Cyber-Attacks on IoT Devices: Examining Vulnerabilities and Proposing Mitigation Strategies
  • Author(s): Aidar Imashev
  • Paper ID: 1708790
  • Page: 2144-2152
  • Published Date: 02-06-2025
  • Published In: Iconic Research And Engineering Journals
  • Publisher: IRE Journals
  • e-ISSN: 2456-8880
  • Volume/Issue: Volume 8 Issue 11 May-2025
Abstract

With the rise of many IoT devices, objects, and systems in healthcare, manufacturing, transportation, and smart homes, they can be easily and smoothly connected. It is worth noting that more of these devices used in cities have made it much easier for cyber-attacks due to a lack of sufficient security, processing abilities, and standard protocols. The article highlights several issues in IoT systems, including weak security during authentication, unprotected interfaces, services using outdated code, poor encryption, and poor separation of networks. This area also examines adversaries' strategies, including DDoS attacks, inserting malware, performing side-channel attacks, eavesdropping, and operating as intermediaries. Live instances such as the Mirai botnet, Stuxnet-inspired malware, security camera hacks, and others demonstrate the actual damage and problems that attacks on IoT can bring. This study suggests using secure-by-design methods, secure encryption, regularly updated firmware, intrusion detection, and multi-layer authentication. There are also discussions about having IoT security certification and establishing international rules for the IoT industry. According to the analysis, the article argues that an active and uniform way of securing IoT devices is essential as the devices are used. IoT security should be improved to secure critical assets and key systems and protect the public in our connected world.

Keywords

Internet of Things (IoT); Cybersecurity; Vulnerability Assessment; DDoS Attacks; IoT Threat Vectors; Secure-by-Design; Firmware Exploits; Network Segmentation; Malware Injection; IoT Security Framework; Intrusion Detection; Authentication Protocols

Citations

IRE Journals:
Aidar Imashev "Cyber-Attacks on IoT Devices: Examining Vulnerabilities and Proposing Mitigation Strategies" Iconic Research And Engineering Journals Volume 8 Issue 11 2025 Page 2144-2152

IEEE:
Aidar Imashev "Cyber-Attacks on IoT Devices: Examining Vulnerabilities and Proposing Mitigation Strategies" Iconic Research And Engineering Journals, 8(11)