A network is formed by connecting devices together in order to carry out designated functions. Both traditional and cellular networks are considered to be feasible alternatives. The acquisition and transmission of valuable knowledge aided by network connectivity might provide individuals with potential advantages. The utilization of network infrastructure is crucial for facilitating the efficient transfer of data. The notion of information security applies to an organization's goal of protecting data while it is being transmitted across a network. According to prior research the three primary goals of information security encompass the preservation of data confidentiality, the assurance of data integrity, and the regulation of data access exclusively to authorized personnel. The examination of data security in the realm of the IoT and cloud computing is a nascent field within the broader discipline of computer security. The present topic has the potential to leverage the current knowledge and insights derived from the established domain of data flow management for security [45]. In the realm of data security, the inherent partial orders have performed a pivotal and satisfactory function. Within a given network, entities exhibit varying levels of secrecy or integrity, which are dependent on their place within the partial order. The research presented in this paper focuses on the development of labeling systems that efficiently assign security criteria to precisely locate elements within network partial orders. The incorporation of illustrative instances effectively demonstrated well-established concepts in the domain of data security, encompassing disputes, aggregation, and consolidation. The demonstration involves illustrating how entities in incomplete orders can be updated through actions done by users or managers, including addition, deletion, or relocation.
To establish a robust and protected end-to-end connection across various services, it is crucial to effectively tackle the multitude of security concerns linked to current communication technology. Furthermore, the current security mechanisms that are often perceived as reliable may be susceptible to possible vulnerabilities given the recent and rapid progress in quantum technologies. Therefore, in order to adequately mitigate prospective quantum computer attacks, contemporary security systems must feature resilient quantum technology. The study conducted introduces a new and efficient approach for encrypting images, utilizing the concept of QW. The purpose of this approach is to augment the level of security in the transmission of data within IoT systems and wireless networks that use edge computing. The methodology under consideration involves the construction of permutation boxes by using the non-linear dynamic characteristics of QW. The analysis of inter-pixel correlations is unachievable in determining the content of encrypted images, mostly due to their intrinsic random nature. In addition, the entropy value is estimated to be 8, suggesting a greater proportion of pixels experiencing alterations.
The major parameters demonstrate a notable degree of sensitivity, featuring a substantial critical region that can survive diverse types of attacks, reaching a level of 99.61 %. Li et al. presented a data security monitoring system that employs narrow-band IoT technology. The objective of their study was to address the difficulties related to the erroneous classification of data and the constrained efficacy of conventional data monitoring methodologies. The first stage in the data collecting process for the intranet was the creation of a model for network data collection and the determination of the most effective configuration for a sensor node. The development of dynamic intranet data analysis indexes was conducted based on three separate perspectives, which were developed through an examination of the data's characteristics. The findings from the conducted tests demonstrate that the suggested methodology continuously attains its desired objectives in relation to accuracy rate, with a performance surpassing 90%. Additionally, the classification time remains below 4 seconds, and the energy consumption remains below 150 Joules. These outcomes remain consistent regardless of the occurrence or absence of a network attack.
The IoT frequently offers crucial services for the creation of applications, encompassing data collection, management, as well as device and data security. This encompasses a range of devices or gadgets that actively engage in interactions and computations, with the primary objective of augmenting the convenience and security aspects of our everyday existence. The IoT possesses the capacity to facilitate the automation of inventories, allowing for real-time monitoring of things, and aiding in the administration of information and state relevant to diverse objects. In order to facilitate the transfer of a substantial amount of data between network devices, it is imperative to develop a robust security architecture that guarantees the maintenance of data integrity, confidentiality, authentication, and authorization. The matter of security in the IoT is progressively presenting a substantial obstacle for security experts as they endeavor to reduce susceptibility to malicious attacks. The presence of numerous security vulnerabilities in Mobile devices requires the construction of a data routing system to enable the transmission of collected data. The proliferation of IoT technology has resulted in substantial alterations to the daily routines of citizens in various countries, hence generating a profound worldwide influence. The protection of IoT networks requires security procedures similar to those employed for other software programs, as the data they produce frequently includes sensitive information. The current security mechanisms implemented in these networks are insufficient in effectively addressing all security objectives. The prompt emphasizes the necessity of promptly implementing protective measures to safeguard data against many forms of attacks upon its identification within the domain of the IoT. In addition, it is crucial to ascertain the attainability of data integrity, access control, confidentiality, and authentication for all pertinent entities.
The internet systems possess several significant attributes that warrant attention in the realm of security-conscious routing. These attributes encompass a multi-hop autonomous architecture, dynamic topology alterations resulting from mobile IoT devices, limited connection duration, delays in media access, and susceptibilities to security breaches across multiple layers. Consequently, these characteristics engender ongoing discussions regarding the need for security-conscious routing in the IoT domain. The utilization of cross-layer routing becomes essential in order to optimize network efficiency by picking the most efficient routing choice. The incorporation of dependency factors as routing parameters across different protocol levels has been seen established a secure cross-layer protocol design that employs routing parameters obtained from data exchanged at the Media Access Control (MCA) layer. The SI-SLnO technique takes into account many restrictions, such as distance, energy consumption, and risk factors associated with a given route, in order to make well-informed decisions regarding routing. The risk component was calculated for each ideal path. The assessment of data privacy requirements was conducted by adopting threshold-based risk factor utilization, utilizing Elliptic Curve Cryptography (ECC) and the Elgamal cryptosystem. Various measurements were utilized to validate the superiority of the proposed secure cross-layer protocol. The constrained access to energy and computational resources in IoT devices is a substantial obstacle for doing research on communication security and hacking within these networks. The urgency to reduce energy waste arises from the significant power consumption associated with effective security systems. The utilization of optimized application-specific security protocols is a common strategy to improve the efficiency of data transport while simultaneously maintaining a strong level of security. It is imperative that the optimization process does not have any negative impact on the functionality of the security measures that are in place, such as confidentiality, integrity, and authenticity. The Host Identification Protocol (HIP) is a security method that was being optimized for use in the host identification protocol by Kanuch and Macko. Numerous opportunities for enhancement have been found, and a subset of these have been integrated into the proposed E-HIP optimized method, subsequent to a comprehensive review of pertinent literature. The Open HIP module, which is an open-source software component, has been customized and deployed to facilitate the establishment of a link between physical hardware devices. This adaptation has been made specifically for the purpose of conducting testing. The process of encrypting the transmission was successfully conducted. The experimental evaluation has revealed that the proposed optimization technique yields a notable enhancement in energy efficiency, with an estimated rise of 20%have put forth a range of group-based Authentication and Key Agreement (AKA) strategies in the extant literature, with the aim of attaining authentication. These techniques effectively meet all established security standards, but not limited to privacy protection, reciprocal authentication, integrity, and secrecy. However, none of them possess the necessary qualifications required to effectively handle the principal difficulty encountered by the information network. Moreover, these methods are vulnerable to widely recognized attacks and demonstrate insufficient effectiveness in preserving the unlinkability of the group key. The implementation of certain protocols requires the individual identification of each communication device belonging to a particular machine type in order to enable simultaneous access to the communication network. This process, however, leads to an additional burden on the network in the form of increased congestion. The SEGB-AKA protocol successfully accomplishes the objectives of ensuring both forward and backward confidentiality of keys, while also mitigating the drawback associated with the dependence on a solitary key throughout the authentication procedure. The research findings demonstrate that the protocol demonstrates enhanced performance in relation to network overhead and effectively fulfills the predetermined requirements.
This response will delineate the various variables that are crucial for guaranteeing security in machine-to-machine communication.The first determination of the optimal quantity of authorized access requests was conducted in a dynamic way for each Vehicle-to-Grid (V2G) network domain. The objective of this endeavor was to effectively establish a system for access admittance control that takes into account capacity-related considerations, including the potential for overload, limitations in system capacity, and the mobility of electric vehicles. To ensure the implementation of robust access authentication measures and to ensure that sessions are only conducted by authorized individuals, a comprehensive authentication model incorporating specific authentication protocols was adopted. The primary objective of this activity was to facilitate reciprocal authentication and ensure the preservation of data confidentiality inside defined sessions. The accomplishment was attained through the process of confirming the presence of preexisting data concerning the reliable linkage between the relevant V2G network domains. The discourse also addressed the subjects of effective session termination with forward security and session recovery without the necessity of an additional verification delay. The presentation of the analytical and assessment outcomes was conducted with the purpose of showcasing the effectiveness of Access Auth. The methodology can be utilized to construct a comprehensive database, enabling anyone to examine, organize, and efficiently utilize the data. It is anticipated that the use of this methodology will improve the reliability and availability of the data, hence leading to improved service delivery for consumers. The primary aim of the study done was to design and construct a data exchange protocol that is both unique and dependable, with the ultimate goal of ensuring the security of data transfer. The main area of research pertains to the examination of dependability and the validation of trade process behavior. The anti-interference and security authentication method is evaluated through a simulation experiment, which is conducted after analyzing abnormal phenomena in IoT traffic, understanding the principles of network traffic, constructing an anti-interference model for multi-terminal power communication networks, and establishing a noninterference model. The findings of the research demonstrate that augmenting the quantity of antennas resulted in a reduction in the likelihood of erroneous detection, decreasing it from 10−1 to 10−4. The enhanced precision leads to improved efficiency in the identification of active users. HTTP Plus SSL has become the prevailing protocol for data verification and security authentication in network environments. The sector pertaining to anti-interference technology has undergone significant growth. The global market has witnessed a substantial rise in its annual growth rate, nearly reaching twice its prior worth. Furthermore, there has been a significant expansion in the size of the market, with an annual growth rate of roughly 50%.
The IoT plays a substantial role in the practical domain by offering autonomous support for operational and communication functionalities. This allows for the facilitation and maintenance of sophisticated services that are commonly utilized in daily activities. To effectively address the diverse range of threats targeting IoT networks, it is imperative to conduct a thorough analysis of security protocols in forthcoming iterations of IoT and devise sophisticated strategies to uphold confidentiality. The blockchain technology has emerged as a viable alternative for providing notable attributes such as enduring confidentiality, authentication, and resilience. introduced a distributed security architecture in their research, which integrates Software-Defined Networking (SDN) and edge cloud technologies, while also incorporating blockchain functionality. The mitigation of security attacks targeting the edge layer of the IoT network is facilitated by the deployment of security attack monitoring mechanisms at the cloud layer. The utilization of SDN has allowed for the facilitation of network traffic flow management in a dynamic fashion through the implementation of a gateway. The aforementioned capacity demonstrated its advantageous nature in the process of identifying security assaults through the detection of network traffic flows that exhibited suspicious characteristics. Moreover, it successfully reduced security attacks by hindering the advancement of these questionable streams. The findings suggest that the security architecture described in this study successfully addresses the issues pertaining to data confidentiality that arise from the convergence of the SDN paradigm, edge cloud, and blockchain technology.
One aspect of concern within IoT sector relates to meeting the urgent requirements of modern consumers for dependable transmission services, given the swift proliferation of IoT technologies inside the information society. The issue of ensuring the security of data exchange and transmission over internet networks has continually presented difficulties introduced an innovative security authentication methodology for the IoT in their scholarly article. This approach combines a dynamic Bayesian network with a robust protocol, effectively tackling the existing research gap in authentication for IoT security. The network has successfully incorporated a robust measurement and integrated security verification system based on public key cryptography to aid users of the IoT in choosing a data transmission route that ensures both a high level of security and reliability. Consequently, there was an enhancement in the dissemination of security information and the determination of routing alternatives, as it incorporated the assessment of node credibility and path dependability. The evaluation findings suggest that the method employed in real-time applications demonstrates greater performance in terms of overhead and computational complexity when compared to other algorithms. The application shown a high level of adaptability and effectively responded to a denial-of-service assault, thereby reducing the risk presented by abnormal Internet of Things entities. The incorporation of blockchain technology into Peer-to-Peer (P2P) networks has presented a viable structure for the advancement of IoT and Beyond 5G applications. The incorporation of a distributed architecture and security services within the network enabled an enhanced range of financial activities, hence offering a significant benefit. One of the primary observations in IoT-based networks is the existence of a diverse array of IoT devices, accompanied with notable security concerns and obstacles related to energy consumption. The adoption of several blockchain technologies, specifically public blockchain for P2P communication and private blockchain for SDN, is regarded as a feasible strategy. The system has been enhanced with the integration of an extra component. This component enables the sender to digitally sign the specific action during the data transfer process between two users. The primary objective of this integration is to bolster confidentiality and mitigate the risk of repudiation. Public-key value-based signatures are produced by employing the private key of the transaction and afterwards revealed in conjunction with it. The confirmation of the action was achieved by the nodes utilizing a signature that is based on the value of the public key that was generated. The utilization of hashing in encryption provides an increased level of immutability. When compared to the approaches now in use, the findings of this study demonstrated a higher level of performance in terms of speed and reaction time. Additionally, there was a notable decrease in both end-to-end latency and overhead. Additionally, the research findings demonstrated the implementation of heightened security protocols during the process of data transfer. The project employed the Pyethereum testing utility, a constituent of the Ethereum platform. In their publication, introduced an innovative security methodology designed specifically for dispersed IoT systems. ChaCha20 is widely acknowledged as the dominant lightweight encryption method in modern cryptographic frameworks. To augment security and increase the degree of unpredictability, the generation of random numbers is implemented by utilizing ideas derived from cellular automata. The posting and saving operations were enhanced with the implementation of many layers of data protection, achieved by utilizing double encryption. Moreover, it serves to uphold the authenticity of communications, accelerate the process of execution, authenticate users, and enable the secure exchange of data among various communication entities. The successful completion of the registration process is of utmost importance for the IoT device that is connected to the gateway server.
The efficacy of the proposed concept was demonstrated. Wireless networks encompass communication technologies that facilitate the transmission of data and information without necessitating physical connections or wires. Wireless sensing networks are of paramount importance in the context of the IoT and have been widely employed in several fields of human activity. The process of verifying identity in wireless sensor networks is an essential mechanism that ensures users can securely access real-time data generated by sensor nodes. This method plays a significant role in limiting potential dangers. In the context of an IoT enabled Wireless Sensor Network (WSN), a multitude of small-scale sensors are utilized to gather data and afterwards transmit it to centralized repositories. The sensors, which rely on battery power and possess finite resources, direct a substantial proportion of their energy towards the functions of detecting, gathering, and transmitting data. The matter of security poses a substantial apprehension within these networks during the transmission of data, owing to their vulnerability to a range of attacks, with the wormhole attack being the most severe. The commencement of these attacks takes place without the acquisition of crucial network information, so presenting substantial dangers to the effectiveness, security, and communication of the network. T The ESWI (Enhanced Security Wormhole Intrusion) methodology was devised with the aim of enhancing both efficacy and security in the identification of wormhole attacks. The intentional simplification and reduction of complexity in the design of this method aim to minimize operational overhead and energy consumption. The simulated outcomes of their approach demonstrated comparable levels of detection rates and packet transit ratios. Moreover, it resulted in a significant decline in energy usage, a drop in the duration of end-to-end communication, and an improvement in overall performance. Wireless sensor networks, which are a crucial element of the IoT, have a wide range of applications in several fields of human life. The process of identity identification is crucial in enabling users to safely retrieve real-time data from sensor nodes within wireless sensor networks. A Wireless Sensor Network (WSN) based on the IoT is utilized to collect data and send it to a centralized storage system. The central emphasis of energy utilization in these devices, which rely on battery power and possess restricted resources, is oriented towards the activities of data detection, collecting, and transmission. The security aspect holds significant importance in relation to the exchange of data within these networks, as they are susceptible to many dangers, with tunnel assaults being the most severe.
To guarantee the preservation of data confidentiality, integrity, and availability, it is crucial for IoT devices equipped with IPv6 to possess interoperability with the Internet Protocol Security (IPSec) protocol. The principal aim of doing a port check is to augment the security of Internet of Things (IoT) devices. However, it is crucial to acknowledge that this procedure might potentially detrimentally affect the performance of IPSec services, particularly in relation to network speed. IDPS is employed to enhance the security of internet devices over the IEEE 802.11ah WLAN. proposed unique mathematical models for the assessment of security in the IoT.
