Security analysis in communication networks for the Internet of things

Authors

  • Krasen Angelov Technical University, Gabrovo

DOI:

https://doi.org/10.33919/YTelecomm.24.11.13

Keywords:

Internet of Things, cybersecurity threats, risk assessment, cybersecurity strategy

Abstract

The objective of this study is threefold: firstly, to analyze the challenges associated with managing the vast amount of data generated by Internet of Things (IoT) devices; secondly, to assess the nature and categorize security threats in IoT networks; and thirdly, to propose corresponding countermeasures to enhance security. As the number of connected devices increases, so do the associated security risks. This highlights the need for qualified stakeholders to mitigate these risks and prevent potential attacks. The proposed categorization provides valuable insights into the multifaceted roles and responsibilities of stakeholders in IoT ecosystems, facilitating a more nuanced understanding of their interrelationships. This categorization facilitates more effective decision-making by taking into account the specific context and responsibilities of each stakeholder group. This approach has been demonstrated to enhance the decision-making process in the domain of IoT security management. This would facilitate the development of effective strategies to address the evolving security challenges of IoT networks.

References

YAO, X., F. FARHA, R. LI, I. PSYCHOULA, L. CHEN, H. NING. Security and privacy issues of physical objects in the IoT: Challenges and opportunities. In Digital Communications and Networks. Volume 7, Issue 3, 2021, pp. 373-384. ISSN 2352-8648. Available from: http://doi.org/10.1016/j.dcan.2020.09.001

КЪДРЕВ, Васил, Росен ПАСАРЕЛСКИ. Особености на моделирането и симулацията на риска при комуникационни и осигурителни системи. Годишник Телекомуникации [онлайн]. 2020, (7), с. 17-28 [прегледан 07.02.2025]. еISSN 2534-854X. Достъпен на: https://doi.org/10.33919/YTelecomm.20.7.3 [KADREV, Vasil, Rosen PASARELSKI. Osobenosti na modeliraneto i simulatsiyata na riska pri komunikatsionni i osiguritelni sistemi. Godishnik Telekomunikatsii [onlayn]. 2020, (7), s. 17-28 [pregledan 07.02.2025]. eISSN 2534-854X. Dostapen na: https://doi.org/10.33919/YTelecomm.20.7.3]

MOHANTA, B.K., D. JENA, U. SATAPATHY, S. PATNAIK. Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. In Internet Things. Volume 11, 2020, 10022. ISSN 2542-6605. Available from: https://doi.org/10.1016/j.iot.2020.100227

КЪДРЕВ, В., Росен ПАСАРЕЛСКИ Приложение на подходи на изкуствен интелект и машинно обучение в киберсигурността. Годишник Телекомуникации [онлайн]. 2021, (8), с. 53-64 [прегледан 08.02.2025]. еISSN 2534-854X. Достъпен на: https://doi.org/10.33919/YTelecomm.21.8.6 [KADREV, V., Rosen PASARELSKI Prilozhenie na podhodi na izkustven intelekt i mashinno obuchenie v kibersigurnostta. Godishnik Telekomunikatsii [onlayn]. 2021, (8), s. 53-64 [pregledan 08.02.2025]. eISSN 2534-854X. Dostapen na: https://doi.org/10.33919/YTelecomm.21.8.6]

KARIE, N.M., N.M. SAHRI, W. YANG, C. VALLI, V.R. KEBANDE. A review of security standards and frameworks for IoT-based smart environments. In IEEE Access, vol. 9, pp. 121975-121995, 2021. ISSN: 2169-3536. Available from: https://doi.org/10.1109/ACCESS.2021.3109886

PAL, S., M. HITCHENS, T. RABEHAJA, S. MUKHOPADHYAY. Security requirements for the internet of things: A systematic approach. In Sensors. no 20. 2020. 5897. ISSN: 1424-8220. Available from: https://doi.org/10.3390/s20205897

GAUR, V., R. KUMAR. Analysis of machine learning classifiers for early detection of DDoS attacks on IoT devices. In Arabian Journal for Science and Engineering. Volume 47, 2022. pp. 1353–1374. ISSN 2193-567X. Available from: https://doi.org/10.1007/s13369-021-05947-3

