You are on page 1of 3

IoT and its cyber implications.

Introduction:
The Internet of Things (IoT) is "a modern paradigm that allows electrical devices and
sensors to communicate with one another over the Internet to improve our lives." In
industry, government, and public/private businesses worldwide, IoT employs smart
systems and the Internet to deliver innovative solutions to diverse challenges and
issues [1]. The IoT is becoming a more significant part of life. The IoT is a technology
that connects various innovative applications, frameworks, embedded systems, and
sensors. It also benefits from quantum and nanotechnology in storage, sensing, and
processing speed previously unimaginable.
Because of the increased use of IoT devices and technology, we see a considerable
change in our everyday routine. Indoor and outdoor IoT devices can assess and
monitor various health conditions, fitness levels, and the amount of energy utilized in
a gym, among other things. As a result, it has altered the entire medical landscape by
increasing access to high-tech and intelligent equipment [2]. Furthermore, IoT
developers and researchers are dedicated to improving the lives of disabled and senior
citizens. In this regard, the IoT has performed well, paving a new way for such
people's daily lives.
 
Differences between IoT from traditional Internet:
The IoT (IoT), sometimes known as the physical Internet, varies from the traditional
Internet in that it is more than simply personal devices connected to computers and
phones. The IoT will connect directly to everything and the traditional Internet [3].
There is something for everyone, from street lights and automobiles to plants and
animals, weather, tennis rackets, and clothing. They'll be all connected to the Internet
and each other.
Thanks to the Internet, everything is connected to the Internet, and the entire world
thanks to the IoT. Because this new IoT technology may improve people's lives right
away, it opens up a whole new world of possibilities.
 
Cyber implication: 
As the IoT grows, so will the number of risks. Recognizing and appreciating the
plethora of dangers and vulnerabilities associated with the IoT can significantly lower
the probability of a data breach [4]. The absence of physical hardening in IoT devices
has always been a source of worry. Since most IoT devices are deployed remotely,
there is no way to appropriately defend devices continuously exposed to a more
significant physical attack surface. Potential attackers can get crucial information
about their network's capabilities by using devices without a safe location and the
difficulty in maintaining them continually [5].
Cross-communication between smart devices and the IoT network is becoming more
common as more individuals adopt cloud-based communications and data storage.
However, if data is carried, received, or stored across these networks, the chance of a
breach or compromised data grows. As a result, network security management
systems like firewalls and network access limits are critical for assuring secure data
transmission and storage [6].
The majority of IoT devices are untracked, unmonitored, and poorly managed.
Keeping track of connected and disconnected devices on the IoT network can be
difficult. These dangers can be life-threatening in the healthcare industry. Hackers
might drain batteries or send erroneous pacing and shocks to IoT pacemakers and
defibrillators if not adequately protected. Enterprises must use device management
systems to monitor IoT devices comprehensively and account for any potential
breaches [7].
Artificial intelligence (AI)-based cyber-attacks have become more vulnerable and
familiar on IoT devices. Hackers may now construct AI-powered technologies faster,
easier to deploy, and more efficient than people to carry out their attacks [8]. This is a
severe threat to the IoT ecosystem. While cyber attackers' strategies and features of
conventional IoT dangers may be the same, AI-powered attacks will be more difficult
to prevent due to their scale, automation, and personalization.
To avoid security breaches, an IoT user must take several practical steps. Passwords
for computers, mobile devices, and online accounts should be changed regularly. Now
it should be the industry standard for IoT devices. Cloud computing is efficient, but it
is also a novel technology that is very vulnerable and attack-prone [9]. To check for
official updates from the device maker, software updates must be in place. This
updates the devices with security patches, preventing hackers from breaking in new
ways. Regular IoT software upgrades give you peace of mind, knowing that your
systems have the most up-to-date security mechanisms and are protected against the
latest threats.
 
Conclusion:
The Internet of Things has spawned a slew of innovations that have improved
efficiency, comfort, and reliability. Intelligent sensors and drone gadgets are actively
directing traffic at many signalized intersections in large cities. Furthermore,
automakers are releasing vehicles with pre-installed sensor devices that can detect
significant traffic congestion on a map and propose a less congested route.

References:
1. Sfar AR, Chtourou Z, Challal Y. A systemic and cognitive vision for IoT security: a case study
of military live simulation and security challenges. In2017 International Conference on Smart,
Monitored and Controlled Cities (SM2C) 2017 Feb 17 (pp. 101-105). IEEE.4
2. Gatsis K, Pappas GJ. Wireless control for the IOT: Power, spectrum, and security challenges.
In2017 IEEE/ACM Second International Conference on Internet-of-Things Design and
Implementation (IoTDI) 2017 Apr 18 (pp. 341-342). IEEE.
3. Esposito C, Castiglione A, Tudorica CA, Pop F. Security and privacy for cloud-based data
management in the health network service chain: a microservice approach. IEEE
Communications Magazine. 2017 Sep 8;55(9):102-8.
4. Sfar AR, Natalizio E, Challal Y, Chtourou Z. A roadmap for security challenges in the IoT.
Digital Communications and Networks. 2018 Apr 1;4(2):118-37.
5. Minoli D, Sohraby K, Kouns J. IoT security (IoTSec) considerations, requirements, and
architectures. In2017 14th IEEE Annual Consumer Communications & Networking
Conference (CCNC) 2017 Jan 8 (pp. 1006-1007). IEEE.
6. Minoli D, Sohraby K, Kouns J. IoT security (IoTSec) considerations, requirements, and
architectures. In2017 14th IEEE Annual Consumer Communications & Networking
Conference (CCNC) 2017 Jan 8 (pp. 1006-1007). IEEE.
7. Behrendt F. Cycling the smart and sustainable city: Analyzing EC policy documents on IoT,
mobility and transport, and smart cities. Sustainability. 2019 Jan;11(3):763.
8. Lv Z, Qiao L, Kumar Singh A, Wang Q. AI-empowered IoT security for smart cities. ACM
Transactions on Internet Technology. 2021 Jul 22;21(4):1-21.
9. Biswas AR, Giaffreda R. IoT and cloud convergence: Opportunities and challenges. In2014
IEEE World Forum on IoT (WF-IoT) 2014 Mar 6 (pp. 375-376). IEEE.

You might also like