A survey on token transmission attacks, effects, and mitigation strategies in IoT devices

Show simple item record

dc.contributor.author Ayuma, Michael J.
dc.contributor.author Angolo, Shem M.
dc.contributor.author Kasyoka, Philemon N.
dc.date.accessioned 2025-11-10T12:23:22Z
dc.date.available 2025-11-10T12:23:22Z
dc.date.issued 2025-08-19
dc.identifier.citation Journal on artificial intelligence, volume 7, pp 205-254, 2025 en_US
dc.identifier.uri https://cdn.techscience.press/files/jai/2025/TSP_JAI-7-7/TSP_JAI_67361/TSP_JAI_67361.pdf
dc.identifier.uri http://repository.seku.ac.ke/xmlui/handle/123456789/8184
dc.description Doi:10.32604/jai.2025.067361 en_US
dc.description.abstract The exponential growth of Internet of Things (IoT) devices has introduced significant security challenges, particularly in securing token-based communication protocols used for authentication and authorization. This survey systematically reviews the vulnerabilities in token transmission within IoT environments, focusing on various sophisticated attack vectors such as replay attacks, token hijacking, man-in-the-middle (MITM) attacks, token injection, and eavesdropping among others. These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth, JSON Web Tokens (JWT), and bearer tokens, which are widely used in IoT ecosystems for managing device interactions and access control. The impact of such attacks is profound, leading to unauthorized access, data exfiltration, and control over IoT devices, posing significant threats to privacy, safety, and the operational integrity of critical IoT applications in sectors like healthcare, smart cities, and industrial automation. This paper categorizes these attack vectors, explores real-world case studies, and analyzes their effects on resource-constrained IoT devices that have limited processing power and memory, rendering them more susceptible to such exploits. Furthermore, this survey presents a comprehensive evaluation of existing mitigation techniques, including cryptographic protocols, lightweight secure transmission frameworks, secure token management practices, and network-layer defenses such as Transport Layer Security (TLS) and multi-factor authentication (MFA). The study also highlights the trade-offs between security and performance in IoT systems and identifies key gaps in current research, emphasizing the need for more scalable, energy-efficient, and robust security frameworks to address the evolving landscape of token transmission attacks in IoT devices. en_US
dc.language.iso en en_US
dc.subject Token transmission en_US
dc.subject IoT attacks en_US
dc.subject IoT authentication en_US
dc.subject cryptography en_US
dc.subject encryption en_US
dc.title A survey on token transmission attacks, effects, and mitigation strategies in IoT devices en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Dspace


Browse

My Account