Authors :
Md Mazedul Alam
Volume/Issue :
Volume 10 - 2025, Issue 7 - July
Google Scholar :
https://tinyurl.com/mrysh5cr
DOI :
https://doi.org/10.38124/ijisrt/25jul021
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
IoT security is essential to prevent data breaches, as most IoT devices lack built-in security mechanisms. These
devices often go undetected by traditional cybersecurity systems, transferring unencrypted data over the internet, which
leaves them vulnerable to attacks. IoT security refers to the measures designed to protect connected devices and systems
from unauthorized access, cyberattacks, and other security threats. This encompasses securing the devices themselves,
safeguarding data transmission, and fortifying the underlying network infrastructure. IoT security faces several challenges,
including the vast number of devices with varying security levels, the complexity of interconnected networks, and the
growing sophistication of cyber threats. This research study emphasizes the importance of enhancing IoT security. It
examines the most common communication technologies—Bluetooth, Wi-Fi, and LTE—and evaluates the safeguards
available for them, focusing specifically on Wi-Fi technology in this article. The EBIOS risk assessment method is employed
to identify potential vulnerabilities and threats within the Wi-Fi ecosystem. The ultimate objective of this work is to highlight
and mitigate security risks associated with using Wi-Fi in IoT environments. The broader goal of IoT security is to ensure
the confidentiality, integrity, and availability of data and systems while maintaining the functionality and usability of
connected devices.
Keywords :
IoT, Cyber-attack, Bluetooth, Wi-Fi, LTE, IoT Security, Data Breach, Network Infrastructure, EBIOS Technique, Vulnerability Assessment.
References :
- SentinelOne. (n.d.). AI threat detection. SentinelOne. Retrieved April 7, 2025, from https://www.sentinelone.com/cybersecurity-101/data-and-ai/ai-threat-detection/
- Forbes Technology Council. (2024, August 27). Blockchain for IoT security: Enhancing trust in connect https://www.forbes.com/councils/forbestechcouncil/2024/08/27/blockchain-for-iot-security-enhancing-trust-in-connected-devices/
- Palo Alto Networks. (n.d.). What is a zero trust architecture? Palo Alto Networks. Retrieved April 7, 2025, from https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture
- Let me know if you need it in a different format (like MLA, Chicago, or IEEE).
- Ali, B., & Awad, A. I. (2018). Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors, 18(3), 817. https://doi.org/10.3390/s18030817
- Ali, I., Sabir, S., & Ullah, Z. (2019). Internet of things security, device authentication and access control: A review. arXiv. https://arxiv.org/abs/1901.07309
- Buenrostro, E., Cyrus, D., Le, T., & Emamian, V. (2018). Security of IoT devices. Journal of Cyber Security Technology, 2(1), 1–13. https://doi.org/10.1080/23742917.2017.1410082
- Deepty, R. R., Alam, A., & Islam, M. E. (2019). IoT and Wi-Fi based door access control system using mobile application. In 2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON) (pp. 21–24). IEEE. https://doi.org/10.1109/RAAICON48939.2019.8970665
- Dineva, K., & Atanasova, T. (2019). Security in IoT systems. International Multidisciplinary Scientific GeoConference SGEM, 19(2.1), 569–577. https://doi.org/10.5593/sgem2019/2.1/S07.072
- Frustaci, M., Pace, P., & Aloi, G. (2017, September). Securing the IoT world: Issues and perspectives. In 2017 IEEE Conference on Standards for Communications and Networking (CSCN) (pp. 246–251). IEEE. https://doi.org/10.1109/CSCN.2017.8088641
- Lonzetta, A. M., Cope, P., Campbell, J., Mohd, B. J., & Hayajneh, T. (2018). Security vulnerabilities in Bluetooth technology as used in IoT. Journal of Sensor and Actuator Networks, 7(3), 28. https://doi.org/10.3390/jsan7030028
- Rahman, R. A., & Shah, B. (2016, March). Security analysis of IoT protocols: A focus in CoAP. In 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC) (pp. 1–7). IEEE. https://doi.org/10.1109/ICBDSC.2016.7460332
- Sain, M., Kang, Y. J., & Lee, H. J. (2017, February). Survey on security in Internet of Things: State of the art and challenges. In 2017 19th International Conference on Advanced Communication Technology (ICACT) (pp. 699–704). IEEE. https://doi.org/10.23919/ICACT.2017.7890132
- Singh, G., Pandey, A., Prakash, M., Andreoni, M., & Baddeley, M. (2023). Benchmarking and security considerations of Wi-Fi FTM for ranging in IoT devices. arXiv. https://arxiv.org/abs/2303.03766
- Vashi, S., Ram, J., Modi, J., Verma, S., & Prakash, C. (2017, February). Internet of Things (IoT): A vision, architectural elements, and security issues. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 492–496). IEEE. https://doi.org/10.1109/I-SMAC.2017.8058207
- Zhang, Z. K., Cho, M. C. Y., & Shieh, S. (2015, April). Emerging security threats and countermeasures in IoT. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (pp. 1–6). https://doi.org/10.1145/2714576.2714635
- Ahmed, M. M., Shah, M. A., & Wahid, A. (2017, April). IoT security: A layered approach for attacks & defenses. In 2017 International Conference on Communication Technologies (ComTech) (pp. 104–110). IEEE. https://doi.org/10.1109/COMTECH.2017.8065759
- Alansari, Z., Anuar, N. B., Kamsin, A., Belgaum, M. R., Alshaer, J., Soomro, S., & Miraz, M. H. (2018, August). Internet of Things: Infrastructure, architecture, security and privacy. In 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE) (pp. 150–155). IEEE. https://doi.org/10.1109/iCCECE.2018.8658699
IoT security is essential to prevent data breaches, as most IoT devices lack built-in security mechanisms. These
devices often go undetected by traditional cybersecurity systems, transferring unencrypted data over the internet, which
leaves them vulnerable to attacks. IoT security refers to the measures designed to protect connected devices and systems
from unauthorized access, cyberattacks, and other security threats. This encompasses securing the devices themselves,
safeguarding data transmission, and fortifying the underlying network infrastructure. IoT security faces several challenges,
including the vast number of devices with varying security levels, the complexity of interconnected networks, and the
growing sophistication of cyber threats. This research study emphasizes the importance of enhancing IoT security. It
examines the most common communication technologies—Bluetooth, Wi-Fi, and LTE—and evaluates the safeguards
available for them, focusing specifically on Wi-Fi technology in this article. The EBIOS risk assessment method is employed
to identify potential vulnerabilities and threats within the Wi-Fi ecosystem. The ultimate objective of this work is to highlight
and mitigate security risks associated with using Wi-Fi in IoT environments. The broader goal of IoT security is to ensure
the confidentiality, integrity, and availability of data and systems while maintaining the functionality and usability of
connected devices.
Keywords :
IoT, Cyber-attack, Bluetooth, Wi-Fi, LTE, IoT Security, Data Breach, Network Infrastructure, EBIOS Technique, Vulnerability Assessment.