Securing IoT Devices: A Literature Survey with Experimental Insights into Threat Detection and Mitigation

This paper presents a comprehensive review of techniques developed to secure Internet of Things (IoT) infrastructures, motivated by the exponential growth of connected devices and their associated vulnerabilities. In addition to reviewing recent advances in the field, the paper provides experimental...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Advances in Electrical and Computer Engineering Ročník 25; číslo 2; s. 69 - 80
Hlavní autoři: TIMOFTE, E. M., DIMIAN, M., GRAUR, A., POTORAC, A. D., BALAN, D. G., HRITCAN, D., PUSCASU, M.
Médium: Journal Article
Jazyk:angličtina
Vydáno: Suceava Stefan cel Mare University of Suceava 01.06.2025
Témata:
ISSN:1582-7445, 1844-7600
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:This paper presents a comprehensive review of techniques developed to secure Internet of Things (IoT) infrastructures, motivated by the exponential growth of connected devices and their associated vulnerabilities. In addition to reviewing recent advances in the field, the paper provides experimental validation of selected methods through controlled simulations and real-world test scenarios. The analysis covers encryption protocols, authentication mechanisms, and artificial intelligence-based intrusion detection, emphasizing the effectiveness of layered defence strategies that include anomaly detection and real-time incident response. The study highlights both the technical limitations of current IoT devices and the potential of adaptive security models when properly implemented. It also highlights the importance of combining technical assurance with standardized risk management policies to increase system resilience. By integrating theoretical knowledge with practical experiments, the article contributes to the development of more robust and adaptive IoT security frameworks. Index Terms--security, intrusion detection, authentication, encryption, data privacy.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1582-7445
1844-7600
DOI:10.4316/AECE.2025.02008