The models in question have determined an optimal scanning rate for security administrators by taking into account the usage of IPsec services and the performance of port-scanning networks. Furthermore, it is important to acknowledge that the existing solutions lack the inclusion of built-in verification as a distinctive attribute. Therefore, the study conducted introduced a robust and effective framework for the IoT by leveraging WSN technology. The COOJA simulator was utilized to conduct a comparative analysis between the suggested security strategy and the currently implemented security systems, specifically SPECK and SIMON. The proposed methodology demonstrated superior performance in comparison to alternative approaches. It achieved a reduction of 2% in CPU cycles, a decrease of 10% in execution time, a 4% decrease in memory needs, and a minimum improvement of 10% in security efficacy.
The two-factor authentication method described employs an elliptic curve cryptosystem and its security is validated through the utilization of the formal proof tool ProVerif. The proposed methodology demonstrated superior security compared to analogous strategies, while concurrently upholding acceptable levels of computational cost effectiveness. Dong Chen et. Al, proposed a novel verification methodology that was specifically tailored for Wireless Sensor Networks (WSNs). The proposed methodology successfully tackled common obstacles and showcased its compliance with IoT security properties, specifically when compared to some contemporary schemes concerning WSN security characteristics. The technique known as Data Authentication and En-Route Filtering (DAERF) for WSNs within the framework of the IoT was proposed. According to their security analysis, it was concluded that the DAEF shown proficient capabilities in mitigating node compromise and denial of service attacks. These assaults primarily aimed at disrupting reports and selectively sending data were effectively countered by DAEF. Furthermore, a comprehensive analysis of energy use was carried out alongside the assessment of the benefits of DAEF in relation to similar schemes. The devices within the WSN situated at the Data Centre (DC) in the Energy Internet of Things (EIoT) demonstrated vulnerability to attacks and were susceptible to encountering difficulties associated with Information Security Management (ISM), such as suboptimal real-time performance and considerable complexity. presented a comprehensive elucidation of the structural arrangement of a DC WSN designed specifically for the EIoT. Simulations were performed on a WSN utilizing the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol. These simulations were used to make predictions regarding various forms of attacks. The aforementioned data was employed in the creation of a dynamic and real-time strategy for the WSN in the context of ISM. The present study focused on enhancing the framework and methods of LEACH, a widely recognised protocol in the field of wireless sensor networks. Furthermore, the utilization of information fusion techniques was implemented in order to mitigate the magnitude of data transfer. The efficacy of the proposed approach in ensuring communication between nearby nodes and between higher and lower levels was proved through the findings of a simulated exercise. Furthermore, it enhanced the robustness of network security by including timely key updates, and promoted streamlined data transmission through the mechanism of information fusion.
Investigated many facets of key management in the context of mobile IoT by employing a widely recognized identity cryptosystem. The initial allotment of storage is established as 32 bytes and later increases to 84 bytes during the first stage of registration, 82 bytes during the second stage of registration, and 356 bytes during the third stage of authentication. This expansion is a result of an augmentation in the number of bytes required for login authentication. This approach has demonstrated several advantages in terms of enhancing safety performance. The researchers conducted an analysis in their work on secure beamforming for a two-way Cognitive Radio (CR). conducted a study to examine the benefits of Simultaneous Wireless Data and Power Transfer (SWDPT) in the context of an internet network. The IoT manager, located centrally within the secondary network, utilizes the primary spectrum to facilitate the transmission of data and provision power to the remaining IoT devices. Furthermore, it offered relay support and implemented joint physical layer protection mechanisms to mitigate the risk of eavesdropping for two Primary Users (PUs). The objective of the study was to improve the level of information security by optimizing the Secrecy Sum Rate (SSR) for PUs using a collaborative approach involving the design of the beamforming matrix and vectors at the central controller. The initial concept entailed employing a branch-reduce-and-bound-based technique to effectively tackle the nonconvex problem. The process involved in this study consisted of determining an upper limit for the sum of Squared Residuals (SR) and presenting a practical solution through Gaussian randomization. Nevertheless, the complexity of the procedure was increased by the necessity of incorporating two layers of repetition. The authors presented the simulation results to showcase the relative efficacy of their proposed optimization tactics compared to established methodologies.
In the domain of network engineering, there has been notable progress in the Industrial Internet of Things (IIoT), leading to a rise in the occurrence of data leakage problems within networks on a yearly basis. A revolutionary anti-intrusion monitoring device has been developed to boost the security defense of IIoT systems while adhering to privacy regulations. The implementation of the IoT requires strict adherence to stringent standards in its structural system. Additionally, it necessitates the implementation of robust security performance criteria in an environment that is distinguished by potential network threats. The network system should adopt a methodology that is characterized by a limited occurrence of data loss and a high level of stability developed an early deep-learning network technology by a thorough assessment of various network topologies. The utilization of Convolutional Neural Network technology was employed to improve and refine the LeNet-5 network, leading to the creation of a fresh LeNet-7 model. The development of a comprehensive system for monitoring and preventing intrusions in the IIoT was achieved through the integration of three independent network technologies. The effectiveness of the system was evaluated and confirmed. The algorithm demonstrated a high degree of accuracy in detecting the desired outcomes, with a low incidence of false-positive results, and revealed a noteworthy level of precision in data handling. In order to improve performance, the study assessed the model's ability to handle high-performance data and contrasted it with privacy-aware task offloading schemes. Therefore, the implementation of this technology has the capacity to ensure the safeguarding of data confidentiality within the framework of IIoT in compliance with pertinent legal regulations.
