NAME: SOMTOCHUKWU OBODOEKWE
MAT NO: FPS/CSC/21/74153
DEPARTMENT: COMPUTER SCIENCE
SEMINAR TOPIC: CYBERSECURITY IN THE AGE OF IOT
SUPERVISOR NAME: MR (Dr.) ISAAC IYAFOKHAI
ABSTRACT
The rapid growth of the Internet of Things (IoT) has transformed industries,
homes, healthcare, and transportation by enabling seamless connectivity between
billions of devices. While IoT offers unprecedented convenience and innovation, it
also introduces significant cybersecurity challenges due to its vast attack surface,
heterogeneous device ecosystem, and frequent lack of standardized security
protocols. Cyber threats such as data breaches, Distributed Denial of Service
(DDoS) attacks, device hijacking, and privacy violations have demonstrated the
vulnerability of IoT systems. This seminar examines the critical role of
cybersecurity in safeguarding IoT infrastructures, exploring key risks, real-world
attack cases, and emerging protection strategies. It also discusses best practices
such as strong authentication, end-to-end encryption, secure firmware updates, and
AI-driven threat detection. Furthermore, it highlights future trends including
blockchain-based device authentication, quantum-resistant cryptography, and
policy frameworks aimed at securing the IoT ecosystem. The study concludes that
robust and proactive cybersecurity measures are essential to maintain trust, ensure
data integrity, and enable the sustainable growth of IoT technologies in the digital
age.
1
SECTION ONE
INTROUDCTION
The Internet of Things (IoT) refers to the interconnection of everyday objects,
devices, and systems through the internet, enabling them to collect, share, and
process data autonomously. From smart homes and wearable health monitors to
industrial automation and intelligent transportation systems, IoT has become an
integral part of modern life, driving efficiency, innovation, and convenience
(Ashton, 2009). However, this increased connectivity has introduced new
cybersecurity challenges, as each connected device can serve as a potential entry
point for cyberattacks (Roman et al., 2013). However, the same connectivity that
makes IoT powerful also makes it vulnerable to cybersecurity threats. IoT devices
often operate with limited computational resources, minimal built-in security
features, and diverse communication protocols, creating an environment where
cyber attackers can exploit weaknesses. Breaches in IoT systems can lead to
serious consequences, including data theft, operational disruptions, physical
damage to infrastructure, and violations of user privacy. The 2016 Mirai botnet
attack, which hijacked thousands of IoT devices to launch a massive Distributed
Denial of Service (DDoS) attack, highlighted the urgent need for stronger security
measures in the IoT ecosystem. As IoT ecosystems expand, the attack surface
grows proportionally, increasing the risk of privacy violations, data breaches, and
infrastructure sabotage (Sicari et al., 2015). In this context, cybersecurity for IoT
must address unique challenges such as heterogeneous devices, limited processing
capabilities, and the lack of universal security standards. The age of IoT demands
proactive strategies that integrate security at every stage of the device lifecycle to
protect both individual users and critical infrastructures.
IoT is an integrated part of the future Internet that enables things to communicate
and interact among themselves and with the environment by exchanging data
sensed about the environment (Madakam, Ramaswamy, & Tripathi, 2015).
1.1 Growing Adoption of IoT in Various Sectors
2
1. Industries (Industrial IoT – IIoT): IoT enables smart manufacturing by
connecting machines, sensors, and analytics platforms to monitor
equipment health, predict failures, and optimize production. Example:
General Electric uses IIoT to perform predictive maintenance on
turbines, reducing downtime. Which Increased productivity, reduced
operational costs.
2. Homes (Smart Homes): IoT devices like smart thermostats, lighting
systems, and security cameras allow homeowners to monitor and control
home environments remotely. Example: Google Nest adjusts temperature
automatically based on occupancy. It brings a benefit of energy
efficiency, enhanced security, convenience.
3. Healthcare (IoMT – Internet of Medical Things): IoT in healthcare
enables remote patient monitoring, wearable health trackers, and
connected medical devices that transmit real-time health data to doctors.
Example: Fitbit and Apple Watch monitor heart rate and detect
anomalies. It brings a benefit of early detection of diseases, continuous
care for chronic patients.
