ISSN: A/F

Securing the Future: Cybersecurity Strategies for Safeguarding Internet of Things Devices

Abstract

The critical nature in which this study delves into enhanced cybersecurity measures for protection against more sophisticated cyber threats that victimize IoT devices is well informed by a qualitative approach to expert interviews and case studies. The paper addresses five sub-research areas, namely: the unique security challenges facing IoT, the role of encryption, the impact of user awareness, legal frameworks, and emerging trends in cybersecurity. Findings underpin the current security protocols' inadequacies, uneven deployment of encryption, and gaps in user education and regulatory enforcement. The study has pointed out the promise of AI-driven autonomous security systems and underscored the need for global cooperation and scalable solutions. Practical recommendations aim to bridge existing gaps to ensure better protection for IoT environments.

References

  1. Weber, R. H., & Studer, E. (2016). "Internet of Things: Legal perspectives." Computer Law & Security Review, 32(5), 715–728
  2. Roman, R., Najera, P., & Lopez, J. (2011). "Securing the internet of things." Computer, 44(9), 51–58
  3. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). "Security, privacy, and trust in the Internet of Things: The road ahead." Computer Networks, 76, 146–164
  4. Abomhara, M., & Køien, G. M. (2015). "Cybersecurity and the Internet of Things: Vulnerabilities, threats, intruders, and attacks." Journal of Cybersecurity, 1(1), 65–85
  5. Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). "A critical analysis on the security concerns of Internet of Things (IoT)." International Journal of Computer Applications, 111(7), 1–7
  6. Sharma, V., You, I., Pau, G., & Colman-Meixner, C. (2019). "Toward smart home IoT: Future trends and security challenges." Journal of Network and Computer Applications, 141, 102618
  7. Hassan, W. U., Bates, A., & Marino, D. F. (2019). "Tactical provenance analysis for endpoint detection and response systems." ACM Transactions on Privacy and Security, 22(4), 1–34. Park, M., & Shin, S. (2020). "AI-based cybersecurity for IoT devices: A survey." ACM Computing Surveys (CSUR), 53(6), 1–36
  8. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems, 29(7), 1645–1660
  9. Zhang, X., Yu, J., & Lin, J. (2022). "Data encryption and secure transmission in IoT environments: Challenges and prospects." IEEE Internet of Things Journal, 9(10), 7312–7326
Download PDF

How to Cite

Dr K K Lavania, (2025-03-05 19:07:15.350). Securing the Future: Cybersecurity Strategies for Safeguarding Internet of Things Devices. JANOLI International Journal of Cyber Security, Volume QlF27Gax0kgzWMWcJnBX, Issue 1.