Cybersecurity in IoT networks
By Michael Tariku and Dylan Dang
By Michael Tariku and Dylan Dang
Abstract
One way to view the Internet of Things (IoT) is as a microcosm of the wider Internet; while humans interact directly over the Internet, IoT devices (e.g., Amazon Alexa) communicate and process data autonomously, ensuring their efficiency [1]. Unfortunately, although IoT networks are user-friendly, they lack the stringent security protocols present in traditional computer networks. As such, they are susceptible to cyberattacks [2] and threats such as phishing and IP spoofing [3]. Thankfully, research has been undertaken to assess and bolster the resilience of IoT networks [5]. Some have used deep learning models [4], while others work as hackers, simulating various attack scenarios and detecting backdoors and other weaknesses in sample IoT networks. Our group will not only assume the role of these hackers, but we will also deploy strategies to enhance cybersecurity in these networks, ensuring devices and users alike are protected in the age of the World Wide Web.
Reference
[1] Balbix, ‘IoT Security Challenges and Problems’, Balbix, Jan. 24, 2020. https://www.balbix.com/insights/addressing-iot-security-challenges/
[2] E. Dritsas and M. Trigka, ‘A Survey on Cybersecurity in IoT’, Future Internet, vol. 17, no. 1, pp. 30–30, Jan. 2025, doi: https://doi.org/10.3390/fi17010030.
[3] CISA, ‘Heightened DDoS Threat Posed by Mirai and Other Botnets | CISA’, www.cisa.gov, 17 Oct. 2017. https://www.cisa.gov/news-events/alerts/2016/10/14/heightened-ddos-threat-posed-mirai-and-other-botnets
[4] M. Roopak, G. Yun Tian, and J. Chambers, ‘Deep Learning Models for Cyber Security in IoT Networks’, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Jan. 2019, doi: https://doi.org/10.1109/ccwc.2019.8666588.
[5] T. E. Staff, ‘IoT Mesh Network - 6 technologies you need to know about - TronicsZone’, TronicsZone, May 2020. https://www.tronicszone.com/blog/iot-mesh-network/.
[6] D. Javeed and U. MohammedBadamasi, ‘Man in the Middle Attacks: Analysis, Motivation and Prevention’, International Journal of Computer Networks and Communications Security, vol. 8, no. 7, pp. 52–58, Jul. 2020, doi: https://doi.org/10.47277/ijcncs/8(7)1.
[7] F. Lau, S. Rubin, M. Smith, and L. Trajković, ‘Distributed Denial of Service Attacks’. Nashville, TN, 10 Oct. 2000.
[8] ‘What is Deep Learning?’, Deep Instinct, 6 Jun. 2022. https://www.deepinstinct.com/glossary/deep-learning.
[9] C. Jones, “Warnings (& Lessons) of the 2013 Target Data Breach,” Red River, Oct. 26, 2021. https://redriver.com/security/target-data-breach Warnings (& Lessons) of the 2013 Target Data Breach [accessed: Apr. 17, 2025]
[10] Y. Lu and Li. D. Xu, ‘Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics’, IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2103-2115, Sept. 2018. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8462745
[11] “Cloudflare,” Cloudflare, 2019. https://www.cloudflare.com/learning/ddos/smurf-ddos-attack/ [accessed: Apr. 17, 2025]
[12] “Smurf DDoS attack: ❗️ How it works and how to mitigate,” www.wallarm.com. https://www.wallarm.com/what/smurf-ddos-attack [accessed: Apr. 17, 2025]
[13] Imperva, “What is a UDP Flood | DDoS Attack Glossary | Imperva,” Learning Center. https://www.imperva.com/learn/ddos/udp-flood/ [accessed: Apr. 17, 2025]
[14] “UDP flood,” IONOS Digitalguide. https://www.ionos.com/digitalguide/server/security/udp-flood/ [accessed Apr. 17, 2025]
[15] Netscout, “What is a SYN Flood Attack?,” Netscout, 2019. https://www.netscout.com/what-is-ddos/syn-flood-attacks [accessed: Apr. 17, 2025]
[16] B. Petrova, “Understanding SYN flood attack - ClouDNS Blog,” ClouDNS Blog, Oct. 12, 2023. https://www.cloudns.net/blog/understanding-syn-flood-attack/ [accessed: Apr. 17, 2025]
[17] K. Yasar, “What Is a Man-in-the-Middle Attack (MitM)? - Definition from IoTAgenda,” TechTarget, Apr. 2022. https://www.techtarget.com/iotagenda/definition/man-in-the-middle-attack-MitM [accessed: Apr. 17, 2025]