
@Article{jiot.2025.062733,
AUTHOR = {Akhila Reddy Yadulla, Mounica Yenugula, Vinay Kumar Kasula, Bhargavi Konda, Bala Yashwanth Reddy Thumma},
TITLE = {Comprehensive Analysis of IoT Security: Threats, Detection Methods, and Defense Strategies},
JOURNAL = {Journal on Internet of Things},
VOLUME = {7},
YEAR = {2025},
NUMBER = {1},
PAGES = {19--48},
URL = {http://www.techscience.com/jiot/v7n1/62957},
ISSN = {2579-0080},
ABSTRACT = {This study systematically reviews the Internet of Things (IoT) security research based on literature from prominent international cybersecurity conferences over the past five years, including ACM Conference on Computer and Communications Security (ACM CCS), USENIX Security, Network and Distributed System Security Symposium (NDSS), and IEEE Symposium on Security and Privacy (IEEE S&P), along with other high-impact studies. It organizes and analyzes IoT security advancements through the lenses of threats, detection methods, and defense strategies. The foundational architecture of IoT systems is first outlined, followed by categorizing major threats into eight distinct types and analyzing their root causes and potential impacts. Next, six prominent threat detection techniques and five defense strategies are detailed, highlighting their technical principles, advantages, and limitations. The paper concludes by addressing the key challenges still confronting IoT security and proposing directions for future research to enhance system resilience and protection.},
DOI = {10.32604/jiot.2025.062733}
}



