Please use this identifier to cite or link to this item: https://repository.seku.ac.ke/handle/123456789/8184
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAyuma, Michael J.-
dc.contributor.authorAngolo, Shem M.-
dc.contributor.authorKasyoka, Philemon N.-
dc.date.accessioned2025-11-10T12:23:22Z-
dc.date.available2025-11-10T12:23:22Z-
dc.date.issued2025-08-19-
dc.identifier.citationJournal on artificial intelligence, volume 7, pp 205-254, 2025en_US
dc.identifier.urihttps://cdn.techscience.press/files/jai/2025/TSP_JAI-7-7/TSP_JAI_67361/TSP_JAI_67361.pdf-
dc.identifier.urihttp://repository.seku.ac.ke/xmlui/handle/123456789/8184-
dc.descriptionDoi:10.32604/jai.2025.067361en_US
dc.description.abstractThe exponential growth of Internet of Things (IoT) devices has introduced significant security challenges, particularly in securing token-based communication protocols used for authentication and authorization. This survey systematically reviews the vulnerabilities in token transmission within IoT environments, focusing on various sophisticated attack vectors such as replay attacks, token hijacking, man-in-the-middle (MITM) attacks, token injection, and eavesdropping among others. These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth, JSON Web Tokens (JWT), and bearer tokens, which are widely used in IoT ecosystems for managing device interactions and access control. The impact of such attacks is profound, leading to unauthorized access, data exfiltration, and control over IoT devices, posing significant threats to privacy, safety, and the operational integrity of critical IoT applications in sectors like healthcare, smart cities, and industrial automation. This paper categorizes these attack vectors, explores real-world case studies, and analyzes their effects on resource-constrained IoT devices that have limited processing power and memory, rendering them more susceptible to such exploits. Furthermore, this survey presents a comprehensive evaluation of existing mitigation techniques, including cryptographic protocols, lightweight secure transmission frameworks, secure token management practices, and network-layer defenses such as Transport Layer Security (TLS) and multi-factor authentication (MFA). The study also highlights the trade-offs between security and performance in IoT systems and identifies key gaps in current research, emphasizing the need for more scalable, energy-efficient, and robust security frameworks to address the evolving landscape of token transmission attacks in IoT devices.en_US
dc.language.isoenen_US
dc.subjectToken transmissionen_US
dc.subjectIoT attacksen_US
dc.subjectIoT authenticationen_US
dc.subjectcryptographyen_US
dc.subjectencryptionen_US
dc.titleA survey on token transmission attacks, effects, and mitigation strategies in IoT devicesen_US
dc.typeArticleen_US
Appears in Collections:School of Science and Computing (JA)

Files in This Item:
File Description SizeFormat 
Ayuma_A survey on token transmission attacks....pdfabstract4.7 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.