Full Paper View Go Back
Cybersecurity Support in IoT: Causes and Solutions in Engineering
Arun Kumar Singh1 , Alak Kumar Patra2
- School of MCS, PNG University of Technology, Lae, Papua New Guinea.
- School of Civil Engineering, PNG University of Technology, Lae, Papua New Guinea.
Section:Research Paper, Product Type: Journal-Paper
Vol.10 ,
Issue.5 , pp.107-119, May-2024
Online published on May 31, 2024
Copyright © Arun Kumar Singh, Alak Kumar Patra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Arun Kumar Singh, Alak Kumar Patra, “Cybersecurity Support in IoT: Causes and Solutions in Engineering,” International Journal of Scientific Research in Multidisciplinary Studies , Vol.10, Issue.5, pp.107-119, 2024.
MLA Style Citation: Arun Kumar Singh, Alak Kumar Patra "Cybersecurity Support in IoT: Causes and Solutions in Engineering." International Journal of Scientific Research in Multidisciplinary Studies 10.5 (2024): 107-119.
APA Style Citation: Arun Kumar Singh, Alak Kumar Patra, (2024). Cybersecurity Support in IoT: Causes and Solutions in Engineering. International Journal of Scientific Research in Multidisciplinary Studies , 10(5), 107-119.
BibTex Style Citation:
@article{Singh_2024,
author = {Arun Kumar Singh, Alak Kumar Patra},
title = {Cybersecurity Support in IoT: Causes and Solutions in Engineering},
journal = {International Journal of Scientific Research in Multidisciplinary Studies },
issue_date = {5 2024},
volume = {10},
Issue = {5},
month = {5},
year = {2024},
issn = {2347-2693},
pages = {107-119},
url = {https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=3509},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=3509
TI - Cybersecurity Support in IoT: Causes and Solutions in Engineering
T2 - International Journal of Scientific Research in Multidisciplinary Studies
AU - Arun Kumar Singh, Alak Kumar Patra
PY - 2024
DA - 2024/05/31
PB - IJCSE, Indore, INDIA
SP - 107-119
IS - 5
VL - 10
SN - 2347-2693
ER -
Abstract :
The protection of internet-connected devices and the data they generate a crucial aspect of IoT cybersecurity. With the increasing number of devices connected to the internet, the risk of cyber attacks targeting these devices has also grown. Therefore, it is vital to implement security measures to safeguard them. IoT devices are susceptible to various types of attacks, including data theft, unauthorized access, and tampering. These attacks can have severe consequences for individuals and organizations alike. To combat these threats, IoT cybersecurity involves the implementation of measures like encryption, secure authentication, and regular software updates. Protecting IoT devices is not only important for the devices themselves but also for the sensitive data they collect and generate. This data can include personal health information, financial data, or industrial control system data, which makes it an attractive target for cybercriminals. Increasing number of IoT devices and their significant role in our daily lives, it is crucial to prioritize IoT cybersecurity to ensure the privacy, security, and reliability of both the devices and the data they generate. Securing the abstract nature of IoT and the complex systems involved poses a challenge, as they create numerous vulnerabilities that malicious actors can exploit. IoT cybersecurity is crucial to guarantee the confidentiality, integrity, and availability of data and connected devices, as well as protect them from cyber threats like unauthorized access, data theft, and tampering. This article tackles these challenges and suggests various security measures that can be implemented, such as encryption, secure authentication, and regular software updates. Furthermore, specialized IoT security platforms provide comprehensive protection against different cyber threats. These platforms offer features like threat detection and response, access control, and secure communication protocols.
Key-Words / Index Term :
Cyber, Security, IoT, Internet
References :
[1] K. Ashton, ‘Internet of Things’. RFID Journal, 22, pp.97–114, 2009.
[2] A. Aggarwal, N. Chaubey, K. A. Jani, “A simulation study of malicious activities under various scenarios in Mobile Ad hoc Networks (MANETs)”. In Proceedings of the 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), pp.827-834, 2013.
[3] J Gubbi, R Buyya, S Marusic, M Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions” Future Generation Computer Systems, 29(7), pp.1645–1660, 2013.
[4] R. Caceres, A. Friday, “Ubicomp systems at 20: Progress, opportunities, and challenges”, IEEEPervasive Computing, 11(1), pp.14–21, 2012.
[5] M. Darianian, M. P. Michael, “Smart home mobile RFID-based Internet-of-Things systemsand services”, In International conference on advanced computer theory and engineering, 2008.ICACTE’08, pp.116–120, 2008.
[6] R. Roman, J. Zhou, J. Lopez, “On the features and challenges of security and privacy indistributed internet of things”, Computer Networks, 57(10), pp.2266–2279, 2013.
[7] T. S. Lo ?pez, D. C. Ranasinghe, M. Harrison, D. McFarlane, “Adding sense to the Internet ofThings”, Personal and Ubiquitous Computing, 16(3), pp.291–308, 2012.
[8] M. Abomhara, G. M. Køien, “Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks”, Journal of Cyber Security, 4(1), pp.65-88, 2015.
[9] A. Furfaro, L. Argento, A. Parise, A. Piccolo, “Using virtual environments for theassessment of cybersecurity issues in IoT scenarios”, Simulation Modelling Practiceand Theory, 73, pp.43-54, 2017.
[10] X. Huang, P. Craig, H. Lin, H. Z. Yan, “SecIoT: a security framework for theInternet of Things”, Security and communication networks, 9(16), pp.3083-3094, 2016.
[11] P. Garikapati, K. Balamurugan, T.P. Latchoumi. “K-means partitioning approach to predict the error observations in small datasets” Int. J. Comput. Aided Eng. Technol., 17 (4), pp. 412-430, 2022.
[12] R. Geetha, T. Thilagam, “A review on the effectiveness of machine learning and deep learning algorithms for cyber security”, Arch. Comput. Methods, Eng., 28 (4) (2021), pp.2861-2879, 2021.
[13] N. Unnisa A, M. Yerva, K. Mz, “Review on intrusion detection system (IDS) for Network security using machine learning algorithms”, International Research Journal on Advanced Science Hub, 4 (3) (2022), pp.67-74, 2022.
[14] K. Balamurugan, T.P. Latchoumi, T.P. Ezhilarasi, “Wearables to improve efficiency, productivity, and safety of operations”, Smart Manufacturing Technologies For Industry, 4.0, CRC Press (2022), pp.75-90, 2022.
[15] V. Gaur, R. Kumar, “Analysis of machine learning classifiers for early detection of DDoS attacks on IoT devices”, Arabian J. Sci. Eng., 47 (2) (2022), pp.1353-1374, 2022.
[16] M.A. Ferrag, O. Friha, L. Maglaras, H. Janicke, L. Shu, “Federated deep learning for cyber security in the internet of things: concepts, applications, and experimental analysis”, IEEE Access, 9 (2021), pp.138509-138542, 2021.
[17] T.P. Latchoumi, R. Swathi, P. Vidyasri, K. Balamurugan, “Develop new algorithm to improve safety on WMSN in health disease monitoring”, 2022 International Mobile and Embedded Technology Conference (MECON), IEEE (2022, March), pp. 357-362, 2022.
[18] J. Thom, N. Thom, S. Sengupta, E. Hand, “Smart recon: Network traffic fingerprinting for IoT device identification”, 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), IEEE (2022, January), pp.72-79, 2022.
[19] D. Saha, G.N.R. Devi, S. Ponnusamy, J. Pandit, S. Jaiswal, P.K. Bhuyan, “Application of nanotechnology in neural growth support system”, 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), IEEE (2022, October), pp.1-6, 2022.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.