Article
Version 1
Preserved in Portico This version is not peer-reviewed
IoT Security Risk Assessment and Mitigation
Version 1
: Received: 4 September 2024 / Approved: 5 September 2024 / Online: 5 September 2024 (14:52:33 CEST)
How to cite: Olaoluwa, F.; Potter, K. IoT Security Risk Assessment and Mitigation. Preprints 2024, 2024090468. https://doi.org/10.20944/preprints202409.0468.v1 Olaoluwa, F.; Potter, K. IoT Security Risk Assessment and Mitigation. Preprints 2024, 2024090468. https://doi.org/10.20944/preprints202409.0468.v1
Abstract
The rapid proliferation of Internet of Things (IoT) devices has transformed various sectors, from smart homes to industrial systems. However, this growth has introduced significant security risks due to the increased attack surface and diverse nature of IoT devices. This paper presents a comprehensive assessment of IoT security risks and explores effective mitigation strategies. We first categorize the primary risks associated with IoT, including data breaches, device manipulation, and network vulnerabilities. Using a multi-layered approach, we analyze these risks in different contexts, such as consumer IoT, industrial IoT, and healthcare. The study then reviews existing security frameworks and protocols, highlighting their strengths and limitations. We propose a hybrid mitigation strategy combining encryption, access control, and anomaly detection to enhance IoT security. Furthermore, we discuss the role of regulatory standards and best practices in reinforcing IoT security. The findings underscore the need for a proactive and adaptive security posture to address evolving threats in the IoT landscape.
Keywords
IoT Security; Risk Assessment and Mitigation; cyberthreat; cyber technology
Subject
Computer Science and Mathematics, Other
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment