IoT Complexity: Security, Vulnerabilities and Risks

  • Rashid M
  • Haque M
  • Wang W
N/ACitations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

IoT privacy highlights the critical significance of tailored threat models to address the evolving challenges in the IoT landscape. This research paper presents an in-depth examination of privacy threat modeling in the context of the Internet of Things (IoT), and aims to develop threat models tailored to different IoT device categories, identifying vulnerabilities and potential privacy risks associated with each. This analysis seeks to provide insights into the diverse privacy challenges posed by IoT devices, ranging from wearables to healthcare IoT and smart home, which exhibit unique vulnerabilities and privacy risks. By developing threat models specific to each device category, this research elucidates the diversity of privacy concerns, such as data breaches, unauthorized access, and data tracking the applicability of privacy regulations varies across these categories, emphasizing the need for tailored regulatory frameworks. The research underscores the importance of user education and responsible device design, advocating for privacy literacy and transparency, as it ensures that privacy is an integral part of the development process, fostering a safer, more secure, and privacy-conscious IoT ecosystem where innovation and privacy coexist for the benefit of all.

Cite

CITATION STYLE

APA

Rashid, M., Haque, Md. M., & Wang, W. (2024). IoT Complexity: Security, Vulnerabilities and Risks. European Journal of Electrical Engineering and Computer Science, 8(1), 1–9. https://doi.org/10.24018/ejece.2024.8.1.597

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free