4. Transport (Smart Transportation): IoT supports connected vehicles,
real-time traffic management, and fleet tracking systems. Example: Tesla
cars use IoT for remote diagnostics and over-the-air updates. It bring
benefit of improved safety, reduced congestion, lower maintenance costs.
5. Education (Smart Learning Environments): IoT enables smart
classrooms, connected whiteboards, and student tracking systems to
enhance teaching and learning. Example: Smart boards connected to
cloud platforms allow remote collaboration. The benefit of this is
interactive learning, better resource management, and real-time student
performance tracking.
6. Environmental Monitoring: IoT-powered air quality sensors, water
quality monitors, and weather stations help track environmental changes
and respond to hazards. Example: Smart water management systems
detect leaks and prevent wastage. The benefit is improved sustainability,
early detection of environmental hazards.
7. Public Safety and Smart Cities: IoT facilitates smart surveillance,
traffic monitoring, waste management, and emergency response systems
in cities. Example: Barcelona’s IoT-based streetlights adjust brightness to
3
save energy and improve safety. It brings benefit of reduced crime, better
urban services, improved quality of life.
1.2 Importance of Cybersecurity in IoT
The Internet of Things (IoT) connects billions of devices across homes,
industries, healthcare, transportation, and cities. While this connectivity brings
efficiency, automation, and innovation, it also introduces significant security
risks. Cybersecurity in IoT is essential to protect devices, networks, and the
data they handle from malicious activities.
1. Protection of Sensitive Data: IoT devices often collect personal, financial,
or health-related information. Without strong security, this data can be
stolen, sold, or misused. Example: Smart home cameras hacked to spy on
users. Prevents identity theft, fraud, and privacy violations.
2. Ensuring Device Integrity and Availability: Cyberattacks can take control
of IoT devices or disrupt their normal operation. Example: The 2016 Mirai
botnet attack hijacked thousands of IoT devices to launch a massive
Distributed Denial of Service (DDoS) attack (Antonakakis et al., 2017).
Maintains trust, ensures uninterrupted service, and protects safety-critical
systems like smart grids or medical devices.
Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E.,
Cochran, J., ... & Zhou, Y. (2017). Understanding the Mirai botnet. USENIX
Security Symposium, 1093–1110.
3. Prevention of Physical Harm: Many IoT devices control real-world
processes such as autonomous cars, smart locks, and industrial machinery. A
breach could cause accidents or physical danger. Example: A hacked smart
traffic system could cause accidents. Protects human life and infrastructure.
4. Safeguarding Industrial and Economic Operations: In industrial IoT
(IIoT), security breaches can cause production downtime, loss of intellectual
property, and large financial losses. Example: A cyberattack on oil pipeline
IoT sensors can halt fuel supply. Ensures economic stability and operational
continuity.
5. Building User Trust and Adoption: If consumers believe IoT devices are
unsafe, they may refuse to adopt them. Strong security fosters confidence
4
and drives market growth. Example: Companies with end-to-end encryption
in devices often attract more customers.
6. Compliance with Legal and Regulatory Standards: Governments and
industry bodies have introduced security and privacy regulations for IoT
devices (e.g., GDPR in Europe, IoT Cybersecurity Improvement Act in the
U.S.). Organizations must comply to avoid fines, lawsuits, and reputational
damage.
7. Prevention of Large-Scale Cyber Threat Propagation: A single
vulnerable IoT device can be exploited to spread malware or be used as part
of a botnet for attacks. Example: Infected smart TVs or routers becoming
part of a DDoS network. Reduces the risk of global-scale cyber incidents.
8. Supporting National and Critical Infrastructure Security: IoT is widely
used in critical infrastructure such as energy grids, water systems,
transportation networks, and healthcare. Cybersecurity prevents disruptions
that could impact millions of lives and national security.
5
SECTION TWO
LITERATURE REVIEW
2.1 Evolution of IoT Cybersecurity Measures
When IoT technology was in its infancy—roughly the late 1990s to the early 2010s
—security was not a priority. The primary focus was on connectivity and
functionality rather than protection. Many devices were simply adaptations of
traditional embedded systems with new networking capabilities, but without any
dedicated security design. Before 2010, Early IoT devices (RFID tags, industrial
sensors, simple smart appliances) had little or no built-in security. The Weaknesses
of this IoT devices were default passwords left unchanged, no encryption of data in
transit and minimal or no firmware update mechanisms. Example: Early smart
meters or cameras that could be accessed remotely without authentication (Atzori
et al, 2010). Many devices shipped with factory-set usernames and passwords (e.g.,
admin/admin) that users rarely changed. Hackers could easily find these in product
manuals posted online. No Encryption, data sent over networks was often
transmitted in plain text, meaning attackers could intercept sensitive data like
location info, camera feeds, or sensor readings. Limited or No Firmware Updates,
once deployed, most devices never received security patches—making them
permanently vulnerable if a flaw was discovered. Weak or Absent Authentication,
Some IoT devices could be accessed remotely without any login requirement at all.
Focus on Function, Not Security, the design priority was to make devices work and
communicate, often ignoring the need to secure communication channels. Low
Processing Power & Memory, security features like encryption were seen as too
resource-intensive for early IoT hardware. Cost Constraints, manufacturers aimed
to keep devices cheap, sacrificing advanced security features. Lack of Security
Awareness, in the early days, both manufacturers and consumers underestimated
how attractive these devices would be to attackers. No Standard Security
Regulations, there were no widely adopted IoT security frameworks or legal
6
requirements at the time. Example of devices with weaknesses in the past include:
Early Smart Cameras: Many shipped with open Telnet or HTTP ports and default
passwords, allowing strangers to watch live feeds, Industrial Sensors: Some
SCADA-connected devices had no authentication at all, RFID Tags in Supply
Chains: Could be cloned with simple, cheap scanners.
2.2 Present (2010s – Now) – Security-by-Design Approach
IoT security became a serious concern after high-profile attacks like the 2016 Mirai
botnet, which hijacked thousands of IoT devices for massive DDoS attacks. The
measure implemented where device authentication and secure boot, Over-the-air
(OTA) firmware updates, Network segmentation and zero-trust security models.
Industry security standards (e.g., PSA Certified, NIST IoT Cybersecurity
Guidelines). Example: Modern smart home devices that require strong passwords,
encrypted communications, and signed firmware updates (Antonakakis et al,
2017).
2.3 Future (Next 5–10 Years) – AI-Driven and Quantum-Safe Security
With billions of IoT devices expected, manual security management will be
impossible—automation and resilience will dominate. The emerging measures that
will taking includes AI & Machine Learning: For real-time anomaly detection and
autonomous response, Blockchain: For decentralized device identity and secure,
tamper-proof logs, Post-Quantum Cryptography (PQC): To resist future quantum
computing threats. Example: Smart city IoT networks that self-heal and block
threats without human intervention (Fernandez-Carames, T. M., 2024).
7
SECTION THREE
How IoT Works, Architecture of IoT Systems and Types of IoT Applications.
3.1 How IoT Works
The Internet of Things (IoT) operates by connecting physical devices to the
internet so they can collect, share, and act on data—without constant human
intervention. It generally follows five main stages:
1. Devices: These are the physical “things” in IoT. Examples: Smart
thermostats, wearables, connected cars, medical monitors, industrial
machines. The function they perform is a specific tasks or serve specific
purposes in a system (e.g., measure temperature, track location, monitor
heart rate).
2. Sensors: Sensors are the sense organs of IoT devices—they detect and
measure data from the environment. Examples: Temperature sensors, motion
detectors, GPS, cameras, humidity sensors. The function is to convert
physical signals (heat, motion, light, sound) into digital data.
3. Connectivity: The data collected by sensors needs to be transmitted to a
processing system. Connectivity enables this. Common Technologies: Wi-Fi,
Bluetooth, Zigbee, 4G/5G, LoRaWAN, Ethernet, satellite. It function is to
ensures that IoT devices communicate with gateways or directly with cloud
servers.
4. Cloud Computing: The cloud acts as the brain of IoT. It function is to
stores and processes the massive amount of data sent from IoT devices. Why
Cloud? It provides scalability, remote access, and integration with other
8
services. Example Services: AWS IoT Core, Microsoft Azure IoT, Google
Cloud IoT.
5. Data Analytics & Action: Once the data is in the cloud, Data Analytics
tools process, analyze, and visualize it. Machine Learning/AI can detect
patterns, predict outcomes, and trigger automated actions. Example: A smart
irrigation system waters plants automatically when soil moisture is low.
3.2 Example Workflow
i. Device and Sensor: A smart thermostat measures your room’s temperature.
ii. Connectivity: Data is sent via Wi-Fi to the cloud.
iii. Cloud Processing: The system compares current temperature with your set
preferences.
iv. Analytics & Action: If it’s too hot, the system sends a signal back to turn on
the AC.
v. User Feedback: You get a phone notification showing energy usage and
temperature changes.
3.3 ARCHITECTURE OF IOT SYSTEMS
IoT architecture describes the structured layers that enable devices to sense,
process, and communicate data efficiently. While different models exist, the most
widely used is the Three-Layer Architecture, which can be extended into Five-
Layer Architecture for more detail.
1. Three-Layer IoT Architecture: This is the basic model, consisting of:
i. Perception Layer (Sensing Layer): It functionis to detects and
collects information from the physical environment. Components:
Sensors, RFID tags, cameras, GPS modules, actuators. Example: A
temperature sensor in a smart home measures room temperature.
ii. Network Layer: It function is to transmits the collected data to other
devices or cloud platforms. Technologies: Wi-Fi, Bluetooth, Zigbee,
4G/5G, LoRaWAN, Ethernet. Example: Sending temperature data via
Wi-Fi to the cloud server.
iii. Application Layer: It function is to provide services to end-users
based on the processed data.
9
2. Five-Layer IoT Architecture: This model is more detailed and is often used
in academic discussions.
i. Perception Layer: Same as in the three-layer model: handles sensing
and data collection.
ii. Network Layer: Transmits data to processing units through
wired/wireless channels.
iii. Edge/Processing Layer: it function is to processes data before
sending it to the cloud. Components: Edge devices, gateways, local
servers. The benefit of this is to reduces latency and saves bandwidth
by processing near the source.
iv. Application Layer: Delivers services to users in a user-friendly
interface.
v. Business Layer: it function is to manage the IoT system, data
analytics, business models, and decision-making. Example:
Determines how data insights are monetized or used for service
improvement.
3.4 Example Flow in IoT Architecture
i. Perception Layer: Wearable fitness tracker senses heart rate.
ii. Network Layer: Data sent via Bluetooth to smartphone, then via internet to
the cloud.
iii. Processing Layer: AI analyzes patterns in heart rate data.
iv. Application Layer: App notifies user of abnormal heart rate.
v. Business Layer: Healthcare provider uses the data for patient monitoring.
3.5 Types of IoT Applications
1. Smart Homes: Uses IoT devices to automate and control household
functions. Examples: Smart thermostats (Nest), smart lighting (Philips Hue),
voice assistants (Amazon Alexa, Google Home). The benefit of this is for
the purpose of energy efficiency, convenience, enhanced security.
2. Industrial IoT (IIoT): Application of IoT in manufacturing, energy, and
supply chain processes. Examples: Predictive maintenance sensors,
10
automated assembly lines, smart factories. Hence it increased productivity,
reduced downtime, better safety.
3. Healthcare IoT: Integrates medical devices and systems for real-time
patient monitoring. Examples: Wearable fitness trackers, remote patient
monitoring systems, smart pill dispensers. It brings the benefit of improved
patient care, early disease detection, remote healthcare access.
4. Smart Cities: Uses IoT to optimize city operations and services. Examples:
Smart traffic management, waste monitoring systems, connected public
lighting. It benefit is to reduced congestion, better public safety, efficient
resource use.
5. Connected Transportation: Enhances transportation systems using IoT
connectivity. Examples: Vehicle-to-vehicle (V2V) communication, fleet
tracking, autonomous cars. The benefit of this is for safer travel, reduced
fuel consumption, optimized logistics.
6. Agriculture IoT (Smart Farming): Uses IoT devices to monitor and manage
agricultural processes. Examples: Soil moisture sensors, automated
irrigation systems, livestock tracking. The benefit brings about higher crop
yield, water conservation, reduced labor costs.
7. Retail IoT: Improves retail operations and customer experiences. Examples:
Smart shelves, automated checkout systems, personalized offers. It brings
about better inventory management, increased sales, reduced losses.
8. Environmental Monitoring: Tracks environmental conditions for safety
and sustainability. Examples: Air quality sensors, water pollution detectors,
climate monitoring stations. Th3 benefit of this is also is that it brings about
early disaster warnings, improved environmental protection.
11
SECTION FOUR
Cybersecurity Challenges in IoT, Cybersecurity Solutions & Best Practices
and Future Trends in IoT Security.
4.1Cybersecurity Challenges in IoT
The Internet of Things (IoT) introduces unprecedented connectivity, but also
brings several security challenges due to the diversity, scale, and distributed
nature of devices and networks.
1. Weak Authentication and Authorization: Many IoT devices have
default or weak passwords, and some lack multi-factor authentication.
This makes them easy targets for attackers. Example: Hackers exploiting
default login credentials in smart cameras to gain unauthorized access.
2. Unsecured Networks and Communication Channels: IoT devices
often transmit data over insecure Wi-Fi, Bluetooth, or other wireless
channels without encryption. This exposes the system to eavesdropping
and man-in-the-middle attacks. Example: Intercepting unencrypted
sensor data from a smart home system.
3. Device Vulnerabilities and Outdated Firmware: Many IoT devices are
shipped with security flaws, and manufacturers rarely provide timely
firmware updates. Unpatched devices become easy entry points for
12
cybercriminals. Example: Exploiting an outdated medical IoT device to
alter patient health data.
4. Data Privacy Issues: IoT devices collect large amounts of sensitive data,
such as personal habits, health records, and location information. Weak
data protection measures can lead to identity theft or surveillance.
Example: A fitness tracker leaking a user’s location history.
5. Distributed Denial of Service (DDoS) Attacks: Compromised IoT
devices can be hijacked to form botnets that flood targeted servers with
traffic, rendering them unavailable. Example: The 2016 Mirai botnet
attack that disrupted major internet services by exploiting unsecured IoT
devices.
6. Supply Chain Security Risks: IoT devices or components sourced from
different vendors may be tampered with before deployment, introducing
hidden vulnerabilities or backdoors. Example: Malicious firmware pre-
installed on imported IoT sensors.
7. Scalability and Complexity Challenges: As IoT networks grow,
managing and securing thousands (or millions) of interconnected devices
becomes increasingly difficult. The complexity makes it harder to detect
and respond to threats. Example: An enterprise struggling to secure its
massive network of connected industrial sensors.
4.2Cybersecurity Solutions & Best Practices
Implementing strong security measures at every stage of an IoT system’s
lifecycle—design, deployment, and maintenance—is essential to protect against
evolving threats.
1. Strong Authentication and Authorization:
Solution:
i. Use multi-factor authentication (MFA) for device and user access.
ii. Replace default passwords with strong, unique credentials.
iii. Implement role-based access control (RBAC) to limit permissions.
Example: Smart home systems requiring a mobile app verification code
before granting access.
2. Secure Networks and Communication Channels:
Solution:
13
i. Encrypt data in transit using TLS/SSL or secure VPNs.
ii. Disable unused communication ports and services.
iii. Use network segmentation to isolate IoT devices from critical
systems.
Example: Isolating security cameras on a separate VLAN from corporate
data servers.
3. Regular Firmware Updates and Patch Management:
Solution:
i. Enable automatic updates for IoT devices.
ii. Apply security patches promptly when vulnerabilities are
discovered.
iii. Choose vendors with a clear, long-term update policy.
Example: An industrial IoT system that updates its firmware remotely
without downtime.
4. Data Privacy Protection:
Solution:
i. Store only necessary data and encrypt it at rest.
ii. Apply anonymization and pseudonymization to sensitive
information.
iii. Follow privacy regulations such as GDPR or CCPA.
Example: Fitness apps anonymizing user health metrics before analysis.
5. DDoS Prevention and Mitigation:
Solution:
i. Implement rate limiting and traffic filtering.
ii. Use intrusion detection/prevention systems (IDS/IPS).
iii. Partner with a DDoS mitigation service provider.
Example: A content delivery network (CDN) filtering out malicious
traffic before it reaches IoT endpoints.
6. Securing the Supply Chain:
14
Solution:
i. Audit suppliers and verify hardware authenticity.
ii. Use cryptographic signing for firmware and software validation.
iii. Implement Zero Trust Architecture to verify every component.
Example: An automotive IoT manufacturer verifying chip authenticity
before production.
7. Managing Scalability and Complexity
Solution:
i. Use centralized IoT management platforms with real-time
monitoring.
ii. Automate security compliance checks and vulnerability scans.
iii. Deploy AI-driven analytics for threat detection across large
networks.
Example: A smart city platform monitoring thousands of sensors with an
AI security dashboard.
4.3Future Trends in IoT Security.
As IoT continues to expand across industries, securing these interconnected
devices will require innovative technologies, new policies, and global
collaboration. Below are the key upcoming trends:
1. AI-Driven Threat Detection and Response: Artificial Intelligence
(AI) and Machine Learning (ML) will analyze large amounts of IoT
data in real time to detect anomalies and respond automatically to
threats. Which tend to improves detection speed and reduces false
positives. Example: AI-enabled cameras that identify suspicious
network behavior instantly.
2. Blockchain for IoT Security: Blockchain technology will secure IoT
transactions, device identities, and firmware updates with
decentralized, tamper-proof records. Which increases trust and
15
eliminates single points of failure. Example: Supply chain IoT devices
logging every transaction on a blockchain ledger.
3. Zero Trust Architecture (ZTA) Adoption: “Never trust, always
verify” approach will become the default, requiring constant
authentication for every IoT device and user. Hence prevents lateral
movement of attackers within a network. Example: Smart factory
systems requiring re-authentication before each device operation.
4. Quantum-Resistant Encryption: Preparing encryption methods that
can resist future quantum computing attacks. Which also tend to
reduces latency and the risk of data interception during transmission.
Example: Healthcare IoT devices using post-quantum cryptography to
protect patient data.
5. Edge Computing Security: Securing computation done at the edge
(near the devices) instead of centralized cloud systems. Likewise
reduces latency and the risk of data interception during transmission.
Example: Smart city traffic sensors processing data locally with
encrypted storage.
6. Automated Patch and Vulnerability Management: AI-powered
systems will scan for vulnerabilities and automatically deploy patches
without human intervention. It reduces the window of exposure for
IoT systems. Example: Smart thermostats updating security firmware
overnight automatically.
7. Enhanced IoT Privacy Regulations: Governments will introduce
stricter IoT security and privacy regulations worldwide. Which forces
manufacturers to adopt “security-by-design” principles. Example:
Compliance with the upcoming IoT Cybersecurity Improvement Act
in multiple countries.
16
Conclusion
The Internet of Things has transformed the way we live, work, and interact with
the world, seamlessly connecting devices across homes, industries, healthcare,
transportation, and beyond. However, with this unprecedented connectivity comes
an equally unprecedented set of cybersecurity challenges. Weak authentication,
insecure communication channels, outdated firmware, and large-scale attacks such
as Distributed Denial of Service (DDoS) have exposed the fragility of many IoT
ecosystems. The Internet of Things has transformed the way we live, work, and
interact with the world, seamlessly connecting devices across homes, industries,
healthcare, transportation, and beyond. However, with this unprecedented
connectivity comes an equally unprecedented set of cybersecurity challenges.
17
Weak authentication, insecure communication channels, outdated firmware, and
large-scale attacks such as Distributed Denial of Service (DDoS) have exposed the
fragility of many IoT ecosystems. As IoT adoption accelerates, cybersecurity must
evolve at the same pace, anticipating future threats such as quantum computing
attacks while ensuring trust, privacy, and resilience in connected systems.
Ultimately, the future of IoT will depend not just on innovation in connectivity, but
on innovation in security — making cybersecurity not an afterthought, but the
foundation upon which the Internet of Things truly thrives.
Reference
Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., …
& Zhou, Y. (2017). Understanding the Mirai botnet. In 26th USENIX
Security Symposium (USENIX Security 17) (pp. 1093–1110). USENIX
Association.
Ashton, K. (2009). That ‘Internet of Things’ thing. RFID Journal, 22(7), 97–114.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security
and privacy in distributed internet of things. Computer Networks, 57(10),
2266–2279. [Link]
18
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy
and trust in Internet of Things: The road ahead. Computer Networks, 76,
146–164. [Link]
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things
(IoT): A vision, architectural elements, and future directions. Future
Generation Computer Systems, 29(7), 1645–1660.
[Link]
Fernandez-Carames, T. M. (2024). From Pre-Quantum to Post-Quantum IoT
Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of
Things.
Antonakakis, M., et al. (2017). Understanding the Mirai Botnet. USENIX Security
Symposium.
Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey.
Computer Networks, 54(15), 2787–2805.
19