A MULTI-LAYERED APPROACH TO ADDRESSING SECURITY VULNERABILITIES IN INTERNET OF THINGS ARCHITECTURES

Authors

  • Mohammed Jassim SMU, Singapore. Author

Keywords:

Internet Of Things (IoT), Security Vulnerabilities, Multi-layered Security, Encryption, Anomaly Detection, Authentication, Cyber-attacks

Abstract

The rapid proliferation of Internet of Things (IoT) devices has resulted in unprecedented connectivity across multiple industries. However, this surge in IoT adoption has also exposed significant security vulnerabilities, making these devices prime targets for cyber-attacks. This paper presents a multi-layered security approach to address vulnerabilities in IoT architectures. We propose an integrated framework combining device-level encryption, network-level anomaly detection, and application-level authentication. Through literature review and empirical data analysis, we explore the effectiveness of this approach in mitigating known security threats. Our findings demonstrate that a multi-layered defense strategy is crucial to improving the resilience of IoT ecosystems

References

Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). "Security, privacy and trust in Internet of Things: The road ahead." Computer Networks, 76, 146-164. https://doi.org/10.1016/j.comnet.2014.11.008

Ammar, M., Russello, G., & Crispo, B. (2018). "Internet of Things: A survey on the security of IoT frameworks." Journal of Information Security and Applications, 38, 8-27. https://doi.org/10.1016/j.jisa.2017.11.002

Kolluru, V., Mungara, S., & Chintakunta, A.N. (2020). Combating misinformation with machine learning: Tools for trustworthy news consumption. Machine Learning and Applications: An International Journal (MLAIJ), 7(3/4), 28–39.

Y. Yang, L. Wu, G. Yin, L. Li and H. Zhao, "A Survey on Security and Privacy Issues in Internet-of-Things," in IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250-1258, Oct. 2017, doi: 10.1109/JIOT.2017.2694844

I. K. Dutta, B. Ghosh and M. Bayoumi, "Lightweight Cryptography for Internet of Insecure Things: A Survey," 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2019, pp. 0475-0481, doi: 10.1109/CCWC.2019.8666557.

I. Andrea, C. Chrysostomou and G. Hadjichristofi, "Internet of Things: Security vulnerabilities and challenges," 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 2015, pp. 180-187, doi: 10.1109/ISCC.2015.7405513.

Di Martino, B., Esposito, A., Nacchia, S., Maisto, S.A. (2018). Towards an Integrated Internet of Things: Current Approaches and Challenges. In: Di Martino, B., Li, KC., Yang, L., Esposito, A. (eds) Internet of Everything. Internet of Things. Springer, Singapore. https://doi.org/10.1007/978-981-10-5861-5_2

Kolluru, V., Mungara, S., & Chintakunta, A. N. (2019). Securing the IoT ecosystem: Challenges and innovations in smart device cybersecurity. International Journal on Cryptography and Information Security (IJCIS), 9(1/2), 37–51.

Bayyapu, S. (2020). Blockchain healthcare: Redefining data ownership and trust in the medical ecosystem. International Journal of Advanced Research in Engineering and Technology (IJARET), 11(11), 2748-2755.

Leloglu, E. (2017) A Review of Security Concerns in Internet of Things. Journal of Computer and Communications, 5, 121-136. doi: 10.4236/jcc.2017.51010.

Li, S., Tryfonas, T. and Li, H. (2016), "The Internet of Things: a security point of view", Internet Research, Vol. 26 No. 2, pp. 337-359. https://doi.org/10.1108/IntR-07-2014-0173

Kolluru, V., Mungara, S., & Chintakunta, A. N. (2018). Adaptive learning systems: Harnessing AI for customized educational experiences. International Journal of Computational Science and Information Technology (IJCSITY), 6(1/2/3), 13–26.

Downloads

Published

2020-12-15

How to Cite

A MULTI-LAYERED APPROACH TO ADDRESSING SECURITY VULNERABILITIES IN INTERNET OF THINGS ARCHITECTURES. (2020). INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE & APPLICATIONS (IJAIAP), 1(1), 21-27. https://mylib.in/index.php/IJAIAP/article/view/IJAIAP_01_01_003