View Article

Abstract

The widespread adoption of smart devices has revolutionized our daily lives, transforming how we live, work, and interact with technology. However, this increased reliance on smart devices has also sparked serious concerns about data privacy and cybersecurity. As these devices become more pervasive, collecting and transmitting vast amounts of sensitive information, they create new risks and vulnerabilities for users. This study investigates the challenges and opportunities in protecting smart device users' privacy and security. The research examines the current security landscape, revealing various threats and vulnerabilities, including data breaches, unauthorized access, and malicious attacks. It also discusses the complexities of ensuring smart device security, such as IoT ecosystem intricacies, limited device capabilities, and the need for robust security protocols. The research emphasizes the importance of collaboration among stakeholders e.g., users, manufacturers, and policymakers to address smart device security challenges. By exploring the roles of these stakeholders, the study aims to contribute to the development of more effective security measures and a safer IoT ecosystem. Ultimately, this research informs the ongoing discussion on IoT security and promotes a more secure future for smart device users.

Keywords

Privacy, Smart Devices, cybersecurity, threats, vulnerabilities, encryption, secure design

Introduction

The rapid advancement of technology has led to the proliferation of smart devices, which offer promising solutions to complex challenges such as data breaches, unauthorized access, and malicious attacks [2]. Smart devices have revolutionized the way we live, work, and interact [7], providing connectivity, efficiency, and convenience [33]. However, increased connectivity also raises significant privacy and cybersecurity concerns [25]. As urbanization continues to rise, with an expected 66% of the world's population residing in cities by 2050 [45], the security and privacy implications of smart device use will become increasingly critical. Smart devices collect and transmit vast amounts of personal data, which can be vulnerable to malicious attacks, data breaches, and unauthorized access [18]; [37]. While smart device technologies offer numerous benefits, including enhanced communications [49], they also pose significant challenges and threats. These challenges include integrating diverse systems, ensuring interoperability and scalability, addressing privacy concerns, and managing threats [10]. Cybersecurity is a critical consideration in the development and operation of smart devices [22], and the intricacy and interdependence of these devices may give rise to novel vulnerabilities [16]. Despite these challenges, there are opportunities for innovation and growth in privacy and cybersecurity using the following technology AI and ML, Blockchain, cybersecurity awareness, collaboration and information sharing etc. The use of AI and ML can be used to detect and prevent cyber threats in real-time, improving the security of smart devices [47]. Overall, ensuring the security and privacy of smart devices is a critical issue that requires careful consideration of the benefits and challenges associated with these technologies. This paper discusses the cybersecurity challenges and opportunities in smart devices.

2.0 RELATED WORKS                                          

2.1 Smart Device Overview

According to [48], smart gadgets, such as smartphones, use cloud resources and sophisticated computational capabilities to enhance usefulness and performance. These gadgets are unique in their designs, features, and uses, but they are also vulnerable to serious risks like malicious attacks, illegal access, and data breaches [48]. Comprehending these elements is essential for risk reduction and guaranteeing the safe functioning of smart devices.

2.2 IOT Architecture for Smart Devices

Four levels can be identified in the design to keep up with the development of smart devices, as seen in Figure 1; the following provides a brief introduction:

a) The Device Layer

The base layer of the devices is the fundamental component of the architecture made up of smart devices that collect and transmit data, such as sensors, actuators, and microcontrollers [25]. Since this layer's primary function is to execute received instructions, it is crucial for data collection and device operation.

b) The network Layer

In IoT architecture, the network layer is essential because it makes it easier for smart devices, gateways, and the cloud or other networks to communicate with one another [1]. This layer supports real-time control and decision-making by ensuring dependable and effective data transfer.

c) Data Processing layer

The data processing and analytics layer leverages cloud-based services, edge computing, or fog computing to analyze and provide insights from collected data [26]. This layer's primary function is to store, process, and analyze data, facilitating device control and informed decision-making.

d) The Application layer, provides users with personalized services based on their needs, leveraging data and insights to deliver value [26]. It includes user interfaces, applications, and services that utilize data analysis to create tailored experiences.

