Effects of Data Breaches on Internet of Things (IoT) Devices within the Proliferation of Daily-Life Integrated Devices
Downloads
IoT has revolutionized life around us very quickly. All houses, offices, and even most of the cities in turn are a blanket or mosaic figured out by inter-woven devices keeping to each other; this shows how life was finally distracted. It is presented as a technological marvel that will make life simpler, more efficient, and connected more than it has ever been. However, beneath this gleaming surface lurks a growing threat: the widespread nature of vulnerabilities in IoT devices. The systematic review method is the basis of this study, using Google Scholar and keywords such as "IoT security and consequences", to retrieve scholarly articles pertaining between 2015 – 2023. Research articles that had strict inclusion criteria were considered to evaluate their applicability in the relationship between IoT security vulnerabilities and ordinary lives.
These consequences include from information leakage to denial-of-service attacks and unauthorized access. The risks and scale differences from economic losses to life safety hazards that threaten public security due to an intensifying interdependency of IoT applications. The repercussions impact the key segments such as health care and military applications, where more stringent security measures can be highlighted.
A. Thierer and A. Castillo, “Economic perspectives projecting the growth and economic impact of the internet of things.” George Mason University, Mercatus Center, June 15.
B. B. Rad Babak and H. A. Ahmada, “Internet of things: trends, opportunities, and challenges,” IJCSNS International Journal of Computer Science and Network Security, vol. 17, no. 7, pp. 89–95.
E. Schiller, A. Aidoo, J. Fuhrer, J. Stahl, M. Ziörjen, and B. Stiller, “Landscape of IoT security,” Computer Science Review, vol. 44. Elsevier Ireland Ltd, May 01, 2022. doi: 10.1016/j.cosrev.2022.100467.
[4] F. Meneghello, M. Calore, D. Zucchetto, M. Polese, and A. Zanella, “IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices,” IEEE Internet Things J, vol. 6, no. 5, pp. 8182–8201, Oct. 2019,
doi: 10.1109/JIOT.2019.2935189.
V. Sivaraman, H. H. Gharakheili, C. Fernandes, N. Clark, and T. Karliychuk, “Smart IoT Devices in the Home: Security and Privacy Implications,” IEEE Technology and Society Magazine, vol. 37, no. 2, pp. 71–79, Jun. 2018, doi: 10.1109/MTS.2018.2826079.
W. Zhou, Y. Jia, A. Peng, Y. Zhang, and P. Liu, “The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved,” IEEE Internet Things J, vol. 6, no. 2, pp. 1606–1616, Apr. 2019,
doi: 10.1109/JIOT.2018.2847733.
I. Butun, P. Osterberg, and H. Song, “Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures,” IEEE Communications Surveys and Tutorials, vol. 22, no. 1, pp. 616–644, Jan. 2020, doi: 10.1109/COMST.2019.2953364.
O. Arias, J. Wurm, K. Hoang, and Y. Jin, “Privacy and Security in Internet of Things and Wearable Devices,” IEEE Transactions on Multi-Scale Computing Systems, vol. 1, no. 2, pp. 99–109, Jun. 2015, doi: 10.1109/TMSCS.2015.2498605.
S. Z. Z. L. Y. Z. Q. D. S. R. & Y. J. Chen Kejun, “Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice.,” Journal of Hardware and Systems Security, vol. 2, pp. 97–110, 2018.
N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, “Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations,” IEEE Communications Surveys and Tutorials, vol. 21, no. 3, pp. 2702–2733, 2019, doi: 10.1109/COMST.2019.2910750.
Z. Ling, J. Luo, Y. Xu, C. Gao, K. Wu, and X. Fu, “Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System,” IEEE Internet Things J, vol. 4, no. 6, pp. 1899–1909, Dec. 2017, doi: 10.1109/JIOT.2017.2707465.
S. Li, T. Tryfonas, and H. Li, “The Internet of Things: a security point of view,” Internet Research, vol. 26, no. 2, pp. 337–359, Apr. 2016, doi: 10.1108/IntR-07-2014-0173.
M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical security issues of the IoT world: Present and future challenges,” IEEE Internet Things J, vol. 5, no. 4, pp. 2483–2495, 2018, doi: 10.1109/JIOT.2017.2767291.