Open Access iconOpen Access

REVIEW

crossmark

A Survey on Token Transmission Attacks, Effects, and Mitigation Strategies in IoT Devices

Michael Juma Ayuma1, Shem Mbandu Angolo1,*, Philemon Nthenge Kasyoka2,*

1 Department of Computer Science and Information Technology, School of Computing and Mathematics, The Co-operative University of Kenya, Karen, Nairobi, P.O. Box 24814-00502, Kenya
2 School of Science and Computing, South Eastern Kenya University, Kitui, P.O. Box 170-90200, Kenya

* Corresponding Authors: Shem Mbandu Angolo. Email: email; Philemon Nthenge Kasyoka. Email: email

Journal on Artificial Intelligence 2025, 7, 205-254. https://doi.org/10.32604/jai.2025.067361

Abstract

The exponential growth of Internet of Things (IoT) devices has introduced significant security challenges, particularly in securing token-based communication protocols used for authentication and authorization. This survey systematically reviews the vulnerabilities in token transmission within IoT environments, focusing on various sophisticated attack vectors such as replay attacks, token hijacking, man-in-the-middle (MITM) attacks, token injection, and eavesdropping among others. These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth, JSON Web Tokens (JWT), and bearer tokens, which are widely used in IoT ecosystems for managing device interactions and access control. The impact of such attacks is profound, leading to unauthorized access, data exfiltration, and control over IoT devices, posing significant threats to privacy, safety, and the operational integrity of critical IoT applications in sectors like healthcare, smart cities, and industrial automation. This paper categorizes these attack vectors, explores real-world case studies, and analyzes their effects on resource-constrained IoT devices that have limited processing power and memory, rendering them more susceptible to such exploits. Furthermore, this survey presents a comprehensive evaluation of existing mitigation techniques, including cryptographic protocols, lightweight secure transmission frameworks, secure token management practices, and network-layer defenses such as Transport Layer Security (TLS) and multi-factor authentication (MFA). The study also highlights the trade-offs between security and performance in IoT systems and identifies key gaps in current research, emphasizing the need for more scalable, energy-efficient, and robust security frameworks to address the evolving landscape of token transmission attacks in IoT devices.

Keywords

Token transmission; IoT attacks; IoT authentication; cryptography; encryption

Cite This Article

APA Style
Ayuma, M.J., Angolo, S.M., Kasyoka, P.N. (2025). A Survey on Token Transmission Attacks, Effects, and Mitigation Strategies in IoT Devices. Journal on Artificial Intelligence, 7(1), 205–254. https://doi.org/10.32604/jai.2025.067361
Vancouver Style
Ayuma MJ, Angolo SM, Kasyoka PN. A Survey on Token Transmission Attacks, Effects, and Mitigation Strategies in IoT Devices. J Artif Intell. 2025;7(1):205–254. https://doi.org/10.32604/jai.2025.067361
IEEE Style
M. J. Ayuma, S. M. Angolo, and P. N. Kasyoka, “A Survey on Token Transmission Attacks, Effects, and Mitigation Strategies in IoT Devices,” J. Artif. Intell., vol. 7, no. 1, pp. 205–254, 2025. https://doi.org/10.32604/jai.2025.067361



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2089

    View

  • 1692

    Download

  • 0

    Like

Share Link