Help ?

IGMIN: We're glad you're here. Please click 'create a new query' if you are a new visitor to our website and need further information from us.

If you are already a member of our network and need to keep track of any developments regarding a question you have already submitted, click 'take me to my Query.'

Subjects/Topics

Welcome to IgMin Research – an Open Access journal uniting Biology Group, Medicine Group, and Engineering Group. We’re dedicated to advancing global knowledge and fostering collaboration across scientific fields.

Members

Our mission is to enhance collaboration across disciplines and expedite the expansion of scientific insight.

Articles

Our mission is to enhance collaboration across disciplines and expedite the expansion of scientific insight.

Explore Content

Our mission is to enhance collaboration across disciplines and expedite the expansion of scientific insight.

Identify Us

Our mission is to enhance collaboration across disciplines and expedite the expansion of scientific insight.

IgMin Corporation

Welcome to IgMin, a leading platform dedicated to enhancing knowledge dissemination and professional growth across multiple fields of science, technology, and the humanities. We believe in the power of open access, collaboration, and innovation. Our goal is to provide individuals and organizations with the tools they need to succeed in the global knowledge economy.

Publications Support
[email protected]
E-Books Support
[email protected]
Webinars & Conferences Support
[email protected]
Content Writing Support
[email protected]
IT Support
[email protected]

Search

Explore Section

Content for the explore section slider goes here.

Abstract

Abstract at IgMin Research

Our mission is to enhance collaboration across disciplines and expedite the expansion of scientific insight.

Engineering Group Review Article Article ID: igmin149

Strengthening IoT Network Protocols: A Model Resilient Against Cyber Attacks

Cybersecurity Affiliation

Affiliation

    Department of Computer Science, Ashkelon Academic College (AAC), Ashkelon, Israel

    Department of Computer Science, Ashkelon Academic College (AAC), Ashkelon, Israel

Abstract

The pervasive Internet of Things (IoