View Article

Abstract

The widespread adoption of smart devices has revolutionized our daily lives, transforming how we live, work, and interact with technology. However, this increased reliance on smart devices has also sparked serious concerns about data privacy and cybersecurity. As these devices become more pervasive, collecting and transmitting vast amounts of sensitive information, they create new risks and vulnerabilities for users. This study investigates the challenges and opportunities in protecting smart device users' privacy and security. The research examines the current security landscape, revealing various threats and vulnerabilities, including data breaches, unauthorized access, and malicious attacks. It also discusses the complexities of ensuring smart device security, such as IoT ecosystem intricacies, limited device capabilities, and the need for robust security protocols. The research emphasizes the importance of collaboration among stakeholders e.g., users, manufacturers, and policymakers to address smart device security challenges. By exploring the roles of these stakeholders, the study aims to contribute to the development of more effective security measures and a safer IoT ecosystem. Ultimately, this research informs the ongoing discussion on IoT security and promotes a more secure future for smart device users.

Keywords

Privacy, Smart Devices, cybersecurity, threats, vulnerabilities, encryption, secure design

Introduction

The rapid advancement of technology has led to the proliferation of smart devices, which offer promising solutions to complex challenges such as data breaches, unauthorized access, and malicious attacks [2]. Smart devices have revolutionized the way we live, work, and interact [7], providing connectivity, efficiency, and convenience [33]. However, increased connectivity also raises significant privacy and cybersecurity concerns [25]. As urbanization continues to rise, with an expected 66% of the world's population residing in cities by 2050 [45], the security and privacy implications of smart device use will become increasingly critical. Smart devices collect and transmit vast amounts of personal data, which can be vulnerable to malicious attacks, data breaches, and unauthorized access [18]; [37]. While smart device technologies offer numerous benefits, including enhanced communications [49], they also pose significant challenges and threats. These challenges include integrating diverse systems, ensuring interoperability and scalability, addressing privacy concerns, and managing threats [10]. Cybersecurity is a critical consideration in the development and operation of smart devices [22], and the intricacy and interdependence of these devices may give rise to novel vulnerabilities [16]. Despite these challenges, there are opportunities for innovation and growth in privacy and cybersecurity using the following technology AI and ML, Blockchain, cybersecurity awareness, collaboration and information sharing etc. The use of AI and ML can be used to detect and prevent cyber threats in real-time, improving the security of smart devices [47]. Overall, ensuring the security and privacy of smart devices is a critical issue that requires careful consideration of the benefits and challenges associated with these technologies. This paper discusses the cybersecurity challenges and opportunities in smart devices.

2.0 RELATED WORKS                                          

2.1 Smart Device Overview

According to [48], smart gadgets, such as smartphones, use cloud resources and sophisticated computational capabilities to enhance usefulness and performance. These gadgets are unique in their designs, features, and uses, but they are also vulnerable to serious risks like malicious attacks, illegal access, and data breaches [48]. Comprehending these elements is essential for risk reduction and guaranteeing the safe functioning of smart devices.

2.2 IOT Architecture for Smart Devices

Four levels can be identified in the design to keep up with the development of smart devices, as seen in Figure 1; the following provides a brief introduction:

a) The Device Layer

The base layer of the devices is the fundamental component of the architecture made up of smart devices that collect and transmit data, such as sensors, actuators, and microcontrollers [25]. Since this layer's primary function is to execute received instructions, it is crucial for data collection and device operation.

b) The network Layer

In IoT architecture, the network layer is essential because it makes it easier for smart devices, gateways, and the cloud or other networks to communicate with one another [1]. This layer supports real-time control and decision-making by ensuring dependable and effective data transfer.

c) Data Processing layer

The data processing and analytics layer leverages cloud-based services, edge computing, or fog computing to analyze and provide insights from collected data [26]. This layer's primary function is to store, process, and analyze data, facilitating device control and informed decision-making.

d) The Application layer, provides users with personalized services based on their needs, leveraging data and insights to deliver value [26]. It includes user interfaces, applications, and services that utilize data analysis to create tailored experiences.

IoT-based Architecture for Smart Devices

2.3 Applications 

Smart devices are utilized in various domains, including home automation, remote control, data collection, and security enhancement [1; 25]. By leveraging interconnected devices, these applications automate tasks, monitor environments, and increase efficiency and convenience.

a) Smart home Automation, controls and monitors home appliances, lighting, and security systems remotely [41]. Smart home ensures adequate security to prevent theft or any domestic threats against life and property.

b) Health Monitoring, Smart devices are used for tracking vital signs, activities level, and providing alerts for medical emergencies at home [8].

c) Industrial Automation, here, smart devices are used for optimizing industrial processes, predictive maintenance, and quality control [34].

d) Smart Cities, Smart devices are applied in managing traffic, waste management, and energy efficiency in smart cities [21].

e) Wearable Deices, are parts of smart devices, used for tracking fitness, and health metrics, and providing personalized recommendations [16].

