SECURITY PROTOCOLS FOR THE INTERNET OF THINGS (IOT)
DOI:
https://doi.org/10.51891/rease.v11i12.22900Keywords:
Internet of Things. Security Protocols. Cybersecurity.Abstract
The Internet of Things (IoT) has rapidly proliferated across various sectors, interconnecting devices used in homes, industries, urban areas, and healthcare. However, this extensive connectivity raises considerable challenges related to information security, especially due to the processing, memory, and energy consumption limitations of IoT devices. This article aims to examine the main security protocols implemented in the Internet of Things (IoT), as well as evaluate the vulnerabilities in the most common communication protocols, such as MQTT, CoAP, and AMQP. The methodology used is based on a literature review of scientific articles published between 2020 and 2025 in databases such as IEEE, Springer, Science Direct, and national journals. The results of the review show that, despite the existence of mechanisms such as TLS/DTLS, layer-level encryption, and authentication models, several protocols continue to rely on external solutions for security, revealing vulnerabilities related to the confidentiality, integrity, and authentication of information. The research concludes that security in the Internet of Things (IoT) requires specific strategies, including optimized protocols developed within the logic of "security by design," as well as the implementation of constant updating and monitoring practices. The research also identifies deficiencies and potential future problems, highlighting the urgency of standardization and more effective protocols for low-capacity equipment.
Downloads
Downloads
Published
How to Cite
Issue
Section
Categories
License
Atribuição CC BY