Cyber Security in IOT

Cyber Security in IOT

This Article Written by Trainee Mohammed Al-Salboukh From King Fahd University of Petroleum and Minerals #KFUPM

Cyber Security in IOT

Evans stated that 50 billion connected things will be in use worldwide in 2020, started from 2016, there are more than 5.5 million new things got connected every day. (2011, p. 3)

  • Internet of things (IoT) systems is the interconnection between devices, sensors and embedded systems. The experts are expecting that the IoT will be the new coming trend that is going to change the world like the effect of the internet.

  • Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes , control our lights, thermostats, and locks and beef up the security of our homes—between a host of other things.

A real IoT home system network example

Cyber Security in IOT
  • IoT devices have no built-in security; making them topmost targets for hackers. the reasons for that is that the devices haven’t came from one company; yet, there is no confident protocol to secure our IoT.

  • Since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.

  • The following are an important tips to secure the IoT network from hackers, intruders and viruses.

1- Change Your Router’s Default Settings

Cyber Security in IOT
Cyber Security in IOT
  • change your router’s factory-default name and password. The factory-given name could give away the make and model of your router, making it easier for hackers to access.

  • Note: avoid any kind of password that have your personal information, like your name, family name, date of birth.


2- Never provide sensitive information on a public network

  • As a rule of thumb, do not go online shopping while you are connecting to a public network, as someone could easily steal it.


3- Use Strong Passwords

  • Always use a combination of numbers, symbols, lowercase letters and uppercase letters.

  • Never use the name of a pet, location, birthday, or anything that could be tied to your personal information.

  • Never use the same password for multiple accounts.

  • Make your password as long as possible.

  • Don’t keep an electronic note of all your passwords (if that gets hacked, all your accounts are compromised!).

4- Update Your Devices Routinely

Since IoT devices weren’t created with spiffed-out security, it’s crucial to continually update them. Updating software ensures that you’re up to date on the latest antivirus and anti-malware countermeasures. They also help clear up any security flaws that slipped through the cracks in the older version of your device.


5- Enable two level of authentication

  • One of the robust ways of securing the data today is to set more than one level of authentication. Many companies like Google, Netflix, Facebook, and Twitter are allowing their user to set 2 or 3 ways level of authentication. If the hacker acquired the password, the system will detect an unusual location is trying to access the account; then, a verification email will be sent to the user.

  • Not all of these levels are set by default, some of them have to be set manually.

6- Embed brilliant Ai security ideas

  • Monitor the user activity, if there is an unusual activity that is going on the system is blocked and the 3 level authentication required to re-access the system.

  • Example of Ai system in the home: The Ai algorithm and database going to detect and taught the user usual activity, user usual time of sleep, usual time of coming home, or maybe the user’s typical way of movement In the home. Therefore the algorithm going to analyze the data it has collected from the user and decide the best option like firing the alarm system.


7- Disable UPnP Features

  • Universal Plugin and Play(UPnP) feature is there in almost all of IoT devices, which allow multiple devices to connect. For instance, your Alexa can pair with your smart lights to turn on and off via voice command. As convenient as this is, it also poses several security risks.

  • If a device is discovered by a hacker, it will be easy for him to access all the devices that are connected with it. Furthermore, since all the devices are connected, it makes it easy for a cybercriminal to dismantle the whole system. Luckily, most devices allow you to disable UPnP by accessing their settings.

  • Note: UPnP is enabled by default.



Evans, D. (2011). The Internet of Things How the Next Evolution of the Internet Is Changing Everything. Cisco Internet Business Solutions Group (IBSG), 1–11. Retrieved from

Ghosh, A., Chakraborty, D., & Law, A. (2018). Artificial intelligence in Internet of things. The Institution of Engineering and Technology, 208–2018. doi: 10.1049/trit.2018.1008

Knight, I. (2018). Connecting Arduino to the Web. Apress. doi: 10.1007/978-1-4842-3480-8

 Caldwell, B. (March 13, 2020). 5 Ways to Secure Your IoT Devices—Before They Get Hacked.

Related Posts

Great Place to Work

حصلت شركة القرار الآمن على شهادة Great Place to Work في المملكة العربية السعودية لعام 2022 ، كأفضل بيئة عمل...

Ransomware – برنامج الفدية

نظرة سريعة على برنامج الفدية   رانسوم وير أو برنامج الفدية (بالإنجليزية: Ransomware) هو برنامج خبيث يقيد الوصول إلى نظام الحاسوب الذي...