2.4 Characteristics of Smart Devices

Understanding the distinctions between smart and traditional applications is crucial [25]. When developing cybersecurity or privacy protection methods for smart devices, it's essential to consider their unique characteristics, which enable benefits like improved convenience, efficiency, and health monitoring, see figure 2.

1) Interconnectivity

Communication, data interchange, and remote control are made easier by smart devices' ability to connect to the internet or other devices [7]. Smart gadgets may integrate and cooperate with other devices, systems, and networks thanks to this connectivity.

2) Perception and Motion

In order to perceive and interact with their environment, smart gadgets usually include sensors and actuators [40]. Smart devices can sense and comprehend contextual information, user behaviour, and environmental elements thanks to this feature.

3) Computation and Processing

Because of their processing power, smart devices can assess data, make decisions, and complete tasks independently [25].

4) Data Management and Storage

User data and sensor readings are among the many kinds of data that smart devices can collect and handle [18].

5) Privacy and Security

Strong security and privacy measures are necessary for smart devices in order to protect user data and stop illegal access [26].

6) Independence and Automation

Without human input, smart devices are capable of making decisions and carrying out tasks on their own [37]. They carry out tasks and make decisions on their own, functioning independently.

7) Interface

According to [16], smart devices usually have user interfaces that allow users to interact with and access device features, such as voice assistants, touchscreens, or mobile apps.

8) Interoperability

According to [7], interoperability is the capacity of smart devices to interact and function in unison with other systems, apps, and devices, irrespective of their operating system, manufacturer, or technology.  This feature is essential in the Internet of Things (IoT) environment, where devices from various suppliers must communicate and share information.

2.5 Cybersecurity and privacy Risks in smart devices

Due to their interconnectedness, about 80% of smart devices are vulnerable to different types of attacks [26]. As a result, there are serious cybersecurity risks associated with conventionally safe devices like locks, lights, and appliances. Threats from hardware and software flaws include ransomware, device hijacking, identity theft, data breaches, and denial-of-service attacks.

1) Data Breach

Hackers can exploit vulnerabilities in smart devices, such as smartphones, to steal sensitive personal data, including location information, financial data, and medical records [18].

2) Identity theft and data

Kumar et al. (2019), said that unprotected wearables and smart devices can produce data that hackers can use to steal identities and conduct fraudulent transactions by obtaining specific personal information.

3) Device Theft

Since the device's fundamental functionality is unaltered, device hijacking is the process by which an attacker takes over a device, frequently undetected [40]. It is possible to gain access to and control over other linked devices, like door locks, by using a compromised device, such as a thermostat. It is difficult to detect when an attacker takes over a device by hijacking it and changing its fundamental operations. Malicious operations like remote door unlocking and PIN code changes are made possible by a compromised device, such as a thermostat, which can grant access to the entire network.
Malware that encrypts data and requests payment to decrypt it is known as ransomware [25]. Ransomware, like LockerPin and Simplocker, can infect smart devices like smartphones and tablets.

4) The denial-of-service threat

According to [1], a denial-of-service (DoS) attack renders a computer or network unavailable to users. Several sources of traffic flood the target in a distributed denial-of-service (DDoS) attack.

Figure 3: Threats to Privacy and Cybersecurity in Smart devices

5) Restricted Processing Power,

According to [12], the limited computational resources of smart devices, such as processing power, memory, and energy, make it difficult to implement robust security. A major obstacle to guaranteeing cybersecurity and privacy in smart devices is this limitation. According to [8], interoperability problems can arise due to the variety of smart devices and platforms, making secure communication more difficult. The use of disparate protocols and standards by various manufacturers frequently impedes smooth communication and security [7]

2.6 Privacy and Cybersecurity Concerns with Smart Devices

 Because smart devices can connect to the internet and gather personal data, cybersecurity and privacy concerns are major issues. These gadgets, which include wearables, smart speakers, and home security systems, are susceptible to exploitation and hacking.

1). Unprotected wireless networks, because they depend on Wi-Fi networks, smart devices—including wearables, smart home appliances, and Internet of Things devices are susceptible to cybersecurity threats [3]. As demonstrated by KRACK and Wi-Fi eavesdropping attacks, devices connected to insecure Wi-Fi networks are susceptible to hacking and exploitation [46]. Wi-Fi network security is essential for safeguarding smart devices.

2). Data collection and exploitation: Due to the extensive use of smart devices, a significant amount of sensitive and personal data has been gathered [6];[13]. Significant cybersecurity and privacy risks, such as identity theft, unauthorized sharing, and data breaches, are associated with this data collection [42];[]. Malicious actors may take advantage of the various data types that smart devices collect, such as location, usage, biometric, and personal information [5].

3). Device Vulnerabilities: As smart devices become more widely used, serious cybersecurity and privacy issues have been brought to light [3]. Malicious actors may take advantage of the software, hardware, and communication flaws in these devices [24]. Notable attacks like KRACK and the Mirai Botnet emphasize how critical it is to fix these flaws [24]. Users and manufacturers must work together to avoid cybersecurity and privacy problems.

3.0 Opportunities

3.1 Cybersecurity and Privacy Protection technology in Smart Devices

This section provides important information about emerging and existing technologies that address privacy and security risks in smart devices. The technical examples used from the viewpoints of various disciplines are displayed in Table 2. In the connected world of today, modern cybersecurity and privacy protection technologies for smart devices are essential. As shown in Figure 4 below, privacy protection technologies include things like encryption, multi-factor authentication, transport layer security (TLS), virtual private networks (VPNs), regular security updates, network segmentation, artificial intelligence (AI), and machine learning (ML), and more.

Figure 4: Current Privacy and Cybersecurity Protection Technology

A. Artificial Intelligence and Machine Learning

AI and ML can be used to detect and respond to security threats in smart devices [40]. For example, AI-powered intrusion detection systems can identify patterns of malicious activity and alert users to potential threats. Additionally, ML algorithms can be used to predict and prevent cyberattacks [25] analyzing and preventing cyberattacks.

B. Encryption

Implementing encryption techniques can protect data transmitted by smart devices [25]. For example, end-to-end encryption can ensure that data is protected from unauthorized access. Encryption can also involve using secure communication protocols, such as HTTPS and TLS [11].

C. Multi-Factor Authentication (MFA)

MFA is a security process that requires users to provide two or more authentication factors to access a device or system, it adds additional layer of security, making it more difficult for attackers to gain unauthorized access. MFA reduces the risk of unauthorized access, improves security posture, and protects against phishing and password attacks. Examples: Google Authenticator, Microsoft Authenticator, and biometric authentication (e.g., Face ID, Touch ID).

D.  Transport Layer Security (TLS)

TLS is a cryptographic protocol that provides secure communication between devices and servers over the internet. It ensures the confidentiality, integrity, and authenticity of data in transit. TLS Protects against eavesdropping, tampering, and man-in-the-middle attacks. For examples, HTTPS, SSL/TLS certificates, and secure communication protocols (e.g., FTPS, SMTPS).

E. Virtual Private Networks (VPNs)

VPNs create a secure, encrypted connection between devices and servers over the internet. This protects data in transit and masks IP addresses, ensuring anonymity and security. VPNs protect against eavesdropping, IP spoofing, and man-in-the-middle attacks. For example: OpenVPN, Wire Guard, and commercial VPN services (e.g., ExpressVPN, NordVPN).

F. Regular Security Updates

Regular security updates involve patching vulnerabilities and fixing security flaws in device software and firmware. This ensures that devices remain secure and protected against known threats. RSU Fixes security vulnerabilities, improves device stability, and enhances overall security posture. For examples, Operating system updates (e.g., Windows Update, macOS Update), firmware updates for IoT devices.

G. Network Segmentation

Network segmentation involves dividing a network into smaller, isolated segments or sub-networks. This limits the spread of malware and unauthorized access, improving overall network security. RSU reduces the attack surface, limits lateral movement, and improves incident response. For examples, VLANs (Virtual Local Area Networks), sub-networking, and network isolation.

H. Activity Logging

Activity logging involves recording and monitoring device and system activity to detect and respond to

security incidents. Activity logging helps detect security incidents, improves incident response, and provides valuable insights for security analysis.

Cybersecurity and Privacy Protection Technology

Table 2: Example of Privacy and Cybersecurity Protection Methods in Smart Devices

I. Device Management

Device management involves monitoring, controlling, and securing devices across an organization or network. It improves device security, ensures compliance, and reduces the risk of data breaches. – Examples are Mobile device management (MDM) solutions, endpoint management systems, and IoT device management platforms. By implementing these protection technologies, organizations and individuals can significantly enhance the security and privacy of their devices and data.

4.0 Challenges and Future Directions.

The growing use of smart devices has heightened concerns about privacy and cybersecurity, making it essential to protect users' sensitive information and prevent threats [18]. Ensuring device security and privacy poses significant challenges as stated below, see Figure 5:

1) Data Privacy, Smart devices gather and transmit large amounts of personal data, sparking concerns about data privacy and security [38]. Protecting this data poses a significant challenge [19]. Vulnerabilities in smart devices can lead to unauthorized access and compromised data privacy [26], while data sharing further exacerbates privacy and security concerns [37].

2) Security Vulnerabilities, Smart devices face security threats like malware, phishing, and unauthorized access due to vulnerabilities [18]. These vulnerabilities can be exploited to access sensitive information, disrupt functionality, or control devices. Common vulnerabilities include buffer overflow, SQL injection, and cross-site scripting (XSS) [21]. Insecure design, outdated software, and weak passwords contribute to these vulnerabilities [25].

3) Limited Computational Resources, Smart devices' limited computational resources, including processing power, memory, and energy, hinder robust security implementation [12]. This constraint poses a significant challenge to ensuring privacy and cybersecurity in smart devices.

4) Interoperability: The diversity of smart devices and platforms can lead to interoperability issues, complicating secure communication [8]. Different manufacturers' devices often employ varying protocols and standards, hindering seamless interaction and security [7].

Figure 5: Challenges in ensuring privacy and    cybersecurity in smart devices

5.0 Future directions for smart devices

We have discussed current cybersecurity and privacy protection for smart devices. Many novel countermeasures have recently been proposed in various fields. According to the updated threats and cybersecurity requirements, it is reasonable to conclude that more effective protection methods must be developed to keep pace with the rapid growth of smart devices. Below are the promising opportunities and research directions based on our investigation.

A. Advancements in Authentication and Identity Management: Developing more secure and efficient authentication mechanisms for IoT devices is essential for protecting user data and preventing unauthorized access.

B. Improved Interoperability: Future research should focus on developing standards and protocols that enable seamless communication between devices from different manufacturers.

C. Enhanced Security: Developing more robust security protocols and measures to protect smart devices from cyber threats is crucial for ensuring user trust and safety.

D. Artificial Intelligence and Machine Learning Integration: Integrating AI and ML with smart devices can enhance their functionality, efficiency, and decision-making capabilities.

E. Data Minimization Towards Smart Applications:  The task of data minimization is of two-fold. One is to minimize the amount of data collected, used, and stored by IoT applications, which requires not only technical guarantees but also reinforcements from related governance and politics

By addressing these challenges and pursuing these future directions, smart devices can become more secure, efficient, and user-friendly, leading to widespread adoption and innovation in various industries.

CONCLUSION

In this study, we conclude that the widespread adoption of smart devices has led to significant cybersecurity and privacy concerns, highlighting the need for advanced protection models and frameworks that are in high demand across industries and academia. In response, we examined recent advancements in countermeasures from diverse perspectives, identified opportunities for innovation, and discussed current challenges to inform future research. While various protection mechanisms and strategies have been developed, the rapidly evolving nature of smart applications means that addressing security requirements remains a pressing concern. Nevertheless, these challenges also present opportunities for growth, innovation, and collaboration. Looking ahead, it's likely that mitigating these challenges and capitalizing on emerging opportunities will be a key focus area for smart device research in the coming years.