The delivery method within the hospital information environment is currently experiencing a significant shift due to the incorporation of networked devices in the era of the IoT. The incorporation of the IoT into the healthcare industry presents significant potential for enhancing the effectiveness, safety, and quality of healthcare services, in addition to offering exciting technical, economic, and societal opportunities. However, the incorporation of these systems inherently introduces security vulnerabilities, particularly the possibility of a data breach caused by the existence of malicious software intended to steal user login credentials. In addition, the possibility of the linked devices being vulnerable raises apprehensions around the potential disclosure of confidential patient information in the event of a security breach. The need of security has been more pronounced in the contemporary technological environment as a result of the extensive prevalence of IoT entities across diverse sectors. This includes the healthcare industry, which significantly depends on IoT-based solutions. Gordana et al, examine the methodology for anonymizing sensitive health data exchanged inside the IoT ecosystem using a wireless communication system. The algorithm employed in this system effectively preserves user privacy by implementing measures to shield sensitive records from unauthorized exposure. Consequently, it successfully upholds the principles of security and privacy during online user interactions. In addition, the strategy that was adopted incorporated a robust encryption technique, thereby enabling the safeguarding of confidential health data. In addition, an assessment of the anonymity feature of the methodology has been conducted using algebraic functions. The study's findings demonstrate that the utilization of the anonymization strategy successfully enhances the security features of the IoT system, specifically within hospital communication networks.
In the realm of the Home Area Network (HAN), sensors that possess IoT functionalities offer a reliable method for exchanging data securely, hence safeguarding the integrity of this data. The incorporation of sensors and the exchange of energy measurements and data inside the smart grid offer a fresh outlook on energy management. The main aim of the study done was to examine the secure transmission of data within a HAN and to guarantee the safeguarding of client data privacy during important and time-sensitive operations. The data were effectively sent in real-time with little latency in transmission. The devices were subjected to routine examinations in order to verify their effectiveness in delivering critical services that save lives and are time-sensitive. The main emphasis of this article is on the transmission of machine-to-machine data and the transportation of packets within the framework of the IoT. The technology enabled the immediate retrieval of user power usage data in personalized electronic devices, as well as via cloud-based systems. This research endeavor demonstrated the essential requirements for constructing an economically viable HAN for the IoT that is interconnected with a smart grid, with a specific emphasis on energy-conscious routing. The integration of sensors and a control gateway inside a clearly delineated boundary proved to be advantageous in the endeavor to conserve energy during the processing and transmission of data in the sophisticated design blueprint. The assessment of the data flow pattern and packet delivery rate was performed by employing a combination of simulated and actual data acquired from sensors and concentrators. The collected data and flow patterns were assessed through the utilization of MATLAB and a network simulator. The deployment of the IoT-HAN system shown significant benefits in enabling secure data transmission between networked devices within the HAN. In their study, introduced a prototype called Future Spaces, which encompasses both hardware and software components. This prototype offers a high level of control over connectivity inside the Internet of Things (IoT) framework. The presented prototype facilitates the efficient and reliable administration of intelligent residential dwellings. The use of specialized network segments, utilizing home routers equipped with SDN capabilities and the virtualization of network services in cloud settings, has resulted in improved networking security and automation. The disturbance impeded users' ability to discover, manage, and distribute interconnected resources across several domains, while also seamlessly responding to different usage configurations.
The primary objective of this study is to investigate the many obstacles and potential opportunities related to a certain phenomenon. The IoT facilitates the management and monitoring of the digital realm. The IoT is a cutting-edge technical development that enables the monitoring of critical data. The IoT has emerged as a feasible approach for mitigating complexity and augmenting system efficiency in the realms of transportation, healthcare, and cyber systems. Pervasive computing plays a crucial role in enabling the IoT to efficiently handle data and offer the necessary graphical user interface. The retrieval of data from any point on the world at any given time is made possible through the utilization of cloud computing, a computer system that enhances access to information. Classifies several studies based on the landscape of data security. The main focus of the studies highlighted in this context revolves around the topic of data privacy. Numerous academic studies have conducted analyses on the subjects of data sharing and data confidentiality. In the foreseeable future, it is plausible that there will be the possibility of encountering unresolved complexities with the examination of data security inside the framework of the IoT. The domain of IoT security continues to present substantial prospects for further progress. Given the abundance of ongoing studies and existing obstacles, it is imperative for researchers to allocate their attention strategically in this particular domain. There are a number of current challenges pertaining to the security of the IoT that can be recognized. The scalability of blockchain technology is notably limited in situations where a substantial quantity of servers are involved. There are several highly effective strategies available for node replacement, and the utilization of different resources has become a widely accepted method for tackling this issue. Utilizing machine learning methodologies, particularly AI and deep learning, to augment the efficacy of fog level improvement.
The main aim of fog sharing is to protect the computational capacities of fog-cloud systems. The prospective implementation of this approach may be viewed as a cause for optimism. The establishment of secure connections between various networks continues to require the utilization of end-to-end encryption methods and resilient shielding protocols. To successfully counteract hostile incursions, it is crucial for edge devices to possess a substantial degree of security and cognitive capabilities. The rapid expansion of IoT deployment across various industries has led to an increased focus on concerns regarding security. The IoT is presently in its early stages, mostly due to the significant research efforts conducted in recent years. The main impediment to the expansion of the IoT is the security domain, which gives birth to a multitude of challenges. Smart systems demonstrate the potential to effectively tackle many challenges faced in the industrial domain, although they do confront certain hindrances when it comes to seamlessly integrating with IoT and wireless sensors within the framework of Industry 4.0. Businesses and manufacturers face difficulties in effectively handling the growing volume of data that is being generated. The incorporation of artificial intelligence algorithms is crucial for the management of big data and the augmentation of system and device intelligence. Algorithms are utilized in order to process data across different time spans. The observed increase in the domain of security breaches and vulnerabilities in the IoT can be attributed to several factors. Firstly, there has been a notable growth in consumer and company awareness regarding these issues. Additionally, governmental and industrial entities have taken steps to address this concern by implementing labelling and certification programmes. Lastly, the costs associated with managing breaches in terms of public relations and reputation have also played a significant role in driving this rise.
Conclusion
The limited length of the user's input precludes the possibility of rewriting it in an academic manner. The prioritization of efforts towards increasing system security is of utmost importance for enterprises, given the widespread use of the IoT. The existence of vulnerabilities within a system carries the risk of system failure or cyberattack, leading to substantial consequences on a wide-ranging level. The domain of IoT security covers a wide array of techniques and methods designed to protect against potential cyber threats that specifically exploit the weaknesses of interconnected IoT devices. Currently, IoT security teams are primarily focused on addressing many challenges, which encompass but are not limited to inventory management, operational issues, device diversity, effective management techniques, data traffic management, and the persistent threat landscape. This research investigates the multifaceted components of data security within the context of network security, placing specific emphasis on the circumstances, implementations, and obstacles linked to this domain. The analysis mostly relies on preexisting research published on security concerns related to the IoT. A grand total of 510 items were identified by employing the aforementioned keywords. The presence of duplication led to the removal of 40 entries. Consequently, there was a decline observed in the overall quantity of articles, which amounted to 450. The objects undergo inspection and filtration according to predetermined criteria for inclusion and rejection. As a result, a comprehensive analysis was conducted using a total of 20 research that satisfied the predetermined criteria. These studies were selected from the years 2012 to 2022. Based on empirical evidence, it has been observed that the IoT sector has been proactively addressing security concerns over a prolonged duration through the deployment of IoT security solutions aimed at safeguarding systems and devices against potential intrusions and compromises.
The IoT frequently offers crucial services for the creation of applications, encompassing data collection, management, as well as device and data security. IoT devices or gadgets participate in interactions and computational processes in order to augment security and improve the overall quality of life. The IoT possesses the capacity to facilitate the automation of inventories, enable real-time monitoring of items, and provide support for the administration of information and the status of diverse entities. In order to facilitate the transfer of a substantial amount of data among network devices, it is imperative to develop a comprehensive security architecture that guarantees the maintenance of data integrity, confidentiality, authentication, and authorization. A multitude of research efforts have been devoted to investigating various approaches with the objective of improving the verification capabilities of a broad spectrum of systems, including wireless systems. The field of IoT security continues to present substantial prospects for further development. Given the abundance of ongoing studies and the related complexities, it is imperative for researchers to allocate their attention to this specific topic. The scalability of blockchain is considerably limited when there is a substantial number of servers involved. There are currently highly effective strategies available for the replacement of nodes, and the utilization of many resources has become a commonly accepted method for tackling this problem. In the future, upcoming endeavors may focus on a wide array of technologies, such as machine learning, artificial intelligence, blockchain, and various others.
Abbreviations:
Internet of Things (IOT)
Radio Frequency Identification (RFID)
Public Key Infrastructure (PKI)
Intrusion Detection System (IDS)
Research Queries (RQS)
Institute of Standards and Technology (NIST)
Quantum Walks (QW)
Media Access Control (MCA)
Host Identification Protocol (HIP)
Elliptic Curve Cryptography (ECC)
Authentication and Key Agreement (AKA)
Security-Enhanced Group-Based (SEGB)
Vehicle-to-Grid (V2G)
Software-Defined Networking (SDN)
Peer-to-Peer (P2P)
Wireless Sensor Network (WSN)
Enhanced Security Wormhole Intrusion (ESWI)
Wireless Sensor Network (WSN)
Internet Protocol Security (IPSEC)
Data Authentication and En-Route Filtering (DAERF)
Distributed Anonymous Entity Framework (DAEF)
Data Centre (DC)
Information Security Management (ISM)
Low-Energy Adaptive Clustering Hierarchy (LEACH)
Cognitive Radio (CR)
Simultaneous Wireless Data and Power Transfer (SWDPT)
Primary Users (PUS)
Secrecy Sum Rate (SSR)
Squared Residuals (SR)
Industrial Internet of Things (IIOT)
Home Area Network (HAN)
Reference
[1] A. A. G.-E. Ahmed and A. A. G.-E. Ahmed, “Benefits and Challenges of Internet of Things for Telecommunication Networks,” Telecommun. Networks - Trends Dev., Feb. 2019, doi: 10.5772/INTECHOPEN.81891.
[2] F. T. Jaigirdar, B. Tan, C. Rudolph, and C. Bain, “Security-Aware Provenance for Transparency in IoT Data Propagation,” IEEE Access, vol. 11, pp. 55677–55691, 2023, doi: 10.1109/ACCESS.2023.3280928.
[3] H. Ning, H. Liu, and L. T. Yang, “Cyberentity security in the internet of things,” Computer (Long. Beach. Calif)., vol. 46, no. 4, pp. 46–53, 2013, doi: 10.1109/MC.2013.74.
[4] A. Bogdanov et al., “PRESENT: An ultra-lightweight block cipher,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 4727 LNCS, pp. 450–466, 2007, doi: 10.1007/978-3-540-74735-2_31.
[5] F. Thabit, O. Can, A. O. Aljahdali, G. H. Al-Gaphari, and H. A. Alkhzaimi, “Cryptography Algorithms for Enhancing IoT Security,” Internet of Things (Netherlands), vol. 22, Jul. 2023, doi: 10.1016/j.iot.2023.100759.
[6] F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, “Internet of Things security: A survey,” J. Netw. Comput. Appl., vol. 88, pp. 10–28, Jun. 2017, doi: 10.1016/J.JNCA.2017.04.002.
[7] U. Farooq, N. Tariq, M. Asim, T. Baker, and A. Al-Shamma’a, “Machine learning and the Internet of Things security: Solutions and open challenges,” J. Parallel Distrib. Comput., vol. 162, pp. 89–104, Apr. 2022, doi: 10.1016/J.JPDC.2022.01.015.
[8] P. Peris-Lopez, Ed., “2015 International Workshop on Secure Internet of Things, SIoT 2015, Vienna, Austria, September 21-25, 2015,” SIoT, 2015, Accessed: Oct. 09, 2023. [Online]. Available: http://dblp.uni-trier.de/db/conf/siot/siot2015.html
[9] W. Detres, M. M. Chowdhury, and N. Rifat, “IoT Security and Privacy,” IEEE Int. Conf. Electro Inf. Technol., vol. 2022-May, pp. 498–503, 2022, doi: 10.1109/EIT53891.2022.9813933.
[10] E. Farooq, S. A. Khan, and W. H. Butt, “Covert network analysis to detect key players using correlation and social network analysis,” ACM Int. Conf. Proceeding Ser., Mar. 2017, doi: 10.1145/3018896.3025142.
[11] P. Mugariri, H. Abdullah, M. García-Torres, B. D. Parameshchari, and K. N. Abdul Sattar, “Promoting Information Privacy Protection Awareness for Internet of Things (IoT),” Mob. Inf. Syst., vol. 2022, 2022, doi: 10.1155/2022/4247651.
[12] S. Volpert, P. Eichhammer, F. Held, T. Huffert, H. P. Reiser, and J. Domaschka, “The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures,” Futur. Gener. Comput. Syst., vol. 141, pp. 243–257, Apr. 2023, doi: 10.1016/J.FUTURE.2022.11.024.
[13] A. Boudguiga, A. Olivereau, and N. Oualha, “Server assisted key establishment for WSN: A mikey-ticket approach,” Proc. - 12th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. 2013, pp. 94–101, 2013, doi: 10.1109/TRUSTCOM.2013.16.
[14] H. Zhou, G. Yang, Y. Xiang, Y. Bai, and W. Wang, “A Lightweight Matrix Factorization for Recommendation With Local Differential Privacy in Big Data,” IEEE Trans. Big Data, vol. 9, no. 1, pp. 160–173, Feb. 2023, doi: 10.1109/TBDATA.2021.3139125.
[15] A. Nakamura, K. Naito, and T. Yamazato, “Distributed processing framework for cooperative service among edge devices,” Dig. Tech. Pap. - IEEE Int. Conf. Consum. Electron., vol. 2023-January, 2023, doi: 10.1109/ICCE56470.2023.10043588.
[16] F. V. Meca, J. H. Ziegeldorf, P. M. Sanchez, O. G. Morchon, S. S. Kumar, and S. L. Keoh, “HIP Security architecture for the IP-based internet of things,” Proc. - 27th Int. Conf. Adv. Inf. Netw. Appl. Work. WAINA 2013, pp. 1331–1336, 2013, doi: 10.1109/WAINA.2013.158.
[17] D. Liu, P. Ning, and L. I. Rongfang, “Establishing pairwise keys in distributed sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 8, no. 1, pp. 41–77, Feb. 2005, doi: 10.1145/1053283.1053287.
[18] T. Ito, H. Ohta, N. Matsuda, and T. Yoneda, “A key pre-distribution scheme for secure sensor networks using probability density function of node deployment,” SASN’05 - Proc. 2005 ACM Work. Secur. Ad Hoc Sens. Networks, vol. 2005, pp. 69–75, 2005, doi: 10.1145/1102219.1102233.
[19] L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” Proc. ACM Conf. Comput. Commun. Secur., pp. 41–47, 2002, doi: 10.1145/586110.586117.
[20] G. De Meulenaer, F. Gosset, F. X. Standaert, and O. Pereira, “On the energy cost of communication and cryptography in wireless sensor networks,” Proc. - 4th IEEE Int. Conf. Wirel. Mob. Comput. Netw. Commun. WiMob 2008, pp. 580–585, 2008, doi: 10.1109/WIMOB.2008.16.
[21] W. Du, J. Deng, and Y. S. Han, “A key predistribution scheme for sensor networks using deployment knowledge,” IEEE Trans. Dependable Secur. Comput., vol. 3, no. 1, pp. 62–77, 2006, doi: 10.1109/TDSC.2006.2.
[22] E. Rescorla, “Diffie-Hellman Key Agreement Method,” Jun. 1999, doi: 10.17487/RFC2631.
[23] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” Wirel. Networks, vol. 20, no. 8, pp. 2481–2501, Oct. 2014, doi: 10.1007/S11276-014-0761-7.
[24] R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, “Towards viable certificate-based authentication for the Internet of Things,” HotWiSec 2013 - Proc. 2013 ACM Work. Hot Top. Wirel. Netw. Secur. Priv., pp. 37–41, 2013, doi: 10.1145/2463183.2463193.
