A Comprehensive Study of IoT Security Issues and Protocols
Main Article Content
Abstract
The abstract emphasizes the paramount importance of integrating digital security and privacy measures into IoT (Internet of Things) technologies to fully unlock their potential. It acknowledges the looming risks to consumer safety and security posed by vulnerabilities in individual IoT devices, connectivity, and back end systems, as well as the escalating threat of large-scale cyberattacks leveraging insecure IoT devices. Despite numerous initiatives by government agencies, academic institutions, industry groups, and vendors to address IoT security challenges, the abstract highlights the lack of collaboration and clarity in the current landscape. It underscores the urgent need for harmonization of security recommendations, guidelines, and certification processes within the IoT ecosystem to ensure robust protection and efficient operation.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
Ahmad, S., Mehmood, F., Mehmood, A., & Kim, D. (2019). Design and Implementation of Decoupled IoT Application Store: A Novel Prototype for Virtual Objects Sharing and Discovery. Electronics, 8(3), 285. https://doi.org/10.3390/electronics8030285
Bodei, C., Chessa, S., & Galletta, L. (2019). Measuring Security in IoT Communications. Theoretical Computer Science, 764, 100–124. https://doi.org/10.1016/j.tcs.2018.12.002
Conti, M., Kaliyar, P., & Lal, C. (2018). CENSOR: Cloud‐Enabled Secure IoT Architecture over SDN Paradigm. Concurrency and Computation: Practice and Experience, 31(8). https://doi.org/10.1002/cpe.4978
Likhitha, K., Malineni, S., Jampani, N., & Prasanna, N. L. (2019). Home Security System Using PIR Sensor-IoT. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, August 2019, 497–500. https://doi.org/10.32628/cseit195272
Abdur, M., Habib, S., Ali, M., & Ullah, S. (2017). Security Issues in the Internet of Things (IoT): A Comprehensive Study. International Journal of Advanced Computer Science and Applications, 8(6). https://doi.org/10.14569/ijacsa.2017.080650
Choi, J., In, Y., Park, C., Seok, S., Seo, H., & Kim, H. (2016). Secure IoT Framework and 2D Architecture for End-To-End Security. The Journal of Supercomputing, 74(8), 3521–3535. https://doi.org/10.1007/s11227-016-1684-0
Sivakumar, S. A., John, T. J., Selvi, G. T., Madhu, B., Shankar, C. U., & Arjun, K. P. (2021). IoT based Intelligent Attendance Monitoring with Face Recognition Scheme. In 2021 5th International Conference on Computing Methodologies and Communication (ICCMC) (pp. 349-353). IEEE.
Cynthia, J., Sultana, H. P., Saroja, M. N., & Senthil, J. (2018). Security Protocols for IoT. In Studies in Big Data Ubiquitous Computing and Computing Security of IoT, April 2018, 1–28. https://doi.org/10.1007/978-3-030-01566-4_1
Fernandes, E., Rahmati, A., Jung, J., & Prakash, A. (2017). Security Implications of Permission Models in Smart-Home Application Frameworks. IEEE Security & Privacy, 15(2), 24–30. https://doi.org/10.1109/msp.2017.43
Li, T., Gao, C., Jiang, L., Pedrycz, W., & Shen, J. (2019). Publicly Verifiable Privacy-Preserving Aggregation and Its Application in IoT. Journal of Network and Computer Applications, 126, 39–44. https://doi.org/10.1016/j.jnca.2018.09.018
Mao, B., Kawamoto, Y., Liu, J., & Kato, N. (2019). Harvesting and Threat Aware Security Configuration Strategy for IEEE 802.15.4 Based IoT Networks. IEEE Communications Letters, 23(11), 2130–2134. https://doi.org/10.1109/lcomm.2019.2932988
Madhu, B., & Gopalachari, M. V. (2023). Classification of the Severity of Attacks on Internet of Things Networks. In Sentiment Analysis and Deep Learning: Proceedings of ICSADL 2022 (pp. 411-424). Singapore: Springer Nature Singapore.
Maram, B., Gnanasekar, J. M., Manogaran, G., & Balaanand, M. (2018). Intelligent Security Algorithm for UNICODE Data Privacy and Security in IOT. Service Oriented Computing and Applications, 13(1), 3–15. https://doi.org/10.1007/s11761-018-0249-x
Madhu, B., Gopala Chari, M. V., Vankdothu, R., Silivery, A. K., & Aerranagula, V. (2023). Intrusion detection models for IOT networks via deep learning approaches. Measurement: Sensors, 25, 100641.
Ali, B., & Awad, A. (2018). Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Sensors, 18(3), 817. https://doi.org/10.3390/s18030817
Alharby, S., Harris, N., Weddell, A., & Reeve, J. (2018). The security trade-offs in resource constrained nodes for IoT application. International Journal of Electronics and Communication Engineering, 12(1), 52-59. https://doi.org/10.1999/1307-6892/10008451