An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment

Main Article Content

Ahamd Khader Habboush
https://orcid.org/0000-0002-5564-823X
Bassam Mohammed Elzaghmouri
https://orcid.org/0000-0002-0844-9043
Binod Kumar Pattanayak
https://orcid.org/0000-0003-2222-0453
Saumendra Pattnaik
https://orcid.org/0000-0002-7986-4252
Rami Ahmad Habboush
https://orcid.org/0009-0002-0123-2084

Abstract

The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.

Metrics

Metrics Loading ...

Article Details

Section
Articles

Plaudit

References

Rath M, Pattanayak BK. Technological Improvement in Modern Health Care Applications Using Internet of Things (IoT) and Proposal of Novel Health Care Approach. International Journal of Human Rights in Healthcare 2019; 12(2): 148-162. DOI: https://doi.org/10.1108/IJHRH-01-2018-0007

Ramlowat DD, Pattanayak BK. (2019). Exploring the Internet of Things (IoT) in Education: A Review. In: Satapathy S, Bhateja V, Somanah R, Yang XS, Senkerik R. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 863. Springer, Singapore.

Internet Source: What Is IoT Cybersecurity?. Downers Grove, Illinois, US. Available from: https://www.comptia.org/content/articles/what-is-iot-cybersecurity

Teoh TT, Nguwi YY, Elovici Y, Cheung NM, Ng WL. Analyst Intuition Based Hidden Markov Model On High Speed. Temporal Cyber Security Big Data, Proceedings of the 13th International Conference on Neural Computation, Fuzzy Systems and Knowledge Discovery; Guilin, China, 2017; pp.2080-2082. DOI: https://doi.org/10.1109/FSKD.2017.8393092

Onwubiko C, Quazzane K. Cyber Onboarding is ‘Broken’. Proceedings of the 2019 IEEE International Conference on Cyber Security and Protection of Digital Services; Oxford, UK ,2019; pp.1-13. DOI: https://doi.org/10.1109/CyberSecPODS.2019.8885237

Mbelli TM, Dwolatzky B .Cyber Security a Threat to Cyber Banking in South Africa An Approach to Network and Application Security. Proceedings of the IEEE 3rd International Conference on Cyber Security and Cloud Computing; Beijing, China,2016; pp.1-6. DOI: https://doi.org/10.1109/CSCloud.2016.18

Sevis KN, Seker E. Cyber Warfare: Terms, Issues, Laws and Controversies, Proceedings of the 2016 IEEE International Conference on Cyber Security and Protection of Digital Services; London, UK,, 2016; pp.1-9. DOI: https://doi.org/10.1109/CyberSecPODS.2016.7502348

Frank M, Leitner M, Pahi T. Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education, Proceedings of the 15th IEEE International Conference on Pervasive Intelligence and Computing, 3rd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress; Orlando, FL, USA, 2017; pp. 38-46. DOI: https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.23

Laha SR, Pattanayak BK, Pattnaik S. Advancement of Environmental Monitoring System Using IoT and Sensor: A Comprehensive Analysis. AIMS Environmental Science 2022; 9(6) :771-800 . DOI: https://doi.org/10.3934/environsci.2022044

Skopik F, Filip S. Design Principles For National Cyber Security Sensor Networks: Lessons Learned From Small-Scale Demonstrators. Proceedings of the 2019 IEEE International Conference on Cyber Security and Protection of Digital Services; Oxford, UK, 2019; pp.1-8. DOI: https://doi.org/10.1109/CyberSecPODS.2019.8885134

Isbell RA, Maple C, Hallaq B, Boyes H. Development of A Capability Maturity Model for Cyber Security in IIoT Enabled Supply Chains. Living in the Internet of Things (IoT 2019), 2019; pp.1-8. DOI: https://doi.org/10.1049/cp.2019.0128

Shukla M, Johnson SD, Jones P. Does the NIS Implementation Strategy Effectively Address Cyber Security Risks in the UK?, 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security); Oxford, UK, 2019; pp.1-11. DOI: https://doi.org/10.1109/CyberSecPODS.2019.8884963

Sheikhpour S, Ko SB, Mahani AA. Low-Cost Fault Attack Resilient AES for IoT Applications. Microelectronics Reliability 2021; 123: 114202. DOI: https://doi.org/10.1016/j.microrel.2021.114202

Swamy KSK, Sony G, Ram ChJ, Navven B. Harshita J. Secure IoT Devices Using AES. Encryption Journal of Engineering Sciences 2020;11(4):115-118.

Javed Y, Khan AS, Qahar A, Abdullah J. Preventing DoS Attacks in IoT Using AES. Journal of Telecommunication, Electronic and Computer Engineering 2017;9(3):55-60.

Al-Mashhadani M, Sujja M. IoT Security Using AES Encryption Technology Based ESP32 Platform. The International Arab Journal of Information Technology 2022;19(2):214-223. DOI: https://doi.org/10.34028/iajit/19/2/8

Nandan V, Rao RGS. An Efficient AES Algorithm for IoT Based Applications. International Journal of Engineering and Advanced Technology. 2019; 9(1) :1939-1944. DOI: https://doi.org/10.35940/ijeat.A1082.109119

Ahamed J, Zahid Md, Omar M, Ahmad K. AES and MQTT Based Security System in the Internet of Things. Journal of Discrete Mathematical Sciences and Cryptography 2016; 22(8) :1589-1598. DOI: https://doi.org/10.1080/09720529.2019.1696553

Mahmood MS, Al-Dabagh NB. Improving IoT Security using Lightweight Based Deep Learning Protection Model. Tikrit Journal of Engineering Sciences 2023; 30(1)119–129. DOI: https://doi.org/10.25130/tjes.30.1.12

Radanliev P, Roure DD, Cannady S, Montalvo RM, Nicolescu R, Huth M. Economic Impact of IoT Cyber Risk - Analysing Past and Present to Predict the Future Developments in IoT Risk Analysis and IoT Cyber Insurance. Living in the Internet of Things: Cybersecurity of the IoT , 2018; pp.1-9. DOI: https://doi.org/10.1049/cp.2018.0003

Hosenkhan MR, Pattanayak BK. An End-to-End AES Based Cryptographic Authentication Mechanism for Communication on Internet of Things (IoT) Using MQTT. Natural Volatiles and Essential Oils 2021;8(3):29-33.

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)