Digital security in the IoT integrated with computer programs: challenges, vulnerabilities and mitigation strategies
Main Article Content
Abstract
This research critically investigated digital security challenges in environments where the Internet of Things (IoT) is tightly integrated with computerized systems that govern automated processes. Through a systematic review of pertinent scientific literature, recurring weaknesses were identified in authentication mechanisms, data protection, and access control, which enabled exploitation by threats such as malware, resource saturation attacks, and data interception. The analysis also revealed that device capacity constraints, technological diversity, and lack of interoperability contribute to an enduring risk landscape. Mitigation strategies frequently discussed included adopting security‑by‑design architectures, multifactor authentication, robust encryption, and advanced identity management. The study concluded that ensuring digital security in these environments necessitates holistic, adaptive protection models aligned with the systems’ full lifecycle to safeguard both service availability and information integrity in increasingly complex automated contexts.
Downloads
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
How to Cite
References
Abiodun, O. I., Abiodun, E. O., Alawida, M., Alkhawaldeh, R. S., & Arshad, H. (2021). A review on the security of the Internet of Things: Challenges and solutions. Wireless Personal Communications, 119, 2611–2634. https://doi.org/10.1007/s11277-021-08348-9
Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the Internet of Things: Security and privacy issues. IEEE Internet Computing, 21(2), 34–42. https://doi.org/10.1109/MIC.2017.37
Cárdenas Quintero, D., Ropero Silva, E., Puerto López, K., Sanchez Mojica, K., & Castro Casadiego, S. (2024). Vulnerabilidad en la seguridad del Internet de las cosas. Mundo FESC, 14(27), 35–46. https://doi.org/10.61799/2216-0388.542
Chukwuere, J. E. (2024). Internet of Things (IoT) cybersecurity challenges and mitigation mechanisms. Khazanah Sosial, 4(2), 312–325. https://doi.org/10.15575/ks.v4i2.17638
Ferrag, M. A., Maglaras, L., Katsikas, S., Janicke, H., & Maglaras, A. (2025). A survey on cybersecurity in IoT. Future Internet, 17(1), 30. https://doi.org/10.3390/fi17010030
Franco, J., Aris, A., Canberk, B., & Uluagac, A. S. (2021). A survey of honeypots and honeynets for Internet of Things, Industrial Internet of Things, and cyber physical systems. arXiv. https://arxiv.org/abs/2108.02287
García Pérez, K., & Arzube, O. A. (2024). Proactive strategies to mitigate emerging cybersecurity risks in IoT devices for smart homes. Minerva, 5(15), 171–185. https://doi.org/10.47460/minerva.v5i15.171
Ghazal, T. M., Alzoubi, H. M., Alshurideh, M., & Agag, G. (2020). Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet, 12(9), 157. https://doi.org/10.3390/fi12090157
Goel, P., Jain, A., & Juneja, D. (2023). Security issues on Internet of Things (IoT): A recent challenges and countermeasures. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 11(12). https://doi.org/10.22214/ijraset.2023.57760
Habibu, T., & Julius, A. P. (2025). Cybersecurity in the Internet of Things (IoT) – Review. DS Journal of Cyber Security, 3(3), 15–38. https://doi.org/10.59232/CYS-V3I3P102
Halderman, J. A. (2024). ZMap and IoT security research contributions. University of Michigan. https://jhalderm.com/
Jammeh, J. E., Fleury, M., & State, R. (2026). A comprehensive survey on IoT security: Challenges, security issues, and countermeasures. Computer Science Review, 59, 100839. https://doi.org/10.1016/j.cosrev.2025.100839
