Preprint Article Version 1 This version is not peer-reviewed

IoT Security Risk Assessment and Mitigation

Version 1 : Received: 4 September 2024 / Approved: 5 September 2024 / Online: 5 September 2024 (14:52:33 CEST)

How to cite: Olaoluwa, F.; Potter, K. IoT Security Risk Assessment and Mitigation. Preprints 2024, 2024090468. https://doi.org/10.20944/preprints202409.0468.v1 Olaoluwa, F.; Potter, K. IoT Security Risk Assessment and Mitigation. Preprints 2024, 2024090468. https://doi.org/10.20944/preprints202409.0468.v1

Abstract

The rapid proliferation of Internet of Things (IoT) devices has transformed various sectors, from smart homes to industrial systems. However, this growth has introduced significant security risks due to the increased attack surface and diverse nature of IoT devices. This paper presents a comprehensive assessment of IoT security risks and explores effective mitigation strategies. We first categorize the primary risks associated with IoT, including data breaches, device manipulation, and network vulnerabilities. Using a multi-layered approach, we analyze these risks in different contexts, such as consumer IoT, industrial IoT, and healthcare. The study then reviews existing security frameworks and protocols, highlighting their strengths and limitations. We propose a hybrid mitigation strategy combining encryption, access control, and anomaly detection to enhance IoT security. Furthermore, we discuss the role of regulatory standards and best practices in reinforcing IoT security. The findings underscore the need for a proactive and adaptive security posture to address evolving threats in the IoT landscape.

Keywords

IoT Security; Risk Assessment and Mitigation; cyberthreat; cyber technology

Subject

Computer Science and Mathematics, Other

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.