CONFLICT OF INTEREST DISCLOSURE

REFERENCE

  1. Al-Fuqaha A, Mohsen G, Mehdi M, Mohammed A., and Moussa A. (2015). Internet of Things: A Survey on Enabling Technologies, Protocols, And Applications. IEEE Communications Surveys & Tutorials of    Surveys & Tutorials of Threats, Vulnerabilities and Countermeasures Journal of Information Science and Engineering.17(4), 2347-237.          
  2. Al-Garadi, M.A., Mohammed, A., Al-Ali, A., Du, X., & Guisani, M. (2020). A Survey on IoT Security: Threats, Attacks and Countermeasures. IEEE Communications Surveys & Tutorials 22(2), 1076-1104.
  3. Al-Gburi, A. H. A., Nadeem, F., & Abbas, S. G. (2021). Wi-Fi Network Security: A Survey of Wi-Fi Security Threats and Countermeasures. Journal of Computer Science, 17(3), 344-357.
  4.  Al-Gburi, A. H. A., Nadeem, F., Abbas, S. G., & Khan, M. A. (2021). A Survey on Security Issues in IoT Networks. Journal of King Saud University-Computer and Information Sciences.
  5. Alrawi, O., Lever, C., Antonakakis, M., & Monrose, F. (2019). IoTGuard: Dynamic enforcement of security and safety policies in the Internet of Things. Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS).
  6. Apthorpe, N., Reisman, D., & Feamster, N. (2018). Smart home device privacy risk assessment. Proceedings of the 2018 Workshop on IoT Security and Privacy (IoT S&P '18). and Privacy.
  7. Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787-2805.
  8. Bandyopadhyay, D., & Sen, J. (2011) A Survey on the Current State of the Art in Smart Devices and Technologies. International Journal of Advanced Research in Computer Science, 2(3), 455-463.9. 13.9
  9. Bandyopadhyay, D., & Sen, J. (2011). Internet of Internet of Things. IEEE Access, 4, 2292-2303.
  10. Dorri, A., et al. (2017). Blockchain for IoT security and privacy: The case study of a smart home. IEEE Pervasive Computing, 16(4), 40-48.
  11. Elvira I., Hughes L., Nripendra P., Rana 1 & Dwivedi Y. K. (2020). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework Networks. Information Systems Frontiers (2022) 24:393–414 DOI/10.1007/s10796-020-10044-1
  12. Elomair, L. (2014). A survey on security issues and solutions in Internet of Things. International Journal of Distributed Sensor Networks. Security Symposium.
  13. Fernandes, E., Paupore J., & Rahmati A. (2016). FlowFence: Practical data Protection on the Internet of Things. Proceedings of the 25th USENIX Security Symposium.
  14. Fernandes, E., Paupore J., & Rahmati A. (2016). FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. Proceedings of the 25th USENIX Security Symposium.
  15. Furnell, S. (2008). An assessment of the end-user security awareness problem in information Systems. International Journal of Information Security, 7(2), 97-110.
  16. Furnell, S. (2008). End-user security culture: A lesson in diversity. Computer Fraud & Security, 16(7), 6-9,
  17. Jain, A. K., Nandakumar, K., & Ross, A. (2016) 50 years of biometric research: Accomplishment, Challenges, and Opportunities. Pattern Recognition Letters, 79, 80-105.
  18. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security in the Internet of Things: A Survey. IEEE Communications Surveys & Tutorials, 16(4), 2024-2044.2
  19. Jing, Q., Liu, A., Cao, Y., & Liu, Y. (2014). Security in the Internet of Things: A Review. Computer Science Review, 11-12, 37-49.
  20. Katz, D. L., & Toumi, K. (2016). IoT Networking: Survey of Protocols and Architectures. IEEE Communications Magazine, 54(12), 122-128.
  21. Kerschbaum F., Schneider T., & Schrofer A (2014). Automatic Protocol Selection in Secure Two-Party Computations Cryptography and Network Security (ACNS,). DOI:10.1007/978-3-319-07536 5_33
  22. Khezr, S., & Navimipour, N. J. (2019). A Survey on IoT Security: Threats, Vulnerabilities, and Solutions. Journal of Network and Computer Applications. 22(126) 102-114.
