Document Type

Conference Proceeding

Publication Date

7-2025

Publication Title

Proceedings of the 2025 8th International Conference on Software Engineering and Information Management

Keywords

network management, security and privacy, mobile and wireless security, internet of things, vulnerabilities, IoT security

Abstract

The integration of Internet of Things (IoT) devices in smart homes has surged in recent years, accompanied by significant security vulnerabilities. The proliferation of IoT devices in smart homes has significantly enhanced convenience but also introduced substantial cybersecurity risks. This study investigated the susceptibility of Internet of Things (IoT) devices in students' homes to cyberattacks, emphasizing the need for heightened consumer awareness regarding security vulnerabilities. A systematic literature review was conducted to identify common attack methods and trends in IoT cybersecurity, informing the development of a comprehensive survey administered to 34 student respondents. The results indicate a notable awareness of IoT security risks (76%), yet only a minority engage in regular software updates (24%) or possess a plan to address vulnerabilities (29%). While 53% of respondents have taken proactive measures to enhance security, concerns remain regarding data collection by IoT devices (79% confirmed data collection). This mixed engagement highlights a critical gap between awareness and action, underscoring the necessity for educational initiatives on best practices for IoT security. Recommendations include implementing automatic updates, enhancing manufacturer accountability, and promoting user-friendly privacy features to better protect consumer data in the evolving landscape of IoT technology. The outcome of this research holds implications for enhancing cybersecurity in everyday environments and promoting responsible IoT adoption.

Funding Source

This research was funded by the Office of Student Research at Illinois State University. This proceeding was published Open Access thanks to a transformative agreement between Milner Library and ACM.

Creative Commons License

Creative Commons Attribution 4.0 International License
This work is licensed under a Creative Commons Attribution 4.0 International License.

DOI

10.1145/3725899.3725918

Comments

First published in Proceedings of the 8th International Conference on Software Engineering and Information Management (2025): https://doi.org/10.1145/3725899.3725918

Share

COinS