CHAUDHARY, P. B.B. GUPTA, A. SINGH. Securing heterogeneous embedded devices against XSS attack in intelligent IoT system. In Computers & Security. Volume 118, 2022, 102710. ISSN 0167-4048. Available from: https://doi.org/10.1016/j.cose.2022.102710

MULLEN, G., L. MEANY. Assessment of buffer overflow based attacks on an IoT operating system. In Proceedings of the 2019 Global IoT Summit (GIoTS), Aarhus, Denmark, 2019; pp. 1–6. ISBN:978-1-7281-2171-0. Available from: https://doi.org/10.1109/GIOTS.2019.8766434

TOUTSOP, O., P. HARVEY. K. KORNEGAY. Monitoring and detection time optimization of man in the middle attacks using machine learning. In Proceedings of the 2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), Washington DC, DC, USA, 2020. pp. 1–7. ISBN:978-1-7281-8243-8. Available from: https://doi.org/10.1109/AIPR50011.2020.9425304

AL-HADHRAMI, Y., F.K. HUSSAIN. DDoS attacks in IoT networks: A comprehensive systematic literature review. In World Wide Web. Volume 24, pp. 971–1001. 2021. ISSN 1386-145X. Available from: https://doi.org/10.1007/s11280-020-00855-2

YANG, X., L. SHU, Y. LIU, G.P. HANCKE, M.A. FERRAG, K. HUANG. Physical security and safety of iot equipment: A survey of recent advances and opportunities. In IEEE Transactions on Industrial Informatics, vol. 18, no. 7, 2022. pp. 4319-4330. ISSN: 1551-3203. Available from: https://doi.org/10.1109/TII.2022.3141408

AHMAD, W., A. RASOOL, A.R. JAVED, T. BAKER, Z. JALIL. Cyber security in iot-based cloud computing: A comprehensive survey. In Electronics. 11(1), 16. 2022. ISSN: 2079-9292. Available from: https://doi.org/10.3390/electronics11010016

DEVI, M., A. MAJUMDER. Side-channel attack in Internet of Things: A survey. In Applications of Internet of Things: Proceedings of ICCCIOT 2020. Springer: Berlin/Heidelberg, Germany, 2021; pp. 213–222. ISBN 978-981-15-6197-9. Available from: https://doi.org/10.1007/978-981-15-6198-6_20

LO’AI, A.T., T.F. SOMANI. More secure Internet of Things using robust encryption algorithms against side channel attacks. In Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 2016; pp. 1–6. ISBN:978-1-5090-4320-0. Available from: https://doi.org/10.1109/AICCSA.2016.7945813

RAVI, P., R. POUSSIER, S. BHASIN, A. CHATTOPADHYAY. On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT: A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4. In Proceedings of the Security, Privacy, and Applied Cryptography Engineering: 10th International Conference, SPACE 2020, Kolkata, India, 2020; pp. 123–146. Available from: https://eprint.iacr.org/2020/1038

MAGYARI, A., Y. CHEN. Review of State-of-the-Art FPGA Applications in IoT Networks. In Sensors 2022. 22(19), 7496. ISSN: 1424-8220. Available from: https://doi.org/10.3390/s22197496

IMAÑA, J.L., P. HE, T. BAO, Y. TU, J. XIE. Efficient hardware arithmetic for inverted binary ring-lwe based post-quantum cryptography. In EEE Transactions on Circuits and Systems I: Regular Papers, vol. 69, no. 8, 2022. pp. 3297-3307. ISSN: 1549-8328. Available from: https://doi.org/10.1109/TCSI.2022.3169471

SARKER, A., M.M. KERMANI, R. AZARDERAKHSH. Fault detection architectures for inverted binary ring-LWE construction benchmarked on FPGA. In IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 68, no. 4. 2021. pp. 1403-1407. ISSN: 1549-7747. Available from: https://doi.org/10.1109/TCSII.2020.3025857

ZEYDAN, E., Y. TURK, B. AKSOY, S.B. OZTURK. Recent advances in post-quantum cryptography for networks: A survey. In Proceedings of the 2022 Seventh International Conference On Mobile Furthermore, Secure Services (MobiSecServ), Gainesville, FL, USA, 2022; pp. 1–8. ISBN: 978-1-7281-8837-9. Available from: https://doi.org/10.1109/MobiSecServ50855.2022.9727214

PARK, T., H. SEO, J. KIM, J., H. PARK, H. KIM. Efficient parallel implementation of matrix multiplication for Lattice-Based cryptography on modern ARM processor. In Security and Communications Network, 2018, 7012056. ISSN: 1939-0114. Available from: https://doi.org/10.1155/2018/7012056

BISHEH NIASAR, M., R. AZARDERAKHSH, M.M. KERMANI. Efficient hardware implementations for elliptic curve cryptography over Curve448. In Proceedings of the Progress in Cryptology—INDOCRYPT 2020: 21st International Conference on Cryptology in India, Bangalore, India, 2020; vol 12578. Springer, Champ. 2020. p. 228–247. ISBN: 978-3-030-65276-0. Available from: https://doi.org/10.1007/978-3-030-65277-7_10

ANASTASOVA, M., R. AZARDERAKHSH, M.M. KERMANI. Fast strategies for the implementation of SIKE round 3 on ARM Cortex-M4. In IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 68, no. 10. 2021. pp. 4129-4141. ISSN: 1549-8328. Available from: https://doi.org/10.1109/TCSI.2021.3096916

SANAL, P., E. KARAGOZ, H. SEO, R. AZARDERAKHSH, M. Mozaffari-Kermani. Kyber on ARM64: Compact implementations of Kyber on 64-bit ARM Cortex-A processors. In Proceedings of the Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, 2021. pp. 424–440. ISBN: 978-3-030-90021-2. Available from: https://doi.org/10.1007/978-3-030-90022-9_23

MOZAFFARI-KERMANI, M., R. AZARDERAKHSH, A. AGHAIE. Reliable and error detection architectures of Pomaranch for false-alarm-sensitive cryptographic applications. In IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 23, no. 12. 2015. pp. 2804-2812. ISSN: 1063-8210. Available from: https://doi.org/10.1109/TVLSI.2014.2382715

ABED, S., R. JAFFAL, B.J. MOHD, M. AL-SHAYEJI. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. In Cluster Computing. Volume 24, 2021. pp. 3065–3084. ISSN: 1573-754. Available from: https://doi.org/10.1007/s10586-021-03324-1

THAKOR, V.A., M.A. RAZZAQUE, M.R. KHANDAKER. Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities. In IEEE Access, vol. 9, 2021. pp. 28177-28193. ISSN: 2169-3536. Available from: https://doi.org/10.1109/ACCESS.2021.3052867

Пасарелски, Р., Теодора Пасарелска. Анализ, мониторинг и контрол на мрежовия трафик в интернет. Сборник с доклади на Национален военен университет “Васил Левски”, гр. Велико Търново, 03-04 юли 2014г., том 9, стр 53-67, ISSN: 1314-1937, 2014

Пасарелски, Р., Теодора Пасарелска. Виртуализация и сигурност в петото поколение 5G мобилни клетъчни мрежи, Сборник доклади от научна конференция „Знание, наука, технолоии, иновации” 2023, 6-7 юли 2023г., гр. Велико Търново, стр. 374-387, ISSN 2815-3480, 2023.

СИМЕОНОВА, Цветелина. Развитие на перспективните технологии в „Интернет на свързаните неща“ IoT (Internet of Things). София: Асеневци, 2021. ISBN 978-619-7586-25-1. [SIMEONOVA, Tsvetelina. Razvitie na perspektivnite tehnologii v „Internet na svarzanite neshta“ IoT (Internet of Things). Sofia: Asenevtsi, 2021. ISBN 978-619-7586-25-1.]

Downloads

Published

2024-12-30

How to Cite

Angelov, K. (2024). Security analysis in communication networks for the Internet of things. Yearbook Telecommunications, 11, 131–141. https://doi.org/10.33919/YTelecomm.24.11.13