Information Security and Computer Fraud
ISSN (Print): 2376-9602 ISSN (Online): 2376-9629 Website: Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Information Security and Computer Fraud. 2018, 6(1), 8-18
DOI: 10.12691/iscf-6-1-2
Open AccessArticle

The State of Wireless Routers as Gateways for Internet of Things (IoT) Devices

Justice Owusu Agyemang1, Jerry John Kponyo1, and Griffith Selorm Klogo1

1Department of Electrical Engineering, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana

Pub. Date: December 24, 2018

Cite this paper:
Justice Owusu Agyemang, Jerry John Kponyo and Griffith Selorm Klogo. The State of Wireless Routers as Gateways for Internet of Things (IoT) Devices. Information Security and Computer Fraud. 2018; 6(1):8-18. doi: 10.12691/iscf-6-1-2


Internet of Things (IoT) is a new paradigm that integrates the internet and smart objects. It is an intelligent network that connects all things to the Internet for the purpose of exchanging information and communicating through the information sensing devices in accordance with agreed protocols. Aside the various benefits IoT provides, it also presents challenges related to security and privacy. Current research works are geared towards ensuring security and privacy in the IoT field; developing cryptography algorithms and protocols with much focus on the application and network layer of the IoT architecture. This paper presents the current state of WiFi routers as a gateway through which WiFi-connected IoT devices can communicate. It discusses security and privacy issues related to these WiFi gateways. It goes further to suggest mitigation techniques that address the security and privacy issues found in these WiFi gateways.


Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit


[1]  Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic and Marimuthu Palaniswami, “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions'', Department of Electrical and Electronic Engineering, The University of Melbourne, Vic - 3010, Australia, pg. 1-2.
[2]  Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li, and Hongbin Zhao, “A Survey on Security and Privacy Issues in Internet-of-Things'', IEEE Internet of Things Journal, Vol. 5, No. 5, October 2017, pg. 1.
[3]  IoT Analytics. (2014). Why the Internet of Things Is Called Internet of Things: Definition, History, Disambiguation, [Online]. Available:
[4]  P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “Pauthkey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications,'' in Int. J. Distrib. Sensor Netw., vol. 10, Jul. 2014, Art. no. 357430.
[5]  Y. Sharaf-Dabbagh and W. Saad, “On the authentication of devices in the Internet of Things,'' in Proc. IEEE 17th Int. Symp. World Wireless Mobile Multimedia Netw. (WoWMoM), Coimbra, Portugal, Jun. 2016, pp. 1-3.
[6]  Anne H. Ngu, Mario Gutierrez, Vangelis Metsis, Surya Nepal and Quan Z. Sheng, “IoT Middleware: A Survey on Issues and Enabling Technologies'', IEEE Internet Of Things Journal, Vol. 4, No. 1, February 2017.
[7]  Shanzhi Chen, Hui Xu, Dake Liu, Bo Hu, and Hucheng Wang, “A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective'', IEEE Internet Of Things Journal, Vol. 1, No. 4, August 2014.
[8]  Sukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili, Vijay Sivaraman and Roksana Boreli, “An Experimental Study of Security and Privacy Risks with Emerging Household Appliances'', 1oth IEEE International Conference on Cybernetic Intelligent Systems, CIS 2011.
[9]  Thomas Zachariah, Noah Klugman, Bradford Campbell, Joshua Adkins, Neal Jackson, and Prabal Dutta, “The Internet of Things Has a Gateway Problem University of Michigan, pp. 1, 2015.
[10], [Accessed Online] 8th June, 2018.
[11]  Open Web Application Security Project Testing Guide 4.0, \emph{}, [Accessed Online] 10th July, 2018.
[12]  OpenWrt, , [Accessed Online] 12th July, 2018.
[13]  PfSense, , [Accessed Online] 13th July, 2018.
[14]  LetsEncrypt, , [Accessed Online] 17th July, 2018.