Assessing the Security Vulnerabilities and Countermeasures of Connected and Smart Devices
DOI:
https://doi.org/10.34190/eccws.24.1.3550Keywords:
Authentication, Smart devices, IoT, Security, Transportation, Healthcare, Attacks, SafetyAbstract
Traditional devices are evolving into more automated, and smart entities forming Internet of Things (IoT) technology a huge complex network composed of millions of smart connected machines. The rapid proliferation of such a technology has a significant impact on various applications and domains daily, including domestic (smart home) devices, transportation, cities, energy, healthcare, manufacturing, and many others. However, in parallel with providing convenience to users, this technology comes with many concerns, risks, and vulnerabilities that threaten both the security and privacy of the users. Poor authentication practices include weak password policies and no multi-factor authentication, which can make devices vulnerable to unauthorized control, thereby giving the attacker access to sensitive user data or hijacking the device itself. Inadequate encryption techniques further worsen the problem by leaving communications unsecured and sensitive data open to interception and theft. Insecure network interfaces are common because of the lack of proper security measures in their design and thus give an attacker the entry point into otherwise secured devices. Moreover, due to the lack of consistent deployment of security by different manufacturers, some devices remain more open to attacks than others. While some of these vulnerabilities have been identified in the existing literature, there is still a need for a more holistic view that considers the spectrum of security issues in IoT devices and their application domains. In this paper, we assess the vulnerabilities, and the security challenges inherent in IoT networks including weak authentication practices, inadequate encryption, and insecure network interfaces, and lack of standardization. Through different case scenarios in transportation and health systems, we compare the effects and implications of inadequate systems towards security. For example, inadequate authentication in healthcare could compromise patient safety, while in transportation, it may lead to disruptions and safety hazards. The paper concludes by recommending some strategies that improve IoT security, encompassing policy development and standardization efforts along with areas of future research for mitigating associated risks effectively.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 European Conference on Cyber Warfare and Security

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.