analysis of existing IoT key management protocols. 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), 2016

    Google Scholar 

  10. T.G. Zewdie, A. Girma, IoT security and the role of AI/ML to combat emerging cyber threats in cloud computing environment. Inf. Syst. J. 21(4), 253–263 (2020)

    Google Scholar 

  11. P. Efstathopoulos, Cloud security is overwhelming. AI and machine learning can help. Symantec Enterprise Blogs (2019)

    Google Scholar 

  12. Cloud Computing & IOT, esds (2021 7 July)

    Google Scholar 

  13. V. Rudyi, Overview of IoT device communication. AgileVision (2023)

    Google Scholar 

  14. P. Malhotra et al., Internet of Things: Evolution, concerns and security challenges. Sensors 21, 1809 (2021)

    Article  Google Scholar 

  15. E. Heaslip, What Are Security Patches and Why Are They Important for Your Business? (U.S. Chamber of Commerce, 2023)

    Google Scholar 

  16. V. Padua, IoT security: Safeguarding critical networks against digital assaults. Cybersecurity Exchange (2023)

    Google Scholar 

  17. “FDA warns against urgent/11 vulnerabilities affecting medical devices and Hospital Networks,” Nouvelles de Sécurité - Trend Micro FR (2019 Oct)

    Google Scholar 

  18. T. Mazhar et al., Analysis of IoT security challenges and its solutions using artificial intelligence. Brain Sci. 13, 683 (2023)

    Article  Google Scholar 

  19. H. Taherdoost, Security and Internet of Things: Benefits, challenges, and future perspectives. Electronics 12(8), 1901 (2023). https://doi.org/10.3390/electronics12081901

    Article  Google Scholar 

  20. B. Flavin, Internet of Things: Weighing the Pros and Cons (Rasmussen University, 2022)

    Google Scholar 

  21. T.G. Zewdie, A. Girma, An evaluation framework for machine learning methods in detection of DOS and DDOS intrusion. 2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 115–121, 2022. https://doi.org/10.1109/ICAIIC54071.2022.9722661

  22. A. Girma, P. Wang, An efficient hybrid model for detecting distributed denial of service (DDOS) attacks in cloud computing using multivariate correlation and data mining clustering techniques. IACIS J. Issues Inf. Syst 19(2), 1–12 (2018)

    Google Scholar 

  23. A. Girma, M. Garuba, J. Li, C. Lui, K. Abayomi, Analysis of DDOS attacks and an introduction of a hybrid statistical model to detect DDOS attacks on cloud computing environment. ITNG 2016

    Google Scholar 

Download references

Acknowledgement

This research project is funded by NSF grant award# 2011689.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nurus Safa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Girma, A., Safa, N., Searcy, A. (2024). Analysis of IoT Vulnerabilities and Proposed Solution Approach for Secure Real-Time IoT Communication. In: Latifi, S. (eds) ITNG 2024: 21st International Conference on Information Technology-New Generations. ITNG 2024. Advances in Intelligent Systems and Computing, vol 1456. Springer, Cham. https://doi.org/10.1007/978-3-031-56599-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-56599-1_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-56598-4

  • Online ISBN: 978-3-031-56599-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation