Open Access iconOpen Access

REVIEW

Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies

Akhila Reddy Yadulla, Mounica Yenugula, Vinay Kumar Kasula*, Bhargavi Konda, Bala Yashwanth Reddy Thumma

Department of Information Technology, University of the Cumberlands 1, Williamsburg, KY 40769, USA

* Corresponding Author: Vinay Kumar Kasula. Email: email

Journal on Internet of Things 2025, 7, 19-48. https://doi.org/10.32604/jiot.2025.062733

Abstract

This study systematically reviews the Internet of Things (IoT) security research based on literature from prominent international cybersecurity conferences over the past five years, including ACM Conference on Computer and Communications Security (ACM CCS), USENIX Security, Network and Distributed System Security Symposium (NDSS), and IEEE Symposium on Security and Privacy (IEEE S&P), along with other high-impact studies. It organizes and analyzes IoT security advancements through the lenses of threats, detection methods, and defense strategies. The foundational architecture of IoT systems is first outlined, followed by categorizing major threats into eight distinct types and analyzing their root causes and potential impacts. Next, six prominent threat detection techniques and five defense strategies are detailed, highlighting their technical principles, advantages, and limitations. The paper concludes by addressing the key challenges still confronting IoT security and proposing directions for future research to enhance system resilience and protection.

Keywords

IoT security; threat detection; defense strategies; IoT architecture; cybersecurity; threat categorization; technical analysis; security challenges

Cite This Article

APA Style
Yadulla, A.R., Yenugula, M., Kasula, V.K., Konda, B., Thumma, B.Y.R. (2025). Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies. Journal on Internet of Things, 7(1), 19–48. https://doi.org/10.32604/jiot.2025.062733
Vancouver Style
Yadulla AR, Yenugula M, Kasula VK, Konda B, Thumma BYR. Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies. J Internet Things. 2025;7(1):19–48. https://doi.org/10.32604/jiot.2025.062733
IEEE Style
A. R. Yadulla, M. Yenugula, V. K. Kasula, B. Konda, and B. Y. R. Thumma, “Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies,” J. Internet Things, vol. 7, no. 1, pp. 19–48, 2025. https://doi.org/10.32604/jiot.2025.062733



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 743

    View

  • 471

    Download

  • 0

    Like

Share Link