TY - JOUR AU - Ramadan, Rabie PY - 2021/10/20 Y2 - 2024/03/29 TI - Internet of Things (IoT) Security Vulnerabilities: A Review JF - PLOMS AI JA - PAI VL - 2 IS - 1 SE - Computer DO - UR - https://plomscience.com/journals/index.php/PLOMSAI/article/view/14 SP - AB - <p>The Internet of Things (IoT) collects and processes data from remote locations, substantially increasing the productivity of dispersed systems or individuals. Due to the restricted budget available for power consumption, IoT devices usually lack advanced data encryption and device authentication. &nbsp;The hardware components used in IoT devices are not high-end, and therefore, the integrity and security of the majority of IoT devices are in question. For instance, an adversary may include a Hardware Trojan (HT) during the manufacturing phase of IoT hardware devices to trigger data leakage or device failures in addition to other security issues. Here, we examine security risks to IoT in this paper, with a particular focus on attacks aimed at compromising the software, hardware, communication, and chip.&nbsp;</p> ER -