  23. Kim, L. Hübner, U.H., Mustata Wilson, G., Morawski, T.S. and Ball, M.J., Eds., (2022) Cybersecurity: Ensuring Confidentiality, Integrity, and Availability of Information. In: Nursing Informatics. Health Informatics, Springer, Cham, 391-410. DOI/10.1007/978-3-030-91237-6_26
  24. Kolias, C., Kambourakis G., & Stavrou A. (2017). DDoS in the IoT: Mirai and Other Botnets. Computer, 50(7), 80-84.
  25. Kumar, P. (2019). Vulnerabilities in IoT Devices: A Survey. Journal of    Network and Computer Applications.
  26. Kumar, P (2019). Security and privacy issues in IoT devices. Journal of Network and Computer Applications, 126, 102-114.
  27. Li, S.  (2018). A Survey on IoT Communication Protocols and Architectures. IEEE Access, 6, 39611- 39625.
  28. Mainetti, L., Patrono L, & Vilei A.(2011). Evolution of Wireless Sensor Networks towards the Internet of Things: A Survey. IEEE Communications. Surveys & Tutorials, 13(4), 661-675.
  29. Mekki, K., Bojic E., Chaxel F & Meyer F. (2019). A Comparative Study of LPWAN Technologies for IoT Applications. IEEE Communications Surveys & Tutorials, 21(1), 555-574.
  30. Miorandi, D., Sicari S., Pellegrini F. & Chlamtac I. (2012). Internet of Things: Vision, Applications and Research Challenges. Ad Hoc Networks, 10(7), 1497-1516.
  31. Rescorla, E. (2006). The Transport Layer Security (TLS) Protocol Version 1.2 RFC5246
  32. Roman, R., Najera, P., & Lopez, J. (2013). Features, challenges, and issues in modeling and analyzing IoT-based systems. Journal of Systems and Software, 86(8), 2024-2034.31.
  33. Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57(10), 2266-2279.
  34. SANS Institute. (2020). IoT Security: Best Practices for Securing IoT Devices. SANS Whitepaper. Computer Applications, 126, 102-114.
  35. Saunders D. P., Perray R., Barcelo, R., Schreiber M.E., Yuen D., Sorenson, D. (2025). Data Privacy and Cybersecurity Developments. We Are Watching in 2025. McDermott Will & Emery mwe.com
  36. Sicari, S., Rizzardi A., Grieco L.A. & Coen-Parisini A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks ScienceDirect 76, 146-164. Doi./10.1016/j.comnet.2014.11.008
  37. Sicari, S. (2015). Security, privacy, and trust in Internet of Things. Computer Networks, 76, 146-164
  38. Sisinni, E., Saifullah A., Han S., Jennehag U., & Gidlund M. (2018). Industrial Internet of Things: Challenges, Opportunities, and Directions. IEEE Transactions on Industrial Informatics, 14(11), 4724-4734.Q
  39. Sivaraman, V., Gharakheili, H. H., Fernandes, C., Clark, N., & Karliychuk, T. (2018). Smart home security: A survey of threats and countermeasures. IEEE Communications Surveys & Tutorials, 20(2), 1113-1134.
  40. Sivaraman, V., & Chan, D. (2018). Smart Homes: An Examination of the Potential Impact on Privacy. IEEE Security & Privacy, 16(3), 55.
  41. Spafford, E. H. (2000). The Internet worm: Crisis and aftermath. Communications of the ACM, 43(7)39.
  42. Tzori, L., Iera A., & Morabito   G.  (2010). The Internet of Things: A Survey. Computer Networks, 54(15), 2787-2805.
  43.  United Nations. (2014). World Urbanization Prospects.
  44. United Nations, “World urbanization prospects: The 2014 revision, highlights. Department of Economic and social affairs,” Population Division, United Nations, 2014.
  45. Ur, B., et al. (2016). Smart thermostat data leak investigation. Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.
  46. Vanhoef, M., & Piessens, F. (2017). Key Reinstallation Attacks: Forcing Nonce Reuse In WPA2. Proceedings of the 2017 ACM SIGSA Conference on Computer and Communication Security Computer.
  47. X. T. Feng, X. G. Zhu, Q.-L. Han, W. Zhou, S. Wen, & Y. Xiang, 2023.  “Detecting vulnerability on IoT device firmware: A survey,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, 25–41. DOI:  10.1109/JAS.2022.105860
  48. Yoon M., Kim H., Jang M., & Chang J. 2016. A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing. International Journal of Data Warehousing and Mining ch 084. DOI:10.4018/978-1.-4666-9845.

