DOI QR코드

DOI QR Code

IoT-based Application of Information Security Triad

  • 투고 : 2024.09.05
  • 발행 : 2024.09.30

초록

Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices..Make sure that the abstract is written as one paragraph.

키워드

참고문헌

  1. L. D. Xu, W. He, and S. Li, "Internet of Things in industries: A survey," IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233-2243, Nov. 2014. https://doi.org/10.1109/TII.2014.2300753
  2. P. K. Khatua, V. K. Ramachandaramurthy, P. Kasinathan, J.Y. Yong, J. Pasupuleti, and A. Rajagopalan, "Application and assessment of internet of things toward the sustainability of energy systems: Challenges and issues," Sustainable Cities and Society, vol. 53, pp. 101957, Feb. 2020.
  3. A. Dehghantanha, "Internet of Things Security and Forensics: Challenges and Opportunities," Future Generation Computer Systems, vol. 78, no. 2, pp. 544-546, 2018. https://doi.org/10.1016/j.future.2017.07.060
  4. S. A. Solangi, K. Khoumbati, and D. N. Hakro, "Multi-Hop Optimization in Wireless Sensor Networks using GA," Univ. Sindh J. Inf. Commun. Technol., vol. 2, no. 3, pp. 1-5, Nov. 2018.
  5. K. U. R. Khoumbati, S. A. Solangi, Z. Bhatti, and D. N. Hakro, "Optimal Route Planning by Genetic Algorithm for Wireless Sensor Networks," in ICISCT 2020 - 2nd Int. Conf. Inf. Sci. Commun. Technol, Feb. 2020.
  6. S. A. Solangi, D. N. Hakro, I. A. Lashari, K.-R. Khoumbati, Z. A. and Bhutto, and M. Hameed, "Genetic Algorithm Applications in Wireless Sensor Networks ( WSN ): A Review," Int. J. Manag. Sci. Bus. Res., vol. 1, no. 4, pp. 152-166, 2017.
  7. S. A. Solangi, K. Khoumbati, and D. N. Hakro, "Multi-Hop Optimization in Wireless Sensor Networks using Genetic Algorithm," Univ. Sindh J. Inf. Commun. Technol., vol. 3, no. 4, pp. 193-197, Nov. 2019.
  8. A. A. Shah, S. A. Solangi, and A. A. Shah, "Cloud Computing for Bio-Iinformatics: A Pakistani Perspective," in Third National Conference On Emerging Trends In Bioinformatics & Biosciences, Oct. 2019.
  9. V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal and B.Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures", IEEE Access, vol. 7, pp. 82721-82743, Jun. 2019. https://doi.org/10.1109/ACCESS.2019.2924045
  10. I. Ali, S. Sabir, and Z. Ullah, "Internet of Things Security, Device Authentication and Access Control: A Review" 2019.
  11. S. Nagarkar, and D. V. Prasad, "Evaluating Privacy and Security Threats in IoT-based Smart Home Environment", International Journal of Applied Engineering Research, ISSN 0973-4562, Vol. 14, no. 7, Nov. 2019.
  12. M. Frustaci, P. Pace, G. Aloi and G. Fortino, "Evaluating Critical Security Issues of the IoT World: Present and Future Challenges" IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483-2495, Aug. 2018. https://doi.org/10.1109/JIOT.2017.2767291
  13. Global scale of installed IoT devices, Available online: https://www.informationmatters.net/internet-of-things-statistics/ (accessed on 10 August 2021).
  14. S. Panchiwala, and M. Shah, "A Comprehensive Study on Critical Security Issues and Challenges of the IoT World." Journal of Data, Information and Management, vol. 29, no. 4, pp. 1-22, Dec. 2020 https://doi.org/10.1007/s42488-020-00030-2
  15. M. H. Miraz, M. Ali, S. Peter, P. S. Excell, and R. Picking "A Review on Internet of Things (IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT)", Internet Technologies and Applications (ITA), pp. 219-224, IEEE, 2015.
  16. S. Liu, K. Yue, Y. Zhang, H. Yang, L. Liu, and X. Duan, " The Research on IOT Security Architecture and Its Key Technologies," In Proceedings of the 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, October. 2018.
  17. H. Guo, J. Ren, D. Zhang, Y. Zhang, and J. Hu, "A scalable and manageable IoT architecture based on transparent computing," J. Parallel Distrib. Comput., vol. 118, pp. 5-13, Aug. 2018. https://doi.org/10.1016/j.jpdc.2017.07.003
  18. M. Obaidat, M. Khodiaeva, S. Obeidat, D. Salane, and J. Holst, "Security Architecture Framework for Internet of Things (IoT)," In Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), USA, October. 2019.
  19. A. Mosenia, and N. K. Jha, "A Comprehensive Study of Security of Internet-of-Things," IEEE Trans. Emerg. Topics Comput., vol. 5, pp. 586-602, Sep. 2016. https://doi.org/10.1109/TETC.2016.2606384
  20. K.M Sadique, R. Rahmani, and P. Johannesson, "Towards Security on Internet of Things: Applications and Challenges in Technology," Procedia Comput. Sci., vol. 141, pp. 199-206, Jan. 2018. https://doi.org/10.1016/j.procs.2018.10.168
  21. M. M. Dhanvijay, and S. C. Patil, "Internet of Things: A survey of enabling technologies in healthcare and its applications," Comput. Netw. vol. 153, 113-131, Apr. 2019. https://doi.org/10.1016/j.comnet.2019.03.006
  22. T. A. Ahanger, and A. Aljumah, "Internet of Things: A Comprehensive Study of Security Issues and Defense Mechanisms," IEEE Access, vol. 7, pp. 11020-11028, Nov. 2019 . https://doi.org/10.1109/ACCESS.2018.2876939
  23. I. Stellios, P. Kotzanikolaou, M. Psarakis, C. Alcaraz, and J. Lopez, "A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services," IEEE Commun. Surv. Tutor. Vol. 20, no. 4, pp. 3453-3495, Jul. 2018,. https://doi.org/10.1109/COMST.2018.2855563
  24. Nat'l Inst. of Standards and Technology, NIST Cloud Computing Forensic Science Challenges, NIST draft NISTIR 8006, 2014.
  25. NIST Computer Security Division. F. I. P. S. Standards for Security Categorization of Federal Information and Information Systems; NIST FIPS 199; NIST: Gaithersburg, MD, USA, 2004.
  26. N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, "Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations" IEEE Commun. Surv. Tutor, vol. 21, no. 3, pp. 2702-2733, Apr. 2019. https://doi.org/10.1109/COMST.2019.2910750
  27. H. Ghadeer, "Cybersecurity Issues in Internet of Things and Countermeasures," In Proceedings of the 2018 IEEE International Conference on Industrial Internet (ICII),, USA, Oct. 2018.
  28. O. Said and M. Masud, "Towards internet of things: Survey and future vision," International Journal of Computer Networks (IJCN), vol. 5, no. 1, 2013.
  29. H. Tao, M. Z. A. Bhuiyan, A. N. Abdalla, M. M. Hassan, J. M. Zain, and T. Hayajneh, "Secured Data Collection with Hardware-Based Ciphers for IoT-Based Healthcare," IEEE Internet Things J., vol. 6, no. 1, pp. 410-420, Jul. 2019. https://doi.org/10.1109/JIOT.2018.2854714
  30. A. Al Hayajneh, M. Z. A. Bhuiyan, A. McAndrew, "A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication," Computers,vol. 9, no. 1, pp. 4, Mar. 2020.
  31. T. Hayajneh, K. Griggs,and M. Imran, "Secure and efficient data delivery for fog-assisted wireless body area networks," Peer-to-Peer Netw. Appl., vol. 12, no. 5, pp. 1289-1307, Sep. 2019. https://doi.org/10.1007/s12083-018-0705-6
  32. T. Alam, "A Reliable Communication Framework and Its Use in Internet of Things (IoT)," IJSRCSEIT, vol. 3, pp. 450-456, May. 2018.
  33. I. Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu, R. and W. Ni, "Anatomy of Threats to the Internet of Things," IEEE Commun. Surv. Tutor., vol. 21, no. 2, pp. 1636-1675, Oct. 2019. https://doi.org/10.1109/COMST.2018.2874978
  34. K. Jaswal, T. Choudhury, R. L. Chhokar, and S. R. Singh, "Securing the Internet of Things: A proposed framework," In Proceedings of the 2017 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, May. 2017.
  35. M. A. Obaidat, S. Obeidat, J. Holst, A. Al Hayajneh, and J. Brown, "A Comprehensive and Systematic Survey on the Internet of Things : Security and Privacy Challenges , Security Frameworks , Enabling Technologies , Threats , Vulnerabilities and Countermeasures," Comput. Artic., vol. 9, no. 44, pp. 1-43, Jun. 2020. https://doi.org/10.3390/computers9020044
  36. M. O. Ojo, S. Giordano, G. Procissi, and I. N. Seitanidis, "A Review of Low-End, Middle-End, and High-End Iot Devices," IEEE Access, vol. 6, pp. 70528-70554, Nov. 2018. https://doi.org/10.1109/ACCESS.2018.2879615
  37. P. Urien, "An innovative security architecture for low cost low power IoT devices based on secure elements: A four quarters security architecture" In Proceedings of the 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, Jan. 2018.
  38. J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis & defenses," In Proceedings of the Third International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, pp. 259-268, Apr. 2004.
  39. I. Andrea, C. Chrysostomos and H. George, "Internet of Things: Security vulnerabilities and challenges," In 2015 IEEE symposium on computers and communication (ISCC), Larnaca, Cyprus, pp. 180-187. IEEE, 2015.
  40. D. Puthal, S. Nepal, R. Ranjan, J. Chen, "Threats to Networking Cloud and Edge Datacenters in the Internet of Things," IEEE Cloud Comput., vol. 3, no. 3, PP. 64-71, Jul. 2016. https://doi.org/10.1109/MCC.2016.63
  41. T. Alelyani, A. Shaikh, A. A. Sulaiman, Y. Asiri, H. Alshahrani, H. S. Almakdi, "Research Challenges and Opportunities Towards a Holistic View of Telemedicine Systems: A Systematic Review," Enhanced Telemedicine and e-Health: Advanced IoT Enabled Soft Computing Framework, pp.3-26, 2021
  42. A. Shaikh, and A. Alghamdi, "IoT, smart environments and interdisciplinary applications for technology management and sustainable development," International Journal of technology management & sustainable development, vol. 19, no. 3, 2020.
  43. A. Shaikh, and A. Alghamdi, "IoT, Smart Environments and Interdisciplinary Applications for Technology Management and Sustainable Development," International Journal of Technology Management & Sustainable Development, vol. 19, no. 3, pp 257-261, 2020. https://doi.org/10.1386/tmsd_00025_2