Home > Published Issues > 2024 > Volume 19, No. 2, 2024 >
JCM 2024 Vol.19(2): 78-89
Doi: 10.12720/jcm.19.2.78-89

Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies

Mostafa Raeisi-Varzaneh1, Omar Dakkak1,*, Hashem Alaidaros2, and İsa Avci1
1.Department of Computer Engineering, Karabük Universitesi, 78050 Karabük, Türkiye
2.Cybersecurity Department, Dar Al-hekma University, Saudi Arabia
Email: mostafaraeisi1991@gmail.com (M.R-V.); omardakkak@karabuk.edu.tr (O.D.); haidarous@dah.edu.sa (H.A.); isaavci@karabuk.edu.tr (I.A.)
*Corresponding author

Manuscript received January 9, 2023; revised March 1, 2023; accepted September 1, 2023; published February 10, 2024.

Abstract—As a network of objects, data, and the Internet, the Internet of Things can be characterized as a collection of interconnected devices. In the context of the Internet of Things, a thing refers to any object, such as a sensor, that forms a network and can transfer data with other devices. This interconnection of devices leads to the convergence of physical and digital domains, thereby enabling time optimization, cost reduction, and enhanced efficiency in human labor. The Internet of Things enables data exchange to monitor and control interconnected devices, manufacturers and operators. A discernible transition from non-IoT to IoT devices has been evident over the past decade. Projections indicate that by 2030, approximately 75% of all devices will be integrated into the IoT. Consequently, these devices generate a substantial influx of data, commonly called Big Data. Unlike traditional computing systems, IoT devices operate in diverse, often resource-constrained environments, making them susceptible to weak authentication, insecure communication, physical vulnerabilities, data privacy risks, DoS attacks, malware propagation, and interoperability issues. These concerns can lead to data breaches, unauthorized access, and system disruptions. Cryptography offers an efficacious means of bidirectional data transmission that can enhance the security of IoT devices and the data they transmit and store, employing authentication and key management, encryption, message integrity and authentication, and Post-Quantum cryptography. This manuscript comprehensively examines the security predicaments of the Internet of Things and illustrates the effectiveness of cryptographic methodologies in ameliorating these concerns. This research not only contributes to a comprehensive understanding of existing cryptographic techniques in IoT security but also offers a forward-looking perspective that can guide future research efforts and inform practical implementations.

Keywords—IoT security, cryptography, systematic key algorithms

Cite: Mostafa Raeisi-Varzaneh, Omar Dakkak, Hashem Alaidaros, and İsa Avci, “Internet of Things: Security, Issues, Threats, and Assessment of Different Cryptographic Technologies," Journal of Communications, vol. 19, no. 2, pp. 78-89, 2024. 

Copyright © 2024 by the authors. This is an open access article distributed under the Creative Commons Attribution License (CC BY-NC-ND 4.0), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.