Digital security in the IoT integrated with computer programs: challenges, vulnerabilities and mitigation strategies

Main Article Content

Ricardo Manuel Candanedo Yau

Abstract

This research critically investigated digital security challenges in environments where the Internet of Things (IoT) is tightly integrated with computerized systems that govern automated processes. Through a systematic review of pertinent scientific literature, recurring weaknesses were identified in authentication mechanisms, data protection, and access control, which enabled exploitation by threats such as malware, resource saturation attacks, and data interception. The analysis also revealed that device capacity constraints, technological diversity, and lack of interoperability contribute to an enduring risk landscape. Mitigation strategies frequently discussed included adopting security‑by‑design architectures, multifactor authentication, robust encryption, and advanced identity management. The study concluded that ensuring digital security in these environments necessitates holistic, adaptive protection models aligned with the systems’ full lifecycle to safeguard both service availability and information integrity in increasingly complex automated contexts.

Downloads

Download data is not yet available.

Article Details

Section

Artículo de investigación

How to Cite

Candanedo Yau, R. M. (2026). Digital security in the IoT integrated with computer programs: challenges, vulnerabilities and mitigation strategies. ICuali, 2, 1-19. https://doi.org/10.66707/f29efc95

References

Abiodun, O. I., Abiodun, E. O., Alawida, M., Alkhawaldeh, R. S., & Arshad, H. (2021). A review on the security of the Internet of Things: Challenges and solutions. Wireless Personal Communications, 119, 2611–2634. https://doi.org/10.1007/s11277-021-08348-9

Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the Internet of Things: Security and privacy issues. IEEE Internet Computing, 21(2), 34–42. https://doi.org/10.1109/MIC.2017.37

Cárdenas Quintero, D., Ropero Silva, E., Puerto López, K., Sanchez Mojica, K., & Castro Casadiego, S. (2024). Vulnerabilidad en la seguridad del Internet de las cosas. Mundo FESC, 14(27), 35–46. https://doi.org/10.61799/2216-0388.542

Chukwuere, J. E. (2024). Internet of Things (IoT) cybersecurity challenges and mitigation mechanisms. Khazanah Sosial, 4(2), 312–325. https://doi.org/10.15575/ks.v4i2.17638

Ferrag, M. A., Maglaras, L., Katsikas, S., Janicke, H., & Maglaras, A. (2025). A survey on cybersecurity in IoT. Future Internet, 17(1), 30. https://doi.org/10.3390/fi17010030

Franco, J., Aris, A., Canberk, B., & Uluagac, A. S. (2021). A survey of honeypots and honeynets for Internet of Things, Industrial Internet of Things, and cyber physical systems. arXiv. https://arxiv.org/abs/2108.02287

García Pérez, K., & Arzube, O. A. (2024). Proactive strategies to mitigate emerging cybersecurity risks in IoT devices for smart homes. Minerva, 5(15), 171–185. https://doi.org/10.47460/minerva.v5i15.171

Ghazal, T. M., Alzoubi, H. M., Alshurideh, M., & Agag, G. (2020). Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet, 12(9), 157. https://doi.org/10.3390/fi12090157

Goel, P., Jain, A., & Juneja, D. (2023). Security issues on Internet of Things (IoT): A recent challenges and countermeasures. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 11(12). https://doi.org/10.22214/ijraset.2023.57760

Habibu, T., & Julius, A. P. (2025). Cybersecurity in the Internet of Things (IoT) – Review. DS Journal of Cyber Security, 3(3), 15–38. https://doi.org/10.59232/CYS-V3I3P102

Halderman, J. A. (2024). ZMap and IoT security research contributions. University of Michigan. https://jhalderm.com/

Jammeh, J. E., Fleury, M., & State, R. (2026). A comprehensive survey on IoT security: Challenges, security issues, and countermeasures. Computer Science Review, 59, 100839. https://doi.org/10.1016/j.cosrev.2025.100839

Kasula, V. K. (2025). Comprehensive analysis of IoT security: Threats, detection methods, and defense strategies. Journal on Internet of Things, 7(1), 19–48. https://doi.org/10.32604/jiot.2025.062733

Lakhani, R. (2023). Cybersecurity threats in Internet of Things (IoT) networks: Vulnerabilities and defense mechanisms. International Journal of Engineering and Computer Science, 12(11), 25965–25981. https://doi.org/10.18535/ijecs/v12i11.4779

Mendoza Villamar, R., Prado Vera, O., & Coveña Coveña, S. (2025). Amenazas de seguridad y sus soluciones en el Internet de las cosas (IoT). Revista Tse’de, 8(3). https://doi.org/10.60100/tsede.v8i3.289

Mohanta, B. K., Jena, D., Ramasubbareddy, S., Danezi, M., & Gani, A. (2020). Security and privacy in IoT using machine learning and blockchain: Threats & countermeasures. arXiv. https://arxiv.org/abs/2002.03488

Morales Suárez, A. C., Díaz Ávila, S. S., & Leguizamón Páez, M. Á. (2019). Mecanismos de seguridad en el internet de las cosas. Revista Vínculos, 16(1), 104–115. https://doi.org/10.14483/2322939X.15758

Okporokpo, O., Olajide, F., Ajienka, N., & Ma, X. (2023). Trust-based approaches towards enhancing IoT security: A systematic literature review. arXiv. https://arxiv.org/abs/2311.11705

Pangestu, R. (2025). Security landscape of the Internet of Things (IoT): A systematic review of vulnerabilities, defense mechanisms, and future research directions. Quanta Research, 1(1). https://ejournal.resincen.org/index.php/quanta/article/view/32

Patil, S. S. (2025). Artificial intelligence in IoT security: Uncovering opportunities and threats. Oriental Journal of Computer Science and Technology, 17(1), 26–29. http://dx.doi.org/10.13005/ojcst17.01.08

Polk, W., Souppaya, M., & Barker, W. (2017). Mitigating IoT based automated distributed threats (NIST Cybersecurity Practice Guide). National Institute of Standards and Technology. https://csrc.nist.gov/pubs/pd/2017/10/12/mitigating-iotbased-automated-distributed-threats/ipd

Radanliev, P., De Roure, D., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S., & Burnap, P. (2020). IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP Journal on Information Security, 2020(1). https://doi.org/10.1186/s13635-020-00111-0

Ramadan, R. A. (2022). Internet of Things (IoT) security vulnerabilities: A review. PLOMS AI, 2(1). https://plomscience.com/journals/index.php/PLOMSAI/article/view/14

Ramos Mosquera, B., García Enríquez, M. C., & Barriga Diaz, R. A. (2025). Análisis de vulnerabilidades en dispositivos IoT mediante algoritmos de búsqueda en Shodan: Riesgos y estrategias de mitigación. Sinergia Académica, 8(1). https://doi.org/10.51736/sa761

Rueda Rueda, J. S. R., & Portocarrero, J. M. T. (2021). Framework based security measures for Internet of Thing: A literature review. Open Computer Science, 11(1), 145–162. https://doi.org/10.1515/comp-2020-0220

Saha, T., Aaraj, N., Ajjarapu, N., & Jha, N. K. (2021). SHARKS: Smart hacking approaches for risk scanning in Internet of Things and cyber physical systems based on machine learning. arXiv. https://arxiv.org/abs/2101.02780

Singh, S., Sharma, S. K., & Kumar, R. (2025). Deep reinforcement learning for intrusion detection in IoT: A survey. arXiv. https://arxiv.org/abs/2405.20038

Sivarao, S., Ammar, A., Al-Dhaqm, A., & Al-Hadhrami, T. (2024). IoT security: Systematic insights into architectures, threats, and defenses. Electronics, 14(20), 3972. https://doi.org/10.3390/electronics14203972

Uprety, A., & Rawat, D. B. (2021). Reinforcement learning for IoT security: A comprehensive survey. arXiv. https://arxiv.org/abs/2102.07247

Yang, Z., Lu, X., & Chen, Y. (2024). Distributed reinforcement learning for IoT security in heterogeneous networks. Scifiniti, 1(1). https://scifiniti.com/3104-4719/1/2024.0008

Most read articles by the same author(s)

Similar Articles

You may also start an advanced similarity search for this article.