Kasula, V. K. (2025). Comprehensive analysis of IoT security: Threats, detection methods, and defense strategies. Journal on Internet of Things, 7(1), 19–48. https://doi.org/10.32604/jiot.2025.062733
Lakhani, R. (2023). Cybersecurity threats in Internet of Things (IoT) networks: Vulnerabilities and defense mechanisms. International Journal of Engineering and Computer Science, 12(11), 25965–25981. https://doi.org/10.18535/ijecs/v12i11.4779
Mendoza Villamar, R., Prado Vera, O., & Coveña Coveña, S. (2025). Amenazas de seguridad y sus soluciones en el Internet de las cosas (IoT). Revista Tse’de, 8(3). https://doi.org/10.60100/tsede.v8i3.289
Mohanta, B. K., Jena, D., Ramasubbareddy, S., Danezi, M., & Gani, A. (2020). Security and privacy in IoT using machine learning and blockchain: Threats & countermeasures. arXiv. https://arxiv.org/abs/2002.03488
Morales Suárez, A. C., Díaz Ávila, S. S., & Leguizamón Páez, M. Á. (2019). Mecanismos de seguridad en el internet de las cosas. Revista Vínculos, 16(1), 104–115. https://doi.org/10.14483/2322939X.15758
Okporokpo, O., Olajide, F., Ajienka, N., & Ma, X. (2023). Trust-based approaches towards enhancing IoT security: A systematic literature review. arXiv. https://arxiv.org/abs/2311.11705
Pangestu, R. (2025). Security landscape of the Internet of Things (IoT): A systematic review of vulnerabilities, defense mechanisms, and future research directions. Quanta Research, 1(1). https://ejournal.resincen.org/index.php/quanta/article/view/32
Patil, S. S. (2025). Artificial intelligence in IoT security: Uncovering opportunities and threats. Oriental Journal of Computer Science and Technology, 17(1), 26–29. http://dx.doi.org/10.13005/ojcst17.01.08
Polk, W., Souppaya, M., & Barker, W. (2017). Mitigating IoT based automated distributed threats (NIST Cybersecurity Practice Guide). National Institute of Standards and Technology. https://csrc.nist.gov/pubs/pd/2017/10/12/mitigating-iotbased-automated-distributed-threats/ipd
Radanliev, P., De Roure, D., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S., & Burnap, P. (2020). IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP Journal on Information Security, 2020(1). https://doi.org/10.1186/s13635-020-00111-0
Ramadan, R. A. (2022). Internet of Things (IoT) security vulnerabilities: A review. PLOMS AI, 2(1). https://plomscience.com/journals/index.php/PLOMSAI/article/view/14
Ramos Mosquera, B., García Enríquez, M. C., & Barriga Diaz, R. A. (2025). Análisis de vulnerabilidades en dispositivos IoT mediante algoritmos de búsqueda en Shodan: Riesgos y estrategias de mitigación. Sinergia Académica, 8(1). https://doi.org/10.51736/sa761
Rueda Rueda, J. S. R., & Portocarrero, J. M. T. (2021). Framework based security measures for Internet of Thing: A literature review. Open Computer Science, 11(1), 145–162. https://doi.org/10.1515/comp-2020-0220
Saha, T., Aaraj, N., Ajjarapu, N., & Jha, N. K. (2021). SHARKS: Smart hacking approaches for risk scanning in Internet of Things and cyber physical systems based on machine learning. arXiv. https://arxiv.org/abs/2101.02780
Singh, S., Sharma, S. K., & Kumar, R. (2025). Deep reinforcement learning for intrusion detection in IoT: A survey. arXiv. https://arxiv.org/abs/2405.20038
Sivarao, S., Ammar, A., Al-Dhaqm, A., & Al-Hadhrami, T. (2024). IoT security: Systematic insights into architectures, threats, and defenses. Electronics, 14(20), 3972. https://doi.org/10.3390/electronics14203972
Uprety, A., & Rawat, D. B. (2021). Reinforcement learning for IoT security: A comprehensive survey. arXiv. https://arxiv.org/abs/2102.07247
Yang, Z., Lu, X., & Chen, Y. (2024). Distributed reinforcement learning for IoT security in heterogeneous networks. Scifiniti, 1(1). https://scifiniti.com/3104-4719/1/2024.0008