IoT-based Architecture for Smart Devices

Reference

  1. Al-Fuqaha A, Mohsen G, Mehdi M, Mohammed A., and Moussa A. (2015). Internet of Things: A Survey on Enabling Technologies, Protocols, And Applications. IEEE Communications Surveys & Tutorials of    Surveys & Tutorials of Threats, Vulnerabilities and Countermeasures Journal of Information Science and Engineering.17(4), 2347-237.          
  2. Al-Garadi, M.A., Mohammed, A., Al-Ali, A., Du, X., & Guisani, M. (2020). A Survey on IoT Security: Threats, Attacks and Countermeasures. IEEE Communications Surveys & Tutorials 22(2), 1076-1104.
  3. Al-Gburi, A. H. A., Nadeem, F., & Abbas, S. G. (2021). Wi-Fi Network Security: A Survey of Wi-Fi Security Threats and Countermeasures. Journal of Computer Science, 17(3), 344-357.
  4.  Al-Gburi, A. H. A., Nadeem, F., Abbas, S. G., & Khan, M. A. (2021). A Survey on Security Issues in IoT Networks. Journal of King Saud University-Computer and Information Sciences.
  5. Alrawi, O., Lever, C., Antonakakis, M., & Monrose, F. (2019). IoTGuard: Dynamic enforcement of security and safety policies in the Internet of Things. Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS).
  6. Apthorpe, N., Reisman, D., & Feamster, N. (2018). Smart home device privacy risk assessment. Proceedings of the 2018 Workshop on IoT Security and Privacy (IoT S&P '18). and Privacy.
  7. Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787-2805.
  8. Bandyopadhyay, D., & Sen, J. (2011) A Survey on the Current State of the Art in Smart Devices and Technologies. International Journal of Advanced Research in Computer Science, 2(3), 455-463.9. 13.9
  9. Bandyopadhyay, D., & Sen, J. (2011). Internet of Internet of Things. IEEE Access, 4, 2292-2303.
  10. Dorri, A., et al. (2017). Blockchain for IoT security and privacy: The case study of a smart home. IEEE Pervasive Computing, 16(4), 40-48.
  11. Elvira I., Hughes L., Nripendra P., Rana 1 & Dwivedi Y. K. (2020). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework Networks. Information Systems Frontiers (2022) 24:393–414 DOI/10.1007/s10796-020-10044-1
  12. Elomair, L. (2014). A survey on security issues and solutions in Internet of Things. International Journal of Distributed Sensor Networks. Security Symposium.
  13. Fernandes, E., Paupore J., & Rahmati A. (2016). FlowFence: Practical data Protection on the Internet of Things. Proceedings of the 25th USENIX Security Symposium.
  14. Fernandes, E., Paupore J., & Rahmati A. (2016). FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. Proceedings of the 25th USENIX Security Symposium.
  15. Furnell, S. (2008). An assessment of the end-user security awareness problem in information Systems. International Journal of Information Security, 7(2), 97-110.
  16. Furnell, S. (2008). End-user security culture: A lesson in diversity. Computer Fraud & Security, 16(7), 6-9,
  17. Jain, A. K., Nandakumar, K., & Ross, A. (2016) 50 years of biometric research: Accomplishment, Challenges, and Opportunities. Pattern Recognition Letters, 79, 80-105.
  18. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security in the Internet of Things: A Survey. IEEE Communications Surveys & Tutorials, 16(4), 2024-2044.2
  19. Jing, Q., Liu, A., Cao, Y., & Liu, Y. (2014). Security in the Internet of Things: A Review. Computer Science Review, 11-12, 37-49.
  20. Katz, D. L., & Toumi, K. (2016). IoT Networking: Survey of Protocols and Architectures. IEEE Communications Magazine, 54(12), 122-128.
  21. Kerschbaum F., Schneider T., & Schrofer A (2014). Automatic Protocol Selection in Secure Two-Party Computations Cryptography and Network Security (ACNS,). DOI:10.1007/978-3-319-07536 5_33
  22. Khezr, S., & Navimipour, N. J. (2019). A Survey on IoT Security: Threats, Vulnerabilities, and Solutions. Journal of Network and Computer Applications. 22(126) 102-114.
