Techniques for Cybersecurity and Privacy Protection in IoT Networks

Authors

  • Navaneethan M. Research Scholar Department of Banking Technology Pondicherry University Puducherry
  • Yugendra Devidas Chincholkar Associate Professor Electronics & TelecommunicationSinhgad College of Engineering Pune, off Sinhgad Road, Vadgaon (Bk), Pune Pincode-411041 District-Pune State-Maharashtra India
  • Anand Prakash Dube Associate Professor, Computer Science, School of Management Sciences Varanasi Uttar Pradesh
  • Mohit Tiwari Assistant Professor, Department of Computer Science and Engineering, Bharati Vidyapeeth’s College of Engineering, Delhi A-4, Rohtak Road, Paschim Vihar, Delhi

Keywords:

ledger integration, deep learning, information security, safeguarding confidentiality, and the Internet of Things

Abstract

Maintaining the confidentiality and safety of sensitive data grows critical as the Web of Things (IoT) continues to permeate several industries. In order to protect sensitive data in connected devices, this study offers a thorough architecture that includes cryptographic methods, adaptive protection measures, as well as privacy-preserving tactics. The paper presents neural network-based anomaly detection, demonstrating the effectiveness of dynamic defenses in adapting to changing threats with a precision of 0.92 and a recall of 0.88. Advanced Encryption Standard (AES) and RSA algorithms are two examples of encryption gets closer that show efficiency with an encrypting overhead of 2.5 ms for AES and 4.0 ms for RSA. With 99.8% constancy rate across 100 blocks, integrating blockchain technology keeps the unbreakable ledger very consistent.Data utility and confidentiality for individuals are weighed by privacy-preserving methods like homomorphic digital encryption and distinct confidentiality, as shown by allowable distorting levels in the average squared error study. The proposed framework's particular strength lies in its integration of adaptations with blockchain technology as well as cryptography, as demonstrated by comparisons with prior work. By addressing issues with practical deployment and offering insightful information for next advancements, the study makes a useful contribution to the rapidly developing field of IoT security. By guaranteeing the safety, reliability, and privacy of communicated data in the ever-changing world of Internet of Things networks, this investigation paves the way for a reliable and durable linked world.

Downloads

Download data is not yet available.

References

ALAJLAN, R., ALHUMAM, N. and FRIKHA, M., 2023. Cybersecurity for Blockchain-Based IoT Systems: A Review. Applied Sciences, 13(13), pp. 7432.

ALAMRI, B., CROWLEY, K. and RICHARDSON, I., 2023. Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT. Sensors, 23(1), pp. 218.

ALAZAB, A., KHRAISAT, A., SINGH, S. and JAN, T., 2023. Enhancing Privacy-Preserving Intrusion Detection through Federated Learning. Electronics, 12(16), pp. 3382.

ALI, A., BANDER ALI SALEH AL-RIMY, ALSUBAEI, F.S., ABDULWAHAB, A.A. and ABDULALEEM, A.A., 2023. HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications. Sensors, 23(15), pp. 6762.

ALKANJR, B. and MAHGOUB, I., 2023. Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques. Sensors, 23(6), pp. 3142.

ALQURASHI, F., 2023. A Hybrid Federated Learning Framework and Multi-Party Communication for Cyber-Security Analysis. International Journal of Advanced Computer Science and Applications, 14(7),.

ALTULAIHAN, E., MOHAMMED, A.A. and ALJUGHAIMAN, A., 2022. Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions. Electronics, 11(20), pp. 3330.

ARACHCHIGE, K.G., BRANCH, P. and BUT, J., 2023. Evaluation of Blockchain Networks’ Scalability Limitations in Low-Powered Internet of Things (IoT) Sensor Networks. Future Internet, 15(9), pp. 317.

EL-GENDY, S., MAHMOUD, S.E., JURCUT, A. and AZER, M.A., 2023. Privacy Preservation Using Machine Learning in the Internet of Things. Mathematics, 11(16), pp. 3477.

FARIDA, H.S., AZAM, S., SHANMUGAM, B. and YEO, K.C., 2023. PbDinEHR: A Novel Privacy by Design Developed Framework Using Distributed Data Storage and Sharing for Secure and Scalable Electronic Health Records Management. Journal of Sensor and Actuator Networks, 12(2), pp. 36.

LI, M., YANG, Z., BU, Z., LAO, Q. and YANG, W., 2023. Statement Recognition of Access Control Policies in IoT Networks. Sensors, 23(18), pp. 7935.

