Education, Science, Technology, Innovation and Life
Open Access
Sign In

Analysis of Security Vulnerabilities and Threats of Intelligent Devices in the Internet of Things and Countermeasures

Download as PDF

DOI: 10.23977/jeis.2024.090211 | Downloads: 5 | Views: 160

Author(s)

Kerui Liu 1

Affiliation(s)

1 Chengdu University of Technology, Chengdu, Sichuan, 610000, China

Corresponding Author

Kerui Liu

ABSTRACT

This paper aims to deeply analyze the security vulnerabilities and threats of IoT smart devices, and put forward effective countermeasures. Through systematic research and analysis, this paper first summarizes the development and popularization of IoT smart devices, and emphasizes the importance of IoT security in today's society. Then, the common types of security vulnerabilities in IoT smart devices and their causes are analyzed in detail, as well as the impact of these vulnerabilities on IoT systems. At the same time, the article also reveals the serious consequences of major IoT security vulnerabilities. After deeply discussing the threats faced by IoT smart devices, this paper puts forward a series of specific strategies and suggestions, including strengthening identity authentication and access control, regularly updating and repairing security vulnerabilities, strengthening data encryption and communication security, establishing a sound security audit and monitoring mechanism, enhancing users' security awareness and education, and calling for the support and improvement of policies and regulations. In order to provide valuable reference and suggestions for manufacturers, users and policy makers of IoT equipment, and jointly promote the safe development of IoT industry.

KEYWORDS

Internet of things; Intelligent equipment; Security vulnerabilities; Data encryption; Communication security

CITE THIS PAPER

Kerui Liu, Analysis of Security Vulnerabilities and Threats of Intelligent Devices in the Internet of Things and Countermeasures. Journal of Electronics and Information Science (2024) Vol. 9: 95-99. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2024.090211.

REFERENCES

[1] Chen Shihong, Huang Xiaoqin. Research on vulnerability detection technology of Internet of Things devices [J]. Information and Computer, 2022, 34(21):219-221.
[2] Liu Yang, Yu Zhun, Weng Changjing. Construction and Thinking of the Internet of Things Security System in Smart Hospitals [J]. Hainan Medical, 2023, 34(17):2548-2552.
[3] Lin Peiliang, Zhang Zebin. Network-level security and privacy control of intelligent security Internet of Things devices [J]. Electromechanical Engineering Technology, 2023, 52(7):252-254.
[4] Feng Chao, Chen Jiongyi, Zhang Bin. Security assessment and enhancement of remote binding process of smart home devices [J]. Information countermeasure technology, 2023, 2(3):18-34.
[5] Liu Xia, Wang Yunfu, Jiang Yuanshan, et al. Research and design of industrial Internet of Things terminal security solutions [J]. Internet of Things Technology, 2023, 13(2):102-104.
[6] He Zhijian, Zhou Jiang, Luo Yuezhi, et al. Research on intelligent monitoring of power supply safety of super high-rise building equipment based on Internet of Things technology [J]. Automation Application, 2023, 64(5):30-32.
[7] Zhan Dongyang, Yu Zhaofeng, Ye Lin, Zhang Hongli. Multi-level kernel access control method for Internet of Things device security [J]. Journal of Information Security, 2022, 7(6):116-125.
[8] Wen Xiangbin, Zheng Yuan. Algorithm Simulation for Cloud Security Credibility Detection of Internet of Things [J]. Computer Simulation, 2022, 39(5):225-228.
[9] Li Tao, Tian Yingjun, Ge Yangchen, Tian Yuan, jian li. Overview of firmware vulnerability detection in the Internet of Things [J]. Information Security Research, 2022, 8(12):1146-1155.

Downloads: 8294
Visits: 280042

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.