Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2 | Views: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper | Computer Science & Engineering | India | Volume 13 Issue 12, December 2024 | Popularity: 4.4 / 10


     

Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies

Dr. A. Lavanya


Abstract: The exponential growth of IoT devices presents significant security challenges due to their limited hardware capabilities and simple design. This paper explores the prevalent security threats, attacks, and vulnerabilities associated with IoT devices. It highlights their susceptibility to becoming targets for cybercriminals and proposes mitigation strategies such as access control mechanisms, secure communication protocols, and regular updates. By addressing these challenges, businesses and individuals can enhance the security, safety, and privacy of IoT ecosystems.


Keywords: Internet of Things, Security threats, Attacks, IoT security, Mitigation techniques, Cybersecurity


Edition: Volume 13 Issue 12, December 2024


Pages: 448 - 453


DOI: https://www.doi.org/10.21275/SR241205115818



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Dr. A. Lavanya, "Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies", International Journal of Science and Research (IJSR), Volume 13 Issue 12, December 2024, pp. 448-453, https://www.ijsr.net/getabstract.php?paperid=SR241205115818, DOI: https://www.doi.org/10.21275/SR241205115818

Similar Articles

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 832 - 839

Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 4, April 2024

Pages: 923 - 930

Robustness Testing for AI/ML Models: Strategies for Identifying and Mitigating Vulnerabilities

Praveen Kumar, Shailendra Bade

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 12, December 2023

Pages: 2074 - 2078

DevSecOps: Integrating Security into the DevOps Pipeline

Dinesh Reddy Chittibala

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra, Chandra Sekhar Dash

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 772 - 776

Cryptographic Algorithm to Augment Data Security

Vipin R Bharadwaj, Nalina V, Rithvik Mohan V

Share this Article



Top