Open Access
REVIEW
Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies
Department of Information Technology, University of the Cumberlands 1, Williamsburg, KY 40769, USA
* Corresponding Author: Vinay Kumar Kasula. Email:
Journal on Internet of Things 2025, 7, 19-48. https://doi.org/10.32604/jiot.2025.062733
Received 26 December 2024; Accepted 17 June 2025; Issue published 11 July 2025
Abstract
This study systematically reviews the Internet of Things (IoT) security research based on literature from prominent international cybersecurity conferences over the past five years, including ACM Conference on Computer and Communications Security (ACM CCS), USENIX Security, Network and Distributed System Security Symposium (NDSS), and IEEE Symposium on Security and Privacy (IEEE S&P), along with other high-impact studies. It organizes and analyzes IoT security advancements through the lenses of threats, detection methods, and defense strategies. The foundational architecture of IoT systems is first outlined, followed by categorizing major threats into eight distinct types and analyzing their root causes and potential impacts. Next, six prominent threat detection techniques and five defense strategies are detailed, highlighting their technical principles, advantages, and limitations. The paper concludes by addressing the key challenges still confronting IoT security and proposing directions for future research to enhance system resilience and protection.Keywords
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools