Regulation is also a critical consideration for the IoT
industry, as IoT devices collect and transmit sensitive data.
There is a need for regulations to ensure the security of IoT
devices and to protect users from potential harm caused by
breaches and leaks. The main issue is that the laws and public
guidelines are created and updated at a much slower pace
than the technologies they are governing. Reacting slowly to
innovation could have negative impacts on every party whether
it is on a consumer, an industrial member or even a whole state.
Overall, the development of new IoT technologies must
consider the potential impact on security and privacy, com-
patibility, and regulation to ensure the safe and widespread
adoption of IoT. By prioritizing these considerations, IoT can
continue to grow and expand, offering increased connectivity,
convenience, and efficiency in various applications.
VI. CONCLUSION
IoT devices are gaining popularity amongst technology
professionals and regular individual end-users. Currently, the
security of such devices is crucial, but lacking. They are
subject to many MITM attack vectors due to the heterogeneity
of the IoT space. These attacks are considered direct privacy
and security threat. Many current methods are used to prevent
and combat such attacks but have some limitations. Some
of these limitations are the complexity brought on by the
increase in network size, the limited compute power and
battery capacity of IoT devices, and the simplicity of the
data sets used to train Machine Learning and Deep Learning
models, as they do not accurately mimic real-world use cases.
In the short-term future, techniques using Deep Learning
will be explored and used to detect intrusions. As for the
industry in general, it is important to prioritize security and
privacy, but also compatibility, regulation, and the integration
of emerging technologies to improve active monitoring and
detection of potential security breaches. In terms of future re-
search, Network Architecture Optimization or Standardization
for Hybrid Routing can be interesting to investigate to try
to adapt the technique to larger network sizes. Other broader
avenues would be to help other researchers with data set
creation to mimic larger size networks, and finally, the use
of blockchain/DLTs as an immutable decentralized database
can be explored.
REFERENCES
[1] NIST, Internet Definition, Retrieved: March 10, 2023,
https://csrc.nist.gov/glossary/term/internet
[2] M. Shafiq, Z. Gu, O. Cheikhrouhou, W. Alhakami, H. Hamam, ”The
Rise of “Internet of Things”: Review and Open Research Issues Related
to Detection and Prevention of IoT-Based Security Attacks”, Wireless
Communications and Mobile Computing, vol. 2022, Article ID 8669348,
12 pages, 2022. https://doi.org/10.1155/2022/8669348
[3] IoT Market Size, IoT Analytics, Retrieved: March 10, 2023, https://iot-
analytics.com/iot-market-size/
[4] Connected Devices to the Internet, IoT Analytics, Retrieved: March
10, 2023, https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-
number-of-iot-devices-now-7b
[5] 2020 Unit 42 IoT Threat Report, Palo Alto Networks, Retrieved: March
10, 2023, https://unit42.paloaltonetworks.com/iot-threat-report-2020
[6] K. N. Mallikarjunan, K. Muthupriya and S. M. Shalinie, ”A survey of
distributed denial of service attack,” 2016 10th International Conference
on Intelligent Systems and Control (ISCO), Coimbatore, India, 2016,
pp. 1-6, https://doi.org/10.1109/ISCO.2016.7727096
[7] M. Husamuddin and M. Qayyum, ”Internet of Things: A study on
security and privacy threats,” 2017 2nd International Conference on
Anti-Cyber Crimes (ICACC), Abha, Saudi Arabia, 2017, pp. 93-97,
https://doi.org/10.1109/Anti-Cybercrime.2017.7905270
[8] Manesh Thankappan, Helena Rif
`
a-Pous, Carles Garrigues, Multi-
Channel Man-in-the-Middle attacks against protected Wi-Fi
networks: A state of the art review, Expert Systems with
Applications, Volume 210, 2022, 118401, ISSN 0957-4174,
https://doi.org/10.1016/j.eswa.2022.118401
[9] N. M. Karie, N. M. Sahri, W. Yang, C. Valli and V. R. Kebande, ”A
Review of Security Standards and Frameworks for IoT-Based Smart
Environments,” in IEEE Access, vol. 9, pp. 121975-121995, 2021,
https://doi.org/10.1109/ACCESS.2021.3109886
[10] 95% of HTTPS connections are vulnerable to
MitM, NetCraft, Retrieved: March 10, 2023,
https://news.netcraft.com/archives/2016/03/17/95-of-https-servers-
vulnerable-to-trivial-MitM-attacks.html
[11] A. Jurcut, T. Niculcea, P. Ranaweera, and N.-A. Le-Khac, “Security
considerations for internet of things: A survey,” SN Comput. Sci., vol.
1, p. 193, 2020. https://doi.org/10.1007/s42979-020-00201-3
[12] M. B. Yassein, M. Q. Shatnawi, S. Aljwarneh and R. Al-Hatmi,
”Internet of Things: Survey and open issues of MQTT protocol,” 2017
International Conference on Engineering & MIS (ICEMIS), Monastir,
Tunisia, 2017, pp. 1-6, https://doi.org/10.1109/ICEMIS.2017.8273112
[13] H. HaddadPajouh, A. Dehghantanha and R. M. Parizi et al., A survey
on internet of things security: Requirements, challenges, and solutions,
Internet of Things, https://doi.org/10.1016/j.iot.2019.100129
[14] A. Hu
ˇ
c and D. Tr
ˇ
cek, ”Anomaly Detection in IoT Networks: From Ar-
chitectures to Machine Learning Transparency,” in IEEE Access, vol. 9,
pp. 60607-60616, 2021, https://doi.org/10.1109/ACCESS.2021.3073785
[15] Rehman, A. ur, Rehman, S. ur, Khan, I. U., Moiz, M., & Hasan,
S. (2022). Security and Privacy Issues in IoT. International Journal
of Communication Networks and Information Security (IJCNIS), 8(3).
https://doi.org/10.17762/ijcnis.v8i3.2074
[16] S. Khanam, I. B. Ahmedy, M. Y. Idna Idris, M. H. Jaward and
A. Q. Bin Md Sabri, ”A Survey of Security Challenges, At-
tacks Taxonomy and Advanced Countermeasures in the Internet
of Things,” in IEEE Access, vol. 8, pp. 219709-219743, 2020,
https://doi.org/10.1109/ACCESS.2020.3037359
[17] AK. Zhao and L. Ge, ”A Survey on the Internet of Things Security,”
in 2013 Ninth International Conference on Computational Intelligence
and Security (CIS), Emeishan 614201, China, 2013 pp. 663-667.
https://doi.ieeecomputersociety.org/10.1109/CIS.2013.145
[18] Multiple vulnerabilities in EUFY eufyCam 2, Vulnerability Intelli-
gence by CyberSecurity Help s.r.o. (n.d.), Retrieved: March 12, 2023,
https://www.cybersecurity-help.cz/vdb/SB2021113006
[19] S. Hollister, Anker’s Eufy lied to us about the security of
its security cameras, The Verge, Retrieved: March 12, 2023,
https://www.theverge.com/2022/11/30/23486753/anker-eufy-security-
camera-cloud-private-encryption-authentication-storage
[20] Rollet, C.,Malwarebytes Labs. (n.d.). 150,000 Verkada security
cameras hacked-to make a point. Malwarebytes. Retrieved March
12, 2023, https://www.malwarebytes.com/blog/news/2021/03/150000-
verkada-security-cameras-hacked-to-make-a-point
[21] 2017 Equifax Data Breach, Wikipedia, Retrieved March 12, 2023,
https://en.wikipedia.org/wiki/2017 Equifax data breach
[22] Banaamah, A.M.; Ahmad, I. Intrusion Detection in IoT Using Deep
Learning. Sensors 2022, 22, 8417. https://doi.org/10.3390/s22218417
[23] O. Toutsop, P. Harvey and K. Kornegay, ”Monitoring and Detection
Time Optimization of Man in the Middle Attacks using Machine Learn-
ing,” in 2020 IEEE Applied Imagery Pattern Recognition Workshop
(AIPR), Washington DC, DC, USA, 2020 pp. 1-7.
[24] A. A. Olazabal, J. Kaur and A. Yeboah-Ofori, ”Deploying Man-
In-the-Middle Attack on IoT Devices Connected to Long Range
Wide Area Networks (LoRaWAN),” 2022 IEEE International Smart
Cities Conference (ISC2), Pafos, Cyprus, 2022, pp. 1-7, doi:
10.1109/ISC255366.2022.9922377.
[25] Prajoy Podder, M. Rubaiyat Hossain Mondal, Subrato Bharati, Pinto
Kumar Paul: “Review on the Security Threats of Internet of Things”,
2021, International Journal of Computer Applications (IJCA), 2020.