An End-to-End Security Scheme for Protection from Cyber Attacks on Internet of Things (IoT) Environment
Main Article Content
Abstract
The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Internet, it supports machine-to-machine communication without human intervention. However, billions of devices connected to the IoT environment are mostly wireless, small, hand-held, and resourced-constrained devices with limited storage capacities. Such devices are highly prone to external attacks. These days, cybercriminals often attempt to launch attacks on these devices, which imposes the major challenge of efficiently implementing communications across the IoT environment. In this paper, the issue of cyber-attacks in the IoT environment is addressed. An end-to-end encryption scheme was proposed to protect IoT devices from cyber-attacks.
Metrics
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
THIS IS AN OPEN ACCESS ARTICLE UNDER THE CC BY LICENSE http://creativecommons.org/licenses/by/4.0/
Plaudit
References
Rath M, Pattanayak BK. Technological Improvement in Modern Health Care Applications Using Internet of Things (IoT) and Proposal of Novel Health Care Approach. International Journal of Human Rights in Healthcare 2019; 12(2): 148-162. DOI: https://doi.org/10.1108/IJHRH-01-2018-0007
Ramlowat DD, Pattanayak BK. (2019). Exploring the Internet of Things (IoT) in Education: A Review. In: Satapathy S, Bhateja V, Somanah R, Yang XS, Senkerik R. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 863. Springer, Singapore.
Internet Source: What Is IoT Cybersecurity?. Downers Grove, Illinois, US. Available from: https://www.comptia.org/content/articles/what-is-iot-cybersecurity
Teoh TT, Nguwi YY, Elovici Y, Cheung NM, Ng WL. Analyst Intuition Based Hidden Markov Model On High Speed. Temporal Cyber Security Big Data, Proceedings of the 13th International Conference on Neural Computation, Fuzzy Systems and Knowledge Discovery; Guilin, China, 2017; pp.2080-2082. DOI: https://doi.org/10.1109/FSKD.2017.8393092
Onwubiko C, Quazzane K. Cyber Onboarding is ‘Broken’. Proceedings of the 2019 IEEE International Conference on Cyber Security and Protection of Digital Services; Oxford, UK ,2019; pp.1-13. DOI: https://doi.org/10.1109/CyberSecPODS.2019.8885237
Mbelli TM, Dwolatzky B .Cyber Security a Threat to Cyber Banking in South Africa An Approach to Network and Application Security. Proceedings of the IEEE 3rd International Conference on Cyber Security and Cloud Computing; Beijing, China,2016; pp.1-6. DOI: https://doi.org/10.1109/CSCloud.2016.18
Sevis KN, Seker E. Cyber Warfare: Terms, Issues, Laws and Controversies, Proceedings of the 2016 IEEE International Conference on Cyber Security and Protection of Digital Services; London, UK,, 2016; pp.1-9. DOI: https://doi.org/10.1109/CyberSecPODS.2016.7502348
Frank M, Leitner M, Pahi T. Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education, Proceedings of the 15th IEEE International Conference on Pervasive Intelligence and Computing, 3rd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress; Orlando, FL, USA, 2017; pp. 38-46. DOI: https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.23
Laha SR, Pattanayak BK, Pattnaik S. Advancement of Environmental Monitoring System Using IoT and Sensor: A Comprehensive Analysis. AIMS Environmental Science 2022; 9(6) :771-800 . DOI: https://doi.org/10.3934/environsci.2022044
Skopik F, Filip S. Design Principles For National Cyber Security Sensor Networks: Lessons Learned From Small-Scale Demonstrators. Proceedings of the 2019 IEEE International Conference on Cyber Security and Protection of Digital Services; Oxford, UK, 2019; pp.1-8. DOI: https://doi.org/10.1109/CyberSecPODS.2019.8885134
Isbell RA, Maple C, Hallaq B, Boyes H. Development of A Capability Maturity Model for Cyber Security in IIoT Enabled Supply Chains. Living in the Internet of Things (IoT 2019), 2019; pp.1-8. DOI: https://doi.org/10.1049/cp.2019.0128
Shukla M, Johnson SD, Jones P. Does the NIS Implementation Strategy Effectively Address Cyber Security Risks in the UK?, 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security); Oxford, UK, 2019; pp.1-11. DOI: https://doi.org/10.1109/CyberSecPODS.2019.8884963
Sheikhpour S, Ko SB, Mahani AA. Low-Cost Fault Attack Resilient AES for IoT Applications. Microelectronics Reliability 2021; 123: 114202. DOI: https://doi.org/10.1016/j.microrel.2021.114202
Swamy KSK, Sony G, Ram ChJ, Navven B. Harshita J. Secure IoT Devices Using AES. Encryption Journal of Engineering Sciences 2020;11(4):115-118.
Javed Y, Khan AS, Qahar A, Abdullah J. Preventing DoS Attacks in IoT Using AES. Journal of Telecommunication, Electronic and Computer Engineering 2017;9(3):55-60.
Al-Mashhadani M, Sujja M. IoT Security Using AES Encryption Technology Based ESP32 Platform. The International Arab Journal of Information Technology 2022;19(2):214-223. DOI: https://doi.org/10.34028/iajit/19/2/8
Nandan V, Rao RGS. An Efficient AES Algorithm for IoT Based Applications. International Journal of Engineering and Advanced Technology. 2019; 9(1) :1939-1944. DOI: https://doi.org/10.35940/ijeat.A1082.109119
Ahamed J, Zahid Md, Omar M, Ahmad K. AES and MQTT Based Security System in the Internet of Things. Journal of Discrete Mathematical Sciences and Cryptography 2016; 22(8) :1589-1598. DOI: https://doi.org/10.1080/09720529.2019.1696553
Mahmood MS, Al-Dabagh NB. Improving IoT Security using Lightweight Based Deep Learning Protection Model. Tikrit Journal of Engineering Sciences 2023; 30(1)119–129. DOI: https://doi.org/10.25130/tjes.30.1.12
Radanliev P, Roure DD, Cannady S, Montalvo RM, Nicolescu R, Huth M. Economic Impact of IoT Cyber Risk - Analysing Past and Present to Predict the Future Developments in IoT Risk Analysis and IoT Cyber Insurance. Living in the Internet of Things: Cybersecurity of the IoT , 2018; pp.1-9. DOI: https://doi.org/10.1049/cp.2018.0003
Hosenkhan MR, Pattanayak BK. An End-to-End AES Based Cryptographic Authentication Mechanism for Communication on Internet of Things (IoT) Using MQTT. Natural Volatiles and Essential Oils 2021;8(3):29-33.