Enhancing IoT Security: Addressing Wi-Fi Vulnerabilities and Mitigation Strategies


Authors : Md Mazedul Alam

Volume/Issue : Volume 10 - 2025, Issue 7 - July


Google Scholar : https://tinyurl.com/mrysh5cr

DOI : https://doi.org/10.38124/ijisrt/25jul021

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : IoT security is essential to prevent data breaches, as most IoT devices lack built-in security mechanisms. These devices often go undetected by traditional cybersecurity systems, transferring unencrypted data over the internet, which leaves them vulnerable to attacks. IoT security refers to the measures designed to protect connected devices and systems from unauthorized access, cyberattacks, and other security threats. This encompasses securing the devices themselves, safeguarding data transmission, and fortifying the underlying network infrastructure. IoT security faces several challenges, including the vast number of devices with varying security levels, the complexity of interconnected networks, and the growing sophistication of cyber threats. This research study emphasizes the importance of enhancing IoT security. It examines the most common communication technologies—Bluetooth, Wi-Fi, and LTE—and evaluates the safeguards available for them, focusing specifically on Wi-Fi technology in this article. The EBIOS risk assessment method is employed to identify potential vulnerabilities and threats within the Wi-Fi ecosystem. The ultimate objective of this work is to highlight and mitigate security risks associated with using Wi-Fi in IoT environments. The broader goal of IoT security is to ensure the confidentiality, integrity, and availability of data and systems while maintaining the functionality and usability of connected devices.

Keywords : IoT, Cyber-attack, Bluetooth, Wi-Fi, LTE, IoT Security, Data Breach, Network Infrastructure, EBIOS Technique, Vulnerability Assessment.

References :

  1. SentinelOne. (n.d.). AI threat detection. SentinelOne. Retrieved April 7, 2025, from https://www.sentinelone.com/cybersecurity-101/data-and-ai/ai-threat-detection/
  2. Forbes Technology Council. (2024, August 27). Blockchain for IoT security: Enhancing trust in connect https://www.forbes.com/councils/forbestechcouncil/2024/08/27/blockchain-for-iot-security-enhancing-trust-in-connected-devices/
  3. Palo Alto Networks. (n.d.). What is a zero trust architecture? Palo Alto Networks. Retrieved April 7, 2025, from https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture
  4. Let me know if you need it in a different format (like MLA, Chicago, or IEEE).
  5. Ali, B., & Awad, A. I. (2018). Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors, 18(3), 817. https://doi.org/10.3390/s18030817
  6. Ali, I., Sabir, S., & Ullah, Z. (2019). Internet of things security, device authentication and access control: A review. arXiv. https://arxiv.org/abs/1901.07309
  7. Buenrostro, E., Cyrus, D., Le, T., & Emamian, V. (2018). Security of IoT devices. Journal of Cyber Security Technology, 2(1), 1–13. https://doi.org/10.1080/23742917.2017.1410082
  8. Deepty, R. R., Alam, A., & Islam, M. E. (2019). IoT and Wi-Fi based door access control system using mobile application. In 2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON) (pp. 21–24). IEEE. https://doi.org/10.1109/RAAICON48939.2019.8970665
  9. Dineva, K., & Atanasova, T. (2019). Security in IoT systems. International Multidisciplinary Scientific GeoConference SGEM, 19(2.1), 569–577. https://doi.org/10.5593/sgem2019/2.1/S07.072
  10. Frustaci, M., Pace, P., & Aloi, G. (2017, September). Securing the IoT world: Issues and perspectives. In 2017 IEEE Conference on Standards for Communications and Networking (CSCN) (pp. 246–251). IEEE. https://doi.org/10.1109/CSCN.2017.8088641
  11. Lonzetta, A. M., Cope, P., Campbell, J., Mohd, B. J., & Hayajneh, T. (2018). Security vulnerabilities in Bluetooth technology as used in IoT. Journal of Sensor and Actuator Networks, 7(3), 28. https://doi.org/10.3390/jsan7030028
  12. Rahman, R. A., & Shah, B. (2016, March). Security analysis of IoT protocols: A focus in CoAP. In 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC) (pp. 1–7). IEEE. https://doi.org/10.1109/ICBDSC.2016.7460332
  13. Sain, M., Kang, Y. J., & Lee, H. J. (2017, February). Survey on security in Internet of Things: State of the art and challenges. In 2017 19th International Conference on Advanced Communication Technology (ICACT) (pp. 699–704). IEEE. https://doi.org/10.23919/ICACT.2017.7890132
  14. Singh, G., Pandey, A., Prakash, M., Andreoni, M., & Baddeley, M. (2023). Benchmarking and security considerations of Wi-Fi FTM for ranging in IoT devices. arXiv. https://arxiv.org/abs/2303.03766
  15. Vashi, S., Ram, J., Modi, J., Verma, S., & Prakash, C. (2017, February). Internet of Things (IoT): A vision, architectural elements, and security issues. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 492–496). IEEE. https://doi.org/10.1109/I-SMAC.2017.8058207
  16. Zhang, Z. K., Cho, M. C. Y., & Shieh, S. (2015, April). Emerging security threats and countermeasures in IoT. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (pp. 1–6). https://doi.org/10.1145/2714576.2714635
  17. Ahmed, M. M., Shah, M. A., & Wahid, A. (2017, April). IoT security: A layered approach for attacks & defenses. In 2017 International Conference on Communication Technologies (ComTech) (pp. 104–110). IEEE. https://doi.org/10.1109/COMTECH.2017.8065759
  18. Alansari, Z., Anuar, N. B., Kamsin, A., Belgaum, M. R., Alshaer, J., Soomro, S., & Miraz, M. H. (2018, August). Internet of Things: Infrastructure, architecture, security and privacy. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE) (pp. 150–155). IEEE. https://doi.org/10.1109/iCCECE.2018.8658699

IoT security is essential to prevent data breaches, as most IoT devices lack built-in security mechanisms. These devices often go undetected by traditional cybersecurity systems, transferring unencrypted data over the internet, which leaves them vulnerable to attacks. IoT security refers to the measures designed to protect connected devices and systems from unauthorized access, cyberattacks, and other security threats. This encompasses securing the devices themselves, safeguarding data transmission, and fortifying the underlying network infrastructure. IoT security faces several challenges, including the vast number of devices with varying security levels, the complexity of interconnected networks, and the growing sophistication of cyber threats. This research study emphasizes the importance of enhancing IoT security. It examines the most common communication technologies—Bluetooth, Wi-Fi, and LTE—and evaluates the safeguards available for them, focusing specifically on Wi-Fi technology in this article. The EBIOS risk assessment method is employed to identify potential vulnerabilities and threats within the Wi-Fi ecosystem. The ultimate objective of this work is to highlight and mitigate security risks associated with using Wi-Fi in IoT environments. The broader goal of IoT security is to ensure the confidentiality, integrity, and availability of data and systems while maintaining the functionality and usability of connected devices.

Keywords : IoT, Cyber-attack, Bluetooth, Wi-Fi, LTE, IoT Security, Data Breach, Network Infrastructure, EBIOS Technique, Vulnerability Assessment.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe