DOI QR코드

DOI QR Code

Securing the IoT Frontier: Exploring the Limitation and Future Directions in Cybersecurity

  • Received : 2024.03.02
  • Accepted : 2024.03.15
  • Published : 2024.05.31

Abstract

As the Internet of Things (IoT) continues to permeate every facet of modern life, the imperative to secure this vast and dynamic frontier becomes increasingly paramount. This presents a comprehensive exploration of the challenges and opportunities inherent in safeguarding the interconnected web of IoT devices. The research critically examines the limitations of current cybersecurity measures through an extensive review of diverse topics, including IoT network performance, smart grid security, and the escalating cyber threats against critical infrastructures. A meticulous analysis of research findings underscores the need for enhanced infrastructure and ongoing research to fortify the cybersecurity mechanisms surrounding IoT objects. We underline the imperative of relentless research efforts to parry the advancing threats and leverage the promise of nascent technologies. Our findings affirm the pivotal influence of robust cybersecurity measures in crafting a resiliently connected ecosystem. The paper underscores the importance of ongoing research to address evolving threats and harness the potential of emerging technologies, reaffirming the central role of cybersecurity in shaping a secure interconnected world. In conclusion, the study emphasizes the dynamic and ever-evolving nature of cybersecurity on the IoT frontier. It unveils a complex landscape of challenges, ranging from network performance intricacies to the security concerns of critical infrastructures.

Keywords

References

  1. T. Saba, A. Rehman, T. Sadad, H. Kolivand, and S. A. Bahaj, "Anomaly-based intrusion detection system for IoT networks through deep learning model," Computers and Electrical Engineering, vol. 99, Apr. 2022, DOI: 10.1016/j.compeleceng.2022.107810.
  2. A. Corallo, M. Lazoi, M. Lezzi, and A. Luperto, "Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review," Computers in Industry, vol. 137. Elsevier B.V., May 01, 2022. DOI: 10.1016/j.compind.2022.103614.
  3. A. T. Chatfield and C. G. Reddick, "A framework for Internet of Things-enabled smart government: A case of IoT cybersecurity policies and use cases in U.S. federal government," Gov Inf Q, vol. 36, no. 2, pp. 346-357, Apr. 2019, DOI: 10.1016/j.giq.2018.09.007.
  4. M. Ficco and F. Palmieri, "Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios," Journal of Systems Architecture, vol. 97, pp. 107-129, Aug. 2019, DOI: 10.1016/j.sysarc.2019.04.004.
  5. M. Z. Gunduz and R. Das, "Cyber-security on smart grid: Threats and potential solutions," Computer Networks, vol. 169, Mar. 2020, DOI: 10.1016/j.comnet.2019.107094.
  6. K. Kimani, V. Oduol, and K. Langat, "Cyber security challenges for IoT-based smart grid networks," International Journal of Critical Infrastructure Protection, vol. 25, pp. 36-49, Jun. 2019, DOI: 10.1016/j.ijcip.2019.01.001.
  7. R. O. Andrade and S. G. Yoo, "Cognitive security: A comprehensive study of cognitive science in cybersecurity," Journal of Information Security and Applications, vol. 48, Oct. 2019, DOI: 10.1016/j.jisa.2019.06.008.
  8. J. Slupska and L. M. Tanczer, "Threat Modeling Intimate Partner Violence: Tech Abuse as a Cybersecurity Challenge in the Internet of Things," in The Emerald International Handbook of Technology-Facilitated Violence and Abuse, Emerald Group Publishing Ltd., 2021, pp. 663-688. DOI: 10.1108/978-1-83982-848-520211049.
  9. N. Z. Jhanjhi, M. Humayun, and S. N. Almuayqil, "Cyber security and privacy issues in industrial internet of things," Computer Systems Science and Engineering, vol. 37, no. 3, pp. 361-380, 2021, DOI: 10.32604/CSSE.2021.015206.
  10. C. Chong, K. Lee, and G. Ahmed, "Improving Internet Privacy, Data Protection and Security Concerns." [Online]. Available: https://journals.gaftim.com/index.php/ijtim/issue/view/1PublishedbyGAF-TIM,gaftim.com
  11. N. Moustafa, "New Generations of Internet of Things Datasets for Cybersecurity Applications based Machine Learning: TON_IoT Datasets."
  12. P. Podder, S. Bharati, M. Rubaiyat, H. Mondal, P. K. Paul, and U. Kose, "Artificial Neural Network for Cybersecurity: A Comprehensive Review."
  13. S. N. Matheu, J. L. Hernandez-Ramos, A. F. Skarmeta, and G. Baldini, "A Survey of Cybersecurity Certification for the Internet of Things," ACM Computing Surveys, vol. 53, no. 6. Association for Computing Machinery, Feb. 01, 2021. DOI: 10.1145/3410160.
  14. A. N. Lone, S. Mustajab, and M. Alam, "A comprehensive study on cybersecurity challenges and opportunities in the IoT world", Security and Privacy, vol 6, no. 6, 2023. DOI: 10.1002/spy2.318
  15. A. Nazir and R. A. Khan, "A novel combinatorial optimization based feature selection method for network intrusion detection," Comput Secur, vol. 102, Mar. 2021, DOI: 10.1016/j.cose.2020.102164.
  16. A. Sarfaraz, R. K. Chakrabortty, and D. L. Essam, "A tree structure-based improved blockchain framework for a secure online bidding system," Computer Security, vol. 102, Mar. 2021, DOI: 10.1016/j.cose.2020.102147.
  17. R. O. Andrade, S. G. Yoo, L. Tello-Oquendo, and I. Ortiz-Garces, "A Comprehensive Study of the IoT Cybersecurity in Smart Cities," IEEE Access, 2020, DOI: 10.1109/ACCESS.2020.3046442.
  18. T. Kulik, P. W. V. Tran-Jorgensen, J. Boudjadar, and C. Schultz, "A framework for threat-driven cyber security verification of IoT Systems," in Proceedings - 2018 IEEE 11th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2018, Institute of Electrical and Electronics Engineers Inc., Jul. 2018, pp. 89-97. DOI: 10.1109/ICSTW.2018.00033.
  19. R. Paul, Institute of Electrical and Electronics Engineers. New York Section, Institute of Electrical and Electronics Engineers. Region 1, IEEE-USA, and Institute of Electrical and Electronics Engineers, 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) : 28th- 31st October 2020, New York, USA, virtual conference.
  20. I. Ashraf et al., "A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry," IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 2677-2690, Feb. 2023, DOI: 10.1109/TITS.2022.3164678.
  21. J. He, T. Li, B. Li, X. Lan, Z. Li, and Y. Wang, "An immune-based risk assessment method for digital virtual assets," Comput Secur, vol. 102, Mar. 2021, DOI: 10.1016/j.cose.2020.102134.
  22. S. Chakrabarti et al., 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) : 7th-9th January, 2019, University of Nevada, Las Vegas, NV, USA.
  23. M. Saharkhizan, A. Azmoodeh, A. Dehghantanha, K. K. R. Choo, and R. M. Parizi, "An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic," IEEE Internet Things J, vol. 7, no. 9, pp. 8852-8859, Sep. 2020, DOI: 10.1109/JIOT.2020.2996425.
  24. R. Da and M. Zekeriya Gunduz, "Analysis of Cyber-Attacks in IoT-based Critical Infrastructures."
  25. L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, "IoT privacy and security: Challenges and solutions," Applied Sciences (Switzerland), vol. 10, no. 12, Jun. 2020, DOI: 10.3390/APP10124102.
  26. A. Echeverria, C. Cevallos, I. Ortiz-Garces, and R. O. Andrade, "Cybersecurity model based on hardening for secure internet of things implementation," Applied Sciences (Switzerland), vol. 11, no. 7, Apr. 2021, DOI: 10.3390/app11073260.
  27. A. Djenna, S. Harous, and D. E. Saidouni, "Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure," Applied Sciences (Switzerland), vol. 11, no. 10, May 2021, DOI: 10.3390/app11104580.
  28. R. J. Raimundo and A. T. Rosario, "Cybersecurity in the Internet of Things in Industrial Management," Applied Sciences (Switzerland), vol. 12, no. 3. MDPI, Feb. 01, 2022. DOI: 10.3390/app12031598.
  29. M. R. Al Asif, K. F. Hasan, M. Z. Islam, and R. Khondoker, "STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems," Jan. 2022, [Online]. Available: http://arxiv.org/abs/2201.09493
  30. F. Mohd Ali, N.A.M Yunus, N.N. Mohamed, M. Mat Daud, E. A. Sundararajan, "A Systematic Mapping: Exploring Internet of Everything Technologies and Innovations", Symmetry 2023, vol. 15, no. 11 https://doi.org/10.3390/sym15111964