Reference

  1. Al-Fuqaha A, Mohsen G, Mehdi M, Mohammed A., and Moussa A. (2015). Internet of Things: A Survey on Enabling Technologies, Protocols, And Applications. IEEE Communications Surveys & Tutorials of    Surveys & Tutorials of Threats, Vulnerabilities and Countermeasures Journal of Information Science and Engineering.17(4), 2347-237.          
  2. Al-Garadi, M.A., Mohammed, A., Al-Ali, A., Du, X., & Guisani, M. (2020). A Survey on IoT Security: Threats, Attacks and Countermeasures. IEEE Communications Surveys & Tutorials 22(2), 1076-1104.
  3. Al-Gburi, A. H. A., Nadeem, F., & Abbas, S. G. (2021). Wi-Fi Network Security: A Survey of Wi-Fi Security Threats and Countermeasures. Journal of Computer Science, 17(3), 344-357.
  4.  Al-Gburi, A. H. A., Nadeem, F., Abbas, S. G., & Khan, M. A. (2021). A Survey on Security Issues in IoT Networks. Journal of King Saud University-Computer and Information Sciences.
  5. Alrawi, O., Lever, C., Antonakakis, M., & Monrose, F. (2019). IoTGuard: Dynamic enforcement of security and safety policies in the Internet of Things. Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS).
  6. Apthorpe, N., Reisman, D., & Feamster, N. (2018). Smart home device privacy risk assessment. Proceedings of the 2018 Workshop on IoT Security and Privacy (IoT S&P '18). and Privacy.
  7. Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787-2805.
  8. Bandyopadhyay, D., & Sen, J. (2011) A Survey on the Current State of the Art in Smart Devices and Technologies. International Journal of Advanced Research in Computer Science, 2(3), 455-463.9. 13.9
  9. Bandyopadhyay, D., & Sen, J. (2011). Internet of Internet of Things. IEEE Access, 4, 2292-2303.
  10. Dorri, A., et al. (2017). Blockchain for IoT security and privacy: The case study of a smart home. IEEE Pervasive Computing, 16(4), 40-48.
  11. Elvira I., Hughes L., Nripendra P., Rana 1 & Dwivedi Y. K. (2020). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework Networks. Information Systems Frontiers (2022) 24:393–414 DOI/10.1007/s10796-020-10044-1
  12. Elomair, L. (2014). A survey on security issues and solutions in Internet of Things. International Journal of Distributed Sensor Networks. Security Symposium.
  13. Fernandes, E., Paupore J., & Rahmati A. (2016). FlowFence: Practical data Protection on the Internet of Things. Proceedings of the 25th USENIX Security Symposium.
  14. Fernandes, E., Paupore J., & Rahmati A. (2016). FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. Proceedings of the 25th USENIX Security Symposium.
  15. Furnell, S. (2008). An assessment of the end-user security awareness problem in information Systems. International Journal of Information Security, 7(2), 97-110.
  16. Furnell, S. (2008). End-user security culture: A lesson in diversity. Computer Fraud & Security, 16(7), 6-9,
  17. Jain, A. K., Nandakumar, K., & Ross, A. (2016) 50 years of biometric research: Accomplishment, Challenges, and Opportunities. Pattern Recognition Letters, 79, 80-105.
  18. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security in the Internet of Things: A Survey. IEEE Communications Surveys & Tutorials, 16(4), 2024-2044.2
  19. Jing, Q., Liu, A., Cao, Y., & Liu, Y. (2014). Security in the Internet of Things: A Review. Computer Science Review, 11-12, 37-49.
  20. Katz, D. L., & Toumi, K. (2016). IoT Networking: Survey of Protocols and Architectures. IEEE Communications Magazine, 54(12), 122-128.
  21. Kerschbaum F., Schneider T., & Schrofer A (2014). Automatic Protocol Selection in Secure Two-Party Computations Cryptography and Network Security (ACNS,). DOI:10.1007/978-3-319-07536 5_33
  22. Khezr, S., & Navimipour, N. J. (2019). A Survey on IoT Security: Threats, Vulnerabilities, and Solutions. Journal of Network and Computer Applications. 22(126) 102-114.
  23. Kim, L. Hübner, U.H., Mustata Wilson, G., Morawski, T.S. and Ball, M.J., Eds., (2022) Cybersecurity: Ensuring Confidentiality, Integrity, and Availability of Information. In: Nursing Informatics. Health Informatics, Springer, Cham, 391-410. DOI/10.1007/978-3-030-91237-6_26
  24. Kolias, C., Kambourakis G., & Stavrou A. (2017). DDoS in the IoT: Mirai and Other Botnets. Computer, 50(7), 80-84.
  25. Kumar, P. (2019). Vulnerabilities in IoT Devices: A Survey. Journal of    Network and Computer Applications.
  26. Kumar, P (2019). Security and privacy issues in IoT devices. Journal of Network and Computer Applications, 126, 102-114.
  27. Li, S.  (2018). A Survey on IoT Communication Protocols and Architectures. IEEE Access, 6, 39611- 39625.
  28. Mainetti, L., Patrono L, & Vilei A.(2011). Evolution of Wireless Sensor Networks towards the Internet of Things: A Survey. IEEE Communications. Surveys & Tutorials, 13(4), 661-675.
  29. Mekki, K., Bojic E., Chaxel F & Meyer F. (2019). A Comparative Study of LPWAN Technologies for IoT Applications. IEEE Communications Surveys & Tutorials, 21(1), 555-574.
  30. Miorandi, D., Sicari S., Pellegrini F. & Chlamtac I. (2012). Internet of Things: Vision, Applications and Research Challenges. Ad Hoc Networks, 10(7), 1497-1516.
  31. Rescorla, E. (2006). The Transport Layer Security (TLS) Protocol Version 1.2 RFC5246
  32. Roman, R., Najera, P., & Lopez, J. (2013). Features, challenges, and issues in modeling and analyzing IoT-based systems. Journal of Systems and Software, 86(8), 2024-2034.31.
  33. Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57(10), 2266-2279.
  34. SANS Institute. (2020). IoT Security: Best Practices for Securing IoT Devices. SANS Whitepaper. Computer Applications, 126, 102-114.
  35. Saunders D. P., Perray R., Barcelo, R., Schreiber M.E., Yuen D., Sorenson, D. (2025). Data Privacy and Cybersecurity Developments. We Are Watching in 2025. McDermott Will & Emery mwe.com
  36. Sicari, S., Rizzardi A., Grieco L.A. & Coen-Parisini A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks ScienceDirect 76, 146-164. Doi./10.1016/j.comnet.2014.11.008
  37. Sicari, S. (2015). Security, privacy, and trust in Internet of Things. Computer Networks, 76, 146-164
  38. Sisinni, E., Saifullah A., Han S., Jennehag U., & Gidlund M. (2018). Industrial Internet of Things: Challenges, Opportunities, and Directions. IEEE Transactions on Industrial Informatics, 14(11), 4724-4734.Q
  39. Sivaraman, V., Gharakheili, H. H., Fernandes, C., Clark, N., & Karliychuk, T. (2018). Smart home security: A survey of threats and countermeasures. IEEE Communications Surveys & Tutorials, 20(2), 1113-1134.
  40. Sivaraman, V., & Chan, D. (2018). Smart Homes: An Examination of the Potential Impact on Privacy. IEEE Security & Privacy, 16(3), 55.
  41. Spafford, E. H. (2000). The Internet worm: Crisis and aftermath. Communications of the ACM, 43(7)39.
  42. Tzori, L., Iera A., & Morabito   G.  (2010). The Internet of Things: A Survey. Computer Networks, 54(15), 2787-2805.
  43.  United Nations. (2014). World Urbanization Prospects.
  44. United Nations, “World urbanization prospects: The 2014 revision, highlights. Department of Economic and social affairs,” Population Division, United Nations, 2014.
  45. Ur, B., et al. (2016). Smart thermostat data leak investigation. Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.
  46. Vanhoef, M., & Piessens, F. (2017). Key Reinstallation Attacks: Forcing Nonce Reuse In WPA2. Proceedings of the 2017 ACM SIGSA Conference on Computer and Communication Security Computer.
  47. X. T. Feng, X. G. Zhu, Q.-L. Han, W. Zhou, S. Wen, & Y. Xiang, 2023.  “Detecting vulnerability on IoT device firmware: A survey,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, 25–41. DOI:  10.1109/JAS.2022.105860
  48. Yoon M., Kim H., Jang M., & Chang J. 2016. A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing. International Journal of Data Warehousing and Mining ch 084. DOI:10.4018/978-1.-4666-9845.