MAJEED, A., 2023. Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review. Journal of Cybersecurity and Privacy, 3(3), pp. 638.

MAZHAR, T., DHANI, B.T., SHLOUL, T.A., YAZEED, Y.G., HAQ, I., ULLAH, I., OUAHADA, K. and HAMAM, H., 2023. Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence. Brain Sciences, 13(4), pp. 683.

PATNAIK, A. and PRASAD, K.K., 2023. Secure Authentication and Data Transmission for Patients Healthcare Data in Internet of Medical Things. International Journal of Mathematical, Engineering and Management Sciences, 8(5), pp. 1006-1023.

RANGELOV, D., LÄMMEL, P., BRUNZEL, L., BORGERT, S., PAUL, D., TCHOLTCHEV, N. and BOERGER, M., 2023. Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms. Future Internet, 15(3), pp. 98.

RODRÍGUEZ, E., OTERO, B. and CANAL, R., 2023. A Survey of Machine and Deep Learning Methods for Privacy Protection in the Internet of Things. Sensors, 23(3), pp. 1252.

SADHWANI, S., MANIBALAN, B., MUTHALAGU, R. and PAWAR, P., 2023. A Lightweight Model for DDoS Attack Detection Using Machine Learning Techniques. Applied Sciences, 13(17), pp. 9937.

SAMPAIO, S., SOUSA, P.R., MARTINS, C., FERREIRA, A., ANTUNES, L. and CRUZ-CORREIA, R., 2023. Collecting, Processing and Secondary Using Personal and (Pseudo)Anonymized Data in Smart Cities. Applied Sciences, 13(6), pp. 3830.

TARIQ, U., AHMED, I., ALI, K.B. and SHAUKAT, K., 2023. A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors, 23(8), pp. 4117.

WANG, F., TANG, Y. and FANG, H., 2023. Mitigating IoT Privacy-Revealing Features by Time Series Data Transformation. Journal of Cybersecurity and Privacy, 3(2), pp. 209.

ABDULGHANI, H.A., COLLEN, A. and NIJDAM, N.A., 2023. Guidance Framework for Developing IoT-Enabled Systems’ Cybersecurity. Sensors, 23(8), pp. 4174.

ADHIKARI, N. and RAMKUMAR, M., 2023. IoT and Blockchain Integration: Applications, Opportunities, and Challenges. Network, 3(1), pp. 115.

ALABDULATIF, A., THILAKARATHNE, N.N. and KALINAKI, K., 2023. A Novel Cloud Enabled Access Control Model for Preserving the Security and Privacy of Medical Big Data. Electronics, 12(12), pp. 2646.

ALAHMADI, A.A., ALJABRI, M., ALHAIDARI, F., ALHARTHI, D.J., RAYANI, G.E., MARGHALANI, L.A., ALOTAIBI, O.B. and BAJANDOUH, S.A., 2023. DDoS Attack Detection in IoT-Based Networks Using Machine Learning Models: A Survey and Research Directions. Electronics, 12(14), pp. 3103.

ALHARBI, A., 2023. Applying Access Control Enabled Blockchain (ACE-BC) Framework to Manage Data Security in the CIS System. Sensors, 23(6), pp. 3020.

ALI, A., BANDER ALI SALEH AL-RIMY, ABDULWAHAB, A.A., ALSUBAEI, F.S., ABDULALEEM, A.A. and SAEED, F., 2023. Securing Secrets in Cyber-Physical Systems: A Cutting-Edge Privacy Approach with Consortium Blockchain. Sensors, 23(16), pp. 7162.

ALI, Y., KHAN, H.U. and KHALID, M., 2023. Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review. Journal of Big Data, 10(1), pp. 128.

ALJREES, T., KUMAR, A., SINGH, K.U. and SINGH, T., 2023. Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm. Sensors, 23(19), pp. 8090.

ALJUAID TURKEA AYEDH, M., AINUDDIN WAHID, A.W. and MOHD YAMANI, I.I., 2023. Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions. Applied Sciences, 13(14), pp. 8048.

ALNAIM, A.K. and ALWAKEEL, A.M., 2023. Machine-Learning-Based IoT–Edge Computing Healthcare Solutions. Electronics, 12(4), pp. 1027.

Downloads

Published

24.03.2024

How to Cite

M., N. ., Chincholkar, Y. D. ., Dube, A. P. ., & Tiwari, M. . (2024). Techniques for Cybersecurity and Privacy Protection in IoT Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(18s), 130–137. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4958

Issue

Section

Research Article