TY - JOUR AU - Aysha Sadia, Moveh Samuel, Anar Aliyev, PY - 2022/02/08 Y2 - 2024/03/28 TI - A Study on Consumer Risk Assessment for IoT JF - Design Engineering JA - DE VL - IS - 1 SE - Articles DO - UR - http://thedesignengineering.com/index.php/DE/article/view/9074 SP - 1471-1481 AB - Internet of things is widely accepted as the new normal in the era of smart devices and e-commerce. These advances in technology cannot be denied by anyone, especially in the way and manner it has empowered many industries. The simple vision of IoT is to connect standalone devices which connect to the internet and work as smart devices. Approximately 25 billion IoT devices were registered in 2020. The uniqueness of this technology is its ability to transfer data across any standalone device or within the internet, where such communication can be managed both ways automatically or through user control.  As a result of the rapid growth in IoT, devices that are internet compliant are likely to be at risk of cyber-attack. Hence, making these devices vulnerable and exploited. Therefore, vulnerabilities in IoT devices can lead to consumer risk, which can also lead to economic disaster. The point of IoT is to securely create a channel that links these devices to their consumers despite some constraints on the IoT devices, which could alter device’s performance. Since most devices are for consumer-based services, consumer data security and privacy should be a major priority. This means that consumer data is at stake when IoT devices are not performing in their secure condition. The future will be ambiguous because of insufficient cyber security precautions. Yet, low-cost consumer IoT components with limited functionalities may be manipulated to jeopardize privacy, reliability, accessibility of user data and services, user- confidentiality and protection and possibly further procedures upon Internet.  Furthermore, confidentiality and safety might be acknowledged through the numerous IoT user interval features. In other words, particular side-channel outbreaks, thus, a credible interrupter analysing communication among factors proceeds to define the status of a device’s- keeper. In this situation, surveillance issues are raised when everything is connected to each other then unbridled information accessibility happens. ER -