Comprehensive Analysis of the Current State of Cyber Security Measures for IoT Devices

Chithik Raja Raja Mohamed Mohamed Sinnaiya, Mohamed Musallam Bakhit Al-Mahri, Devarajan Veerasamy, Sunil Thomas Karickom


A new era of connectivity has been brought about by the Internet of Things (IoT), which presents unheard-of chances for innovation in a wide range of sectors and applications. IoT device proliferation does, however, also bring with it serious cybersecurity challenges. This systematic review examines the state of cyber security risk in the Internet of Things (IoT) space today, providing a thorough analysis of the research that has already been done and the approaches that have been used to assess and mitigate these risks. We study different aspects of cyber security risk within the IoT context, such as threat modeling, risk assessment techniques, vulnerability analysis, and mitigation strategies, drawing from a wide range of peer-reviewed articles, industry reports, and white papers. Additionally, the review draws attention to the unique qualities of IoT systems—such as heterogeneity, scalability, and resource constraints—that increase the risks associated with cyber security. The current status of cyber security protocols for Internet of Things devices is thoroughly examined in this paper. This paper will examine the distinct difficulties presented by the Internet of Things environment, the security flaws that these gadgets frequently display, and the possible risks they may encounter. Furthermore, the paper will examine the diverse approaches, tools, and methods presently utilized to enhance the security of Internet of Things devices. We will also talk about the regulatory environment that oversees IoT security and the ongoing research and development initiatives aimed at improving it. In order to help direct future efforts in safeguarding our digital, interconnected world, we hope to offer a comprehensive, perceptive analysis.


Internet of Things, Cyber Security, Risk Analysis, Threat Modelling, Vulnerability Analysis, Mitigation Strategies

Full Text:



Ambarkar, S. S., & Shekokar, N. M. (2022). A comprehensive survey of existing security techniques in the IOT protocol stack. Cyber Security Threats and Challenges Facing Human Life, 57–69.

ANDRIOAIA, D.-A. (2022). Cyber Security Analysis of IOT devices transmitting data in the THINGSPEAK Platform Cloud. Journal of Engineering Studies and Research, 28(3), 29–33.

Aziz Al Kabir, M., Elmedany, W., & Sharif, M. S. (2023). Securing IOT devices against emerging security threats: Challenges and mitigation techniques. Journal of Cyber Security Technology, 1–25.

C.P, S., & B.C, M. (2021). Analysis of security issues, threats and challenges in Cyber–physical system for IOT devices. SSRN Electronic Journal.

Kelly, C., Pitropakis, N., McKeown, S., & Lambrinoudakis, C. (2020). Testing and hardening IOT devices against the Mirai botnet. 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security).

Khan, A., & Cotton, C. (2021). Detecting attacks on IOT devices using featureless 1D-CNN. 2021 IEEE International Conference on Cyber Security and Resilience (CSR).

Medwed, M., Nikov, V., Renes, J., Schneider, T., & Veshchikov, N. (2021). Cyber resilience for self-monitoring IOT devices. 2021 IEEE International Conference on Cyber Security and Resilience (CSR).

R, M., K, G., & Rao, V. V. (2021). Proactive measures to mitigate cyber security challenges in IOT based Smart Healthcare Networks. 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS).

Bandekar, A., & Javaid, A. Y. (2017). Cyber-attack mitigation and impact analysis for low-power IOT devices. 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER).

Minchev, Z., & Gaydarski, I. (2020). Cyber Risks, Threats & Security Measures Associated with Covid-19.

Omotunde, H., & Ahmed, M. (2023). A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond. Mesopotamian Journal of Cyber Security, 115–133.

Palanivel, N., Sathiyanarayanan, P., Indumathi, R., & Selvi, V. (2022). IOT health care devices for patient monitoring. Cyber Security and Operations Management for Industry 4.0, 109–123.

Rajan, C., Sharma, D., Samajdar, D. P., & Patel, J. (2020). Low power physical layer security solutions for IOT devices. Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS), 229–248.

Schmitt, A., Chasar, T., Sivagnanam, M., & Kaleem, F. (n.d.). Capability Analysis of Internet of Things (IOT) devices in botnets and implications for Cyber Security Risk Assessment Processes. 2018 ASEE Annual Conference & Exposition Proceedings.

Tabassum, A., & Lebda, W. (2019). Security Framework for IOT devices against Cyber-attacks. 6th International Conference on Computer Science, Engineering and Information Technology (CSEIT-2019).

Tuscano, A., & Joshi, S. (2023). Significance of cyber security of IOT devices in the healthcare sector. 2023 Somaiya International Conference on Technology and Information Management (SICTIM).

Wu, C.-K. (2021). A comprehensive set of security measures for IOT. Internet of Things Security, 199–245.



  • There are currently no refbacks.

Copyright (c) 2024 Chithik Raja Raja Mohamed Mohamed Sinnaiya, Mohamed Musallam Bakhit Al-Mahri, Devarajan Veerasamy, Sunil Thomas Karickom

ISSN 2233 -1859

Digital Object Identifier DOI: 10.21533/scjournal

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License