Authors :
Kosea Erasto Muwanga; Eria Muwanguzi
Volume/Issue :
Volume 9 - 2024, Issue 9 - September
Google Scholar :
https://tinyurl.com/3hwhdx5s
Scribd :
https://tinyurl.com/4awsr48b
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24SEP1430
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
This paper explores the security issues of smart
devices in IoT environments and proposes solutions to
enhance end-user protection. A qualitative approach,
including a comprehensive literature review, was used to
identify key security issues and best practices. Key
vulnerabilities in IoT device security include insecure
communication channels, weak authentication
mechanisms, outdated firmware and software, and a lack
of standardized security protocols. Current security
practices among end-users show limited awareness and
inconsistent implementation. Recommendations include
adopting universal security standards, enhancing user
education through regular programs, promoting advanced
security tools like multi-factor authentication, and
simplifying device management with user-friendly
interfaces. This paper offers a comprehensive analysis of
IoT security issues and practical recommendations to
create a safer IoT ecosystem, ensuring technological
advancements do not compromise user security.
Keywords :
Internet of Things (IoT): Cybersecurity: Smart Devices: Vulnerabilities: User Awareness.
References :
- Abubakar, I., Adamu, B., & Suleiman, A. (2018). Internet of Things (IoT) and its potential impact on Sub-SaharanAfrica's development. Journal of African Studies and Development 10(4) https://doi.org/10.5897/JASD2018.0603, 134-142.
- Akande, O., Olusola, E., & Olanrewaju, T. (2021). Adoption and Challenges of IoT in agriculture and healthcare in Uganda. International Journal of IoT and Cloud Computing 8(1) https://doi.org/10.1504/IJICC.2021.112233, 29-41.
- Akinola, A., Abiodun, T., & Bakere, M. (2019). Security challenges and mitigation strategies for IoT in Africa: A review. African Journal of Computer Science 12(3) https://doi.org/10.5897/AJCS2019.0352, 113-127.
- Alrawais, A., Alhothali, A., & Almazroi, A. (2017). Security and privacy challenges in IoT environments. Journal of Compouter Networks and Communications https://doi.org/10.1155/2017/8251413, `1-12.
- Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks 54(15) https://doi.org/10.1016j.comnet.2010.05.010, 2787-2805.
- Ayo, C., Adewumi, A., & Oludare, O. (2021). User education and awareness programs in IoT security: A case study in Uganda. International Journal of Information Security 20(2) https://doi.org/10.1007/s10207-020-05414-7, 155-165.
- Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues. Computer Communications 54 https://doi.org/10.1016/j.comcom.2014.09.008, 1-31.
- Chukwuneke, O., Oye, N., & Nwogugu, M. (2020). IoT security challenges and mitigation strategies in Sub-Saharan Africa. African Journal of Infromation and Communication Technology 8(1) https://doi.org/10.4314/aiict.v8i1.5, 22-34.
- Gubbi, J., Buyya, R., & Marusic, S. (2013). Internet of Things (IoT) A vision, architectural elements, and future directions. Future Generation Computer Systems 29(7) https://doi.org/10.1016/j.future.2013.01.010, 1645-1660.
- Gubbi, J., Buyya, R., & Marusic, S. (2019). Internet of Things (IoT) security and privacy issues. Computer & Security 86 https://doi.org/10.1016/j.cose.2019.05.006, 110-131.
- Jain, A., Gupta, S., & Patel, S. (2022). An emperical evaluation of security frameworks for IoT devices. Journal of Cyber Security Technology 6(3) https://doi.org/10.1080/23742917.2022.2063948, 234-248.
- Kumar, S., Yadav, A., & Singh, V. (2021). Cybersecurity practices in smart home environments: An emperical study. Journal of Cybersecurity and Privacy 5(4) https://doi.org/10.1007/s42400-021-00047-5, 371-385.
- Li, X., Chen, Z., & Wang, H. (2023). User-centric security approaches in IoT: A reveiw of recent advances and challenges. ACM computing Surveys 55(2) https://doi.org/10.1145/3562379, 1-38.
- Li, X., Liu, J., & Chen, Y. (2018). Security and privacy issues on Internet of Things (IoT): A survey. Computer Science Review 29 https://doi,org/10.1016/j.cosrev.2018.04.003, 1-19.
- Mukasa, R., Ochieng, R., & Kato, R. (2022). IoT devices in Uganda: Adoption challenges and security implications. East African Journal of Computing, 91-104.
- Namagembe, M., Kasirye, I., & Akabwai, G. (2020). Enhancing user awareness for IoT security in Uganda: Current and future directions. Journal of Internet security 9(3) https://doi.org/10.1016/j.jsec.2020.07.001, 67-80.
- Odun-Ayo, A., Lawal, M., & Ibrahim, K. (2018). The Impact of IoT adoption on development in Sub-Saharan Africa: Opportunities and challenges. African Journal of Technology 14(1) https://doi.org/ajt.v14i1.6, 45-58.
- Roman, R., Zhou, J., & Lopez, J. (2013). On the security and privacy of IoT systems. IEEE Transactions on Industrial Informatics 9(3) https://doi.org/10.1109/TII.2013.2274465, 1784-1791.
- Sicari, S., Rizzardi, A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks 76 https://doi.org/10.1016/j.comnet2014.12.031, 146-164.
- Solorzano, P., Gutiérrez, F., & Gordillo, A. (2023). Data security threats on smart devices at home. RPHA Conference Abstracts.
- Xu, Y., Zhang, H., & Zhang, J. (2020). Multi-layered security strategies for IoT devices. IEEE Access 8, https://doi.org/10.1109/ACCESS.2020.2982537, 68234-68245.
- Zhou, J., Hu, Y., & Zhang, J. (2018). Firmware and software vulnerabilities in IoT devices: Analysis and solutions. ACM Transactions on Embedded Computing Systems 17(1) https://doi.org/10.1145/3154604, 1-24.
- Kasaija, J., & Mubiru, R. (2023). The State of IoT Security in Uganda: Emerging Threats and Challenges. Kampala: Makerere University Press.
- Nabukenya, J., & Ssembatya, V. (2024). Addressing IoT Security Gaps in Uganda: Protocols and Practices for Enhanced Protection. Journal of East African Technology, 15(2), 45-60.
This paper explores the security issues of smart
devices in IoT environments and proposes solutions to
enhance end-user protection. A qualitative approach,
including a comprehensive literature review, was used to
identify key security issues and best practices. Key
vulnerabilities in IoT device security include insecure
communication channels, weak authentication
mechanisms, outdated firmware and software, and a lack
of standardized security protocols. Current security
practices among end-users show limited awareness and
inconsistent implementation. Recommendations include
adopting universal security standards, enhancing user
education through regular programs, promoting advanced
security tools like multi-factor authentication, and
simplifying device management with user-friendly
interfaces. This paper offers a comprehensive analysis of
IoT security issues and practical recommendations to
create a safer IoT ecosystem, ensuring technological
advancements do not compromise user security.
Keywords :
Internet of Things (IoT): Cybersecurity: Smart Devices: Vulnerabilities: User Awareness.