A MULTI-LAYERED APPROACH TO ADDRESSING SECURITY VULNERABILITIES IN INTERNET OF THINGS ARCHITECTURES
Keywords:
Internet Of Things (IoT), Security Vulnerabilities, Multi-layered Security, Encryption, Anomaly Detection, Authentication, Cyber-attacksAbstract
The rapid proliferation of Internet of Things (IoT) devices has resulted in unprecedented connectivity across multiple industries. However, this surge in IoT adoption has also exposed significant security vulnerabilities, making these devices prime targets for cyber-attacks. This paper presents a multi-layered security approach to address vulnerabilities in IoT architectures. We propose an integrated framework combining device-level encryption, network-level anomaly detection, and application-level authentication. Through literature review and empirical data analysis, we explore the effectiveness of this approach in mitigating known security threats. Our findings demonstrate that a multi-layered defense strategy is crucial to improving the resilience of IoT ecosystems
References
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). "Security, privacy and trust in Internet of Things: The road ahead." Computer Networks, 76, 146-164. https://doi.org/10.1016/j.comnet.2014.11.008
Ammar, M., Russello, G., & Crispo, B. (2018). "Internet of Things: A survey on the security of IoT frameworks." Journal of Information Security and Applications, 38, 8-27. https://doi.org/10.1016/j.jisa.2017.11.002
Kolluru, V., Mungara, S., & Chintakunta, A.N. (2020). Combating misinformation with machine learning: Tools for trustworthy news consumption. Machine Learning and Applications: An International Journal (MLAIJ), 7(3/4), 28–39.
Y. Yang, L. Wu, G. Yin, L. Li and H. Zhao, "A Survey on Security and Privacy Issues in Internet-of-Things," in IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250-1258, Oct. 2017, doi: 10.1109/JIOT.2017.2694844
I. K. Dutta, B. Ghosh and M. Bayoumi, "Lightweight Cryptography for Internet of Insecure Things: A Survey," 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2019, pp. 0475-0481, doi: 10.1109/CCWC.2019.8666557.
I. Andrea, C. Chrysostomou and G. Hadjichristofi, "Internet of Things: Security vulnerabilities and challenges," 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 2015, pp. 180-187, doi: 10.1109/ISCC.2015.7405513.
Di Martino, B., Esposito, A., Nacchia, S., Maisto, S.A. (2018). Towards an Integrated Internet of Things: Current Approaches and Challenges. In: Di Martino, B., Li, KC., Yang, L., Esposito, A. (eds) Internet of Everything. Internet of Things. Springer, Singapore. https://doi.org/10.1007/978-981-10-5861-5_2
Kolluru, V., Mungara, S., & Chintakunta, A. N. (2019). Securing the IoT ecosystem: Challenges and innovations in smart device cybersecurity. International Journal on Cryptography and Information Security (IJCIS), 9(1/2), 37–51.
Bayyapu, S. (2020). Blockchain healthcare: Redefining data ownership and trust in the medical ecosystem. International Journal of Advanced Research in Engineering and Technology (IJARET), 11(11), 2748-2755.
Leloglu, E. (2017) A Review of Security Concerns in Internet of Things. Journal of Computer and Communications, 5, 121-136. doi: 10.4236/jcc.2017.51010.
Li, S., Tryfonas, T. and Li, H. (2016), "The Internet of Things: a security point of view", Internet Research, Vol. 26 No. 2, pp. 337-359. https://doi.org/10.1108/IntR-07-2014-0173
Kolluru, V., Mungara, S., & Chintakunta, A. N. (2018). Adaptive learning systems: Harnessing AI for customized educational experiences. International Journal of Computational Science and Information Technology (IJCSITY), 6(1/2/3), 13–26.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 Mohammed Jassim (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.