  23. Kim, L. Hübner, U.H., Mustata Wilson, G., Morawski, T.S. and Ball, M.J., Eds., (2022) Cybersecurity: Ensuring Confidentiality, Integrity, and Availability of Information. In: Nursing Informatics. Health Informatics, Springer, Cham, 391-410. DOI/10.1007/978-3-030-91237-6_26
  24. Kolias, C., Kambourakis G., & Stavrou A. (2017). DDoS in the IoT: Mirai and Other Botnets. Computer, 50(7), 80-84.
  25. Kumar, P. (2019). Vulnerabilities in IoT Devices: A Survey. Journal of    Network and Computer Applications.
  26. Kumar, P (2019). Security and privacy issues in IoT devices. Journal of Network and Computer Applications, 126, 102-114.
  27. Li, S.  (2018). A Survey on IoT Communication Protocols and Architectures. IEEE Access, 6, 39611- 39625.
  28. Mainetti, L., Patrono L, & Vilei A.(2011). Evolution of Wireless Sensor Networks towards the Internet of Things: A Survey. IEEE Communications. Surveys & Tutorials, 13(4), 661-675.
  29. Mekki, K., Bojic E., Chaxel F & Meyer F. (2019). A Comparative Study of LPWAN Technologies for IoT Applications. IEEE Communications Surveys & Tutorials, 21(1), 555-574.
  30. Miorandi, D., Sicari S., Pellegrini F. & Chlamtac I. (2012). Internet of Things: Vision, Applications and Research Challenges. Ad Hoc Networks, 10(7), 1497-1516.
  31. Rescorla, E. (2006). The Transport Layer Security (TLS) Protocol Version 1.2 RFC5246
  32. Roman, R., Najera, P., & Lopez, J. (2013). Features, challenges, and issues in modeling and analyzing IoT-based systems. Journal of Systems and Software, 86(8), 2024-2034.31.
  33. Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57(10), 2266-2279.
  34. SANS Institute. (2020). IoT Security: Best Practices for Securing IoT Devices. SANS Whitepaper. Computer Applications, 126, 102-114.
  35. Saunders D. P., Perray R., Barcelo, R., Schreiber M.E., Yuen D., Sorenson, D. (2025). Data Privacy and Cybersecurity Developments. We Are Watching in 2025. McDermott Will & Emery mwe.com
  36. Sicari, S., Rizzardi A., Grieco L.A. & Coen-Parisini A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks ScienceDirect 76, 146-164. Doi./10.1016/j.comnet.2014.11.008
  37. Sicari, S. (2015). Security, privacy, and trust in Internet of Things. Computer Networks, 76, 146-164
  38. Sisinni, E., Saifullah A., Han S., Jennehag U., & Gidlund M. (2018). Industrial Internet of Things: Challenges, Opportunities, and Directions. IEEE Transactions on Industrial Informatics, 14(11), 4724-4734.Q
  39. Sivaraman, V., Gharakheili, H. H., Fernandes, C., Clark, N., & Karliychuk, T. (2018). Smart home security: A survey of threats and countermeasures. IEEE Communications Surveys & Tutorials, 20(2), 1113-1134.
  40. Sivaraman, V., & Chan, D. (2018). Smart Homes: An Examination of the Potential Impact on Privacy. IEEE Security & Privacy, 16(3), 55.
  41. Spafford, E. H. (2000). The Internet worm: Crisis and aftermath. Communications of the ACM, 43(7)39.
  42. Tzori, L., Iera A., & Morabito   G.  (2010). The Internet of Things: A Survey. Computer Networks, 54(15), 2787-2805.
  43.  United Nations. (2014). World Urbanization Prospects.
  44. United Nations, “World urbanization prospects: The 2014 revision, highlights. Department of Economic and social affairs,” Population Division, United Nations, 2014.
  45. Ur, B., et al. (2016). Smart thermostat data leak investigation. Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.
  46. Vanhoef, M., & Piessens, F. (2017). Key Reinstallation Attacks: Forcing Nonce Reuse In WPA2. Proceedings of the 2017 ACM SIGSA Conference on Computer and Communication Security Computer.
  47. X. T. Feng, X. G. Zhu, Q.-L. Han, W. Zhou, S. Wen, & Y. Xiang, 2023.  “Detecting vulnerability on IoT device firmware: A survey,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, 25–41. DOI:  10.1109/JAS.2022.105860
  48. Yoon M., Kim H., Jang M., & Chang J. 2016. A New Spatial Transformation Scheme for Preventing Location Data Disclosure in Cloud Computing. International Journal of Data Warehousing and Mining ch 084. DOI:10.4018/978-1.-4666-9845.

