End User Security using Smart Devices with Ability to Access IoT services


Authors : Kosea Erasto Muwanga; Eria Muwanguzi

Volume/Issue : Volume 9 - 2024, Issue 9 - September


Google Scholar : https://tinyurl.com/3hwhdx5s

Scribd : https://tinyurl.com/4awsr48b

DOI : https://doi.org/10.38124/ijisrt/IJISRT24SEP1430

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : This paper explores the security issues of smart devices in IoT environments and proposes solutions to enhance end-user protection. A qualitative approach, including a comprehensive literature review, was used to identify key security issues and best practices. Key vulnerabilities in IoT device security include insecure communication channels, weak authentication mechanisms, outdated firmware and software, and a lack of standardized security protocols. Current security practices among end-users show limited awareness and inconsistent implementation. Recommendations include adopting universal security standards, enhancing user education through regular programs, promoting advanced security tools like multi-factor authentication, and simplifying device management with user-friendly interfaces. This paper offers a comprehensive analysis of IoT security issues and practical recommendations to create a safer IoT ecosystem, ensuring technological advancements do not compromise user security.

Keywords : Internet of Things (IoT): Cybersecurity: Smart Devices: Vulnerabilities: User Awareness.

References :

  1. Abubakar, I., Adamu, B., & Suleiman, A. (2018). Internet of Things (IoT) and its potential impact on Sub-SaharanAfrica's development. Journal of African Studies and Development 10(4) https://doi.org/10.5897/JASD2018.0603, 134-142.
  2. Akande, O., Olusola, E., & Olanrewaju, T. (2021). Adoption and Challenges of IoT in agriculture and healthcare in Uganda. International Journal of IoT and Cloud Computing 8(1) https://doi.org/10.1504/IJICC.2021.112233, 29-41.
  3. Akinola, A., Abiodun, T., & Bakere, M. (2019). Security challenges and mitigation strategies for IoT in Africa: A review. African Journal of Computer Science 12(3) https://doi.org/10.5897/AJCS2019.0352, 113-127.
  4. Alrawais, A., Alhothali, A., & Almazroi, A. (2017). Security and privacy challenges in IoT environments. Journal of Compouter Networks and Communications https://doi.org/10.1155/2017/8251413, `1-12.
  5. Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks 54(15) https://doi.org/10.1016j.comnet.2010.05.010, 2787-2805.
  6. Ayo, C., Adewumi, A., & Oludare, O. (2021). User education and awareness programs in IoT security: A case study in Uganda. International Journal of Information Security 20(2) https://doi.org/10.1007/s10207-020-05414-7, 155-165.
  7. Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues. Computer Communications 54 https://doi.org/10.1016/j.comcom.2014.09.008, 1-31.
  8. Chukwuneke, O., Oye, N., & Nwogugu, M. (2020). IoT security challenges and mitigation strategies in Sub-Saharan Africa. African Journal of Infromation and Communication Technology 8(1) https://doi.org/10.4314/aiict.v8i1.5, 22-34.
  9. Gubbi, J., Buyya, R., & Marusic, S. (2013). Internet of Things (IoT) A vision, architectural elements, and future directions. Future Generation Computer Systems 29(7) https://doi.org/10.1016/j.future.2013.01.010, 1645-1660.
  10. Gubbi, J., Buyya, R., & Marusic, S. (2019). Internet of Things (IoT) security and privacy issues. Computer & Security 86 https://doi.org/10.1016/j.cose.2019.05.006, 110-131.
  11. Jain, A., Gupta, S., & Patel, S. (2022). An emperical evaluation of security frameworks for IoT devices. Journal of Cyber Security Technology 6(3) https://doi.org/10.1080/23742917.2022.2063948, 234-248.
  12. Kumar, S., Yadav, A., & Singh, V. (2021). Cybersecurity practices in smart home environments: An emperical study. Journal of Cybersecurity and Privacy 5(4) https://doi.org/10.1007/s42400-021-00047-5, 371-385.
  13. Li, X., Chen, Z., & Wang, H. (2023). User-centric security approaches in IoT: A reveiw of recent advances and challenges. ACM computing Surveys 55(2) https://doi.org/10.1145/3562379, 1-38.
  14. Li, X., Liu, J., & Chen, Y. (2018). Security and privacy issues on Internet of Things (IoT): A survey. Computer Science Review 29 https://doi,org/10.1016/j.cosrev.2018.04.003, 1-19.
  15. Mukasa, R., Ochieng, R., & Kato, R. (2022). IoT devices in Uganda: Adoption challenges and security implications. East African Journal of Computing, 91-104.
  16. Namagembe, M., Kasirye, I., & Akabwai, G. (2020). Enhancing user awareness for IoT security in Uganda: Current and future directions. Journal of Internet security 9(3) https://doi.org/10.1016/j.jsec.2020.07.001, 67-80.
  17. Odun-Ayo, A., Lawal, M., & Ibrahim, K. (2018). The Impact of IoT adoption on development in Sub-Saharan Africa: Opportunities and challenges. African Journal of Technology 14(1) https://doi.org/ajt.v14i1.6, 45-58.
  18. Roman, R., Zhou, J., & Lopez, J. (2013). On the security and privacy of IoT systems. IEEE Transactions on Industrial Informatics 9(3) https://doi.org/10.1109/TII.2013.2274465, 1784-1791.
  19. Sicari, S., Rizzardi, A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks 76 https://doi.org/10.1016/j.comnet2014.12.031, 146-164.
  20. Solorzano, P., Gutiérrez, F., & Gordillo, A. (2023). Data security threats on smart devices at home. RPHA Conference Abstracts.
  21. Xu, Y., Zhang, H., & Zhang, J. (2020). Multi-layered security strategies for IoT devices. IEEE Access 8, https://doi.org/10.1109/ACCESS.2020.2982537, 68234-68245.
  22. Zhou, J., Hu, Y., & Zhang, J. (2018). Firmware and software vulnerabilities in IoT devices: Analysis and solutions. ACM Transactions on Embedded Computing Systems 17(1) https://doi.org/10.1145/3154604, 1-24.
  23. Kasaija, J., & Mubiru, R. (2023). The State of IoT Security in Uganda: Emerging Threats and Challenges. Kampala: Makerere University Press.
  24. Nabukenya, J., & Ssembatya, V. (2024). Addressing IoT Security Gaps in Uganda: Protocols and Practices for Enhanced Protection. Journal of East African Technology, 15(2), 45-60.

This paper explores the security issues of smart devices in IoT environments and proposes solutions to enhance end-user protection. A qualitative approach, including a comprehensive literature review, was used to identify key security issues and best practices. Key vulnerabilities in IoT device security include insecure communication channels, weak authentication mechanisms, outdated firmware and software, and a lack of standardized security protocols. Current security practices among end-users show limited awareness and inconsistent implementation. Recommendations include adopting universal security standards, enhancing user education through regular programs, promoting advanced security tools like multi-factor authentication, and simplifying device management with user-friendly interfaces. This paper offers a comprehensive analysis of IoT security issues and practical recommendations to create a safer IoT ecosystem, ensuring technological advancements do not compromise user security.

Keywords : Internet of Things (IoT): Cybersecurity: Smart Devices: Vulnerabilities: User Awareness.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe