ETHICAL HACKING IN THE INTERNET OF THINGS (IOT): IDENTIFYING VULNERABILITIES AND ENHANCING SECURITY IN SMART HOME DEVICES

Authors

  • Shakil Ahmad Assistant Manager Networks, Department of Information Technology, Riphah International University, Islamabad, Pakistan Author
  • Rehan Qureshi Department of Software Innovation, Dawood University of Engineering & Technology, Karachi, Pakistan Author
  • Samina Gul Faculty of Information Systems, Abdul Wali Khan University, Mardan, Pakistan Author

DOI:

https://doi.org/10.64035/car.01.2025.14

Keywords:

Iot Security, Penetration Testing, Vulnerability Assessment, Smart Home Devices, Encryption, Authentication

Abstract

This study investigates the security vulnerabilities in Internet of Things (IoT) devices within smart homes, focusing on common issues such as weak encryption, insecure communication protocols, and inadequate authentication mechanisms. Through a comprehensive penetration testing approach, we identified significant security weaknesses in several IoT devices, including smart voice assistants, security cameras, and smart locks. Our findings revealed that smart voice assistants were particularly vulnerable, exhibiting the highest number of vulnerabilities across multiple categories, including weak encryption and insecure communication channels. Reports revealed high susceptibility rates because numerous devices were susceptible to remote exploitation.  The professional job of ethical hackers during penetration tests faces three essential difficulties stemming from complex device architecture alongside privacy concerns which arise from manufacturers' poor execution of standardized security standards.  Our findings demonstrate why IoT devices should upgrade their endpoint encryption system while needing periodic firmware maintenance including dual authentication systems.  Research shows that users' privacy demands effective security measures within IoT devices for stopping both vulnerability exploits and privacy intrusions.  The research produces insights on IoT security needs along with penetration testing methods designed to handle security weaknesses.

Downloads

Published

2025-06-30

How to Cite

ETHICAL HACKING IN THE INTERNET OF THINGS (IOT): IDENTIFYING VULNERABILITIES AND ENHANCING SECURITY IN SMART HOME DEVICES. (2025). Computing and Applications Reviews, 2(01), 10-18. https://doi.org/10.64035/car.01.2025.14