Photo
Oketayo Abimbola M.
Corresponding author

Computer Science Dept. National Mathematical Centre, Abuja

Photo
Nriagu’ Chukwunonso
Co-author

Computer Science Dept. National Mathematical Centre, Abuja

Photo
Oduwole Oluwakemi O.
Co-author

Computer Science Dept. National Mathematical Centre, Abuja

Oketayo Abimbola M.*, Nriagu? Chukwunonso, Oduwole Oluwakemi O., Privacy and Cybersecurity in Smart Devices: Challenges and Opportunity, Int. J. Sci. R. Tech., 2025, 2 (6), 549-559. https://doi.org/10.5281/zenodo.15715439

More related articles
The Neurochemistry of Heartbreak: Unravelling the ...
Arnab Roy, Mahesh Kumar Yadav, Ankita Singh, Indrajeet Kumar Maht...
Artificial Intelligence and College Students: Enha...
Prabhalakshmi Murugesan, Poorvika P., Preetha K., Selvakumar, Yok...
AI-Powered Personal Stylist and Outfit Recommendation System using Computer Visi...
Lankala Durga Prasanna Kumar, Mandava Jaya Sree, Gumpena Kumudhavalli, Gampala Sai Krishna, ...
Evaluating the Inclusion of Telehealth Providers in Health Insurance Plans: A Pa...
Alekhya Gandra, Bharath Srinivasiah, Umamaheswara Reddy Kudumula, ...
Related Articles
Phyto Cosmetic Formulation of Vetiver Root: A Comprehensive Study on Stability a...
Lakshmi Tulasi D. D., Naga Sravani C. H., Kusuma J., Chaitanya Sri Lahari O., Swapnika V., Raghava D...
Predicting Childbirth Modes: A Comparative Analysis of Machine Learning Algorith...
Matheswari S., Meaga J., Nishani S., Vizhiyarasi S., ...
Recent Advancements in Gene Therapy in the Treatment of Triple-Negative Breast C...
Sanchari Bhattacharya, Arthita Koley, Samriddha Chakravorty , Prasiddha Das, ...
More related articles
The Neurochemistry of Heartbreak: Unravelling the Complex Interplay of Brain Reg...
Arnab Roy, Mahesh Kumar Yadav, Ankita Singh, Indrajeet Kumar Mahto, Abhijit Kumar, Abhinav Kumar, Ra...
Artificial Intelligence and College Students: Enhancing Intellect or Encouraging...
Prabhalakshmi Murugesan, Poorvika P., Preetha K., Selvakumar, Yoka T., ...
The Neurochemistry of Heartbreak: Unravelling the Complex Interplay of Brain Reg...
Arnab Roy, Mahesh Kumar Yadav, Ankita Singh, Indrajeet Kumar Mahto, Abhijit Kumar, Abhinav Kumar, Ra...
Artificial Intelligence and College Students: Enhancing Intellect or Encouraging...
Prabhalakshmi Murugesan, Poorvika P., Preetha K., Selvakumar, Yoka T., ...