Photo
Oketayo Abimbola M.
Corresponding author

Computer Science Dept. National Mathematical Centre, Abuja

Photo
Nriagu’ Chukwunonso
Co-author

Computer Science Dept. National Mathematical Centre, Abuja

Photo
Oduwole Oluwakemi O.
Co-author

Computer Science Dept. National Mathematical Centre, Abuja

Oketayo Abimbola M.*, Nriagu’ Chukwunonso, Oduwole Oluwakemi O., Privacy and Cybersecurity in Smart Devices: Challenges and Opportunity, Int. J. Sci. R. Tech., 2025, 2 (6), 549-559. https://doi.org/10.5281/zenodo.15715439

More related articles
Microbial Production of Xanthan Gum Using Various ...
Ajayi Oluwatosin Itunu , Okedina Titilope, C. P. Onyemali, J. Ehi...
Particulate Matter, SO2 and NO2 Monitoring of Nand...
V. S. Shrivastava, Manohar Patil, Subhash Khairnar, Ganesh Bagul,...
Herbal Formulation and Evaluation of Buccal Patches Showing Anti-Ulcer Activity...
Shivraj Mane, Anushka Kamble, Lochan Khadke, Shweta Mhetre, ...
A Concise Review on Bioanalytical Method Development and Validation with Special...
Kajal Bansode, Pratiksha Rajguru, Kiran Ukey, Rugved Sathawane, ...
Application of Logit Regression Model to Youth Employment Rate in Abeokuta...
Adewunmi O. A., Mabosanyinje A., Ajasa A. O., Sulaimon M. O., ...
Related Articles
Study on EcoRI And HinDIII Immobilization Using Sodium Alginate and Their Restri...
Bharathi P., Madhuselvam C., Nancy M., Yadhav S. G., ...
Microbial Production of Xanthan Gum Using Various Agro Wastes and Molecular Char...
Ajayi Oluwatosin Itunu , Okedina Titilope, C. P. Onyemali, J. Ehiwuogu-Onyibe, A. D. Aina, O. A. Tho...
More related articles
Microbial Production of Xanthan Gum Using Various Agro Wastes and Molecular Char...
Ajayi Oluwatosin Itunu , Okedina Titilope, C. P. Onyemali, J. Ehiwuogu-Onyibe, A. D. Aina, O. A. Tho...
Particulate Matter, SO2 and NO2 Monitoring of Nandurbar City, Maharashtra India...
V. S. Shrivastava, Manohar Patil, Subhash Khairnar, Ganesh Bagul, Himmat Patil, Tushar Borane, Yoges...
Microbial Production of Xanthan Gum Using Various Agro Wastes and Molecular Char...
Ajayi Oluwatosin Itunu , Okedina Titilope, C. P. Onyemali, J. Ehiwuogu-Onyibe, A. D. Aina, O. A. Tho...
Particulate Matter, SO2 and NO2 Monitoring of Nandurbar City, Maharashtra India...
V. S. Shrivastava, Manohar Patil, Subhash Khairnar, Ganesh Bagul, Himmat Patil, Tushar Borane, Yoges...