[25] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of things: The road ahead,” Comput. Networks, vol. 76, pp. 146–164, Jan. 2015, doi: 10.1016/J.COMNET.2014.11.008.
[26] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Comput. Networks, vol. 57, no. 10, pp. 2266–2279, Jul. 2013, doi: 10.1016/J.COMNET.2012.12.018.
[27] K. T. Nguyen, M. Laurent, and N. Oualha, “Survey on secure communication protocols for the Internet of Things,” Ad Hoc Networks, vol. 32, pp. 17–31, Sep. 2015, doi: 10.1016/J.ADHOC.2015.01.006.
[28] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012, doi: 10.1016/J.ADHOC.2012.02.016.
[29] S. A. A. Shukor, M. Q. Aminuddin, and E. J. Rushforth, “Managing huge point cloud data through geometrical-based registration,” ACM Int. Conf. Proceeding Ser., Mar. 2017, doi: 10.1145/3018896.3056783.
[30] M. A. Taiye, S. S. Kamaruddin, and F. K. Ahmad, “Combined WSD algorithms with LSA to identify semantic similarity in unstructured textual data,” ACM Int. Conf. Proceeding Ser., Mar. 2017, doi: 10.1145/3018896.3056785.
[31] A. Harit, A. Ezzati, and R. Elharti, “Internet of things security: Challenges and perspectives,” ACM Int. Conf. Proceeding Ser., Mar. 2017, doi: 10.1145/3018896.3056784.
[32] M. Javaid and I. H. Khan, “Internet of Things (IoT) enabled healthcare helps to take the challenges of COVID-19 Pandemic,” J. Oral Biol. Craniofacial Res., vol. 11, no. 2, pp. 209–214, Apr. 2021, doi: 10.1016/J.JOBCR.2021.01.015.
[33] A. Ghasempour, “Internet of things in smart grid: Architecture, applications, services, key technologies, and challenges,” Inventions, vol. 4, no. 1, Mar. 2019, doi: 10.3390/INVENTIONS4010022.
[34] P. Radanliev and D. De Roure, “Alternative mental health therapies in prolonged lockdowns: narratives from Covid-19,” Health Technol. (Berl)., vol. 11, no. 5, pp. 1101–1107, Sep. 2021, doi: 10.1007/S12553-021-00581-3.
[35] S. Madakam, R. Ramaswamy, and S. Tripathi, “Internet of Things (IoT): A Literature Review,” J. Comput. Commun., vol. 03, no. 05, pp. 164–173, 2015, doi: 10.4236/JCC.2015.35021.
[36] J. Pike, T. Bogich, S. Elwood, D. C. Finnoff, and P. Daszak, “Economic optimization of a global strategy to address the pandemic threat,” Proc. Natl. Acad. Sci. U. S. A., vol. 111, no. 52, pp. 18519–18523, Dec. 2014, doi: 10.1073/PNAS.1412661112.
[37] T. Mohammed, C. Jean-Yves, B. Peter, and R. Christophe, “Petrogenesis of the post-collisional Bled M’Dena volcanic ring complex in Reguibat Rise (western Eglab shield, Algeria),” J. African Earth Sci., vol. 166, Jun. 2020, doi: 10.1016/J.JAFREARSCI.2015.04.003.
[38] P. J. Ryan and R. B. Watson, “Research challenges for the internet of things: What role can or play?,” Systems, vol. 5, no. 1, Mar. 2017, doi: 10.3390/SYSTEMS5010024.
[39] E. A. Kosmatos, N. D. Tselikas, and A. C. Boucouvalas, “Integrating RFIDs and Smart Objects into a UnifiedInternet of Things Architecture,” Adv. Internet Things, vol. 01, no. 01, pp. 5–12, 2011, doi: 10.4236/AIT.2011.11002.
[40] P. Radanliev and D. De Roure, “Epistemological and bibliometric analysis of ethics and shared responsibility—health policy and IoT systems,” Sustain., vol. 13, no. 15, Aug. 2021, doi: 10.3390/SU13158355.
[41] S. Rivard and S. L. Huff, “Factors of Success for End-User Computing,” Commun. ACM, vol. 31, no. 5, pp. 552–561, May 1988, doi: 10.1145/42411.42418.
[42] B. R. Hayes-Gill, “Monica Healthcare: From the research laboratory to commercial reality—A real-life case study,” Healthc. Technol. Lett., vol. 8, no. 1, pp. 1–10, Feb. 2021, doi: 10.1049/HTL2.12004.
[43] S. A. Kumar, T. Vealey, and H. Srivastava, “Security in internet of things: Challenges, solutions and future directions,” Proc. Annu. Hawaii Int. Conf. Syst. Sci., vol. 2016-March, pp. 5772–5781, Mar. 2016, doi: 10.1109/HICSS.2016.714.
[44] W. V. B. de Souza et al., “Using Crowdstorm to Prospect Innovations in Federal Institutions of Education in Brazil to Reduce Its Consumption of Electric Energy,” 49th Hawaii Int. Conf. Syst. Sci. (HICSS 2016), pp. 2819–2828, 2016, doi: 10.1109/HICSS.2016.353.
[45] C. Dobre, L. Bajenaru, I. A. Marinescu, and M. Tomescu, “Improving the quality of life for older people: From smart sensors to distributed platforms,” Proc. - 2019 22nd Int. Conf. Control Syst. Comput. Sci. CSCS 2019, pp. 636–642, May 2019, doi: 10.1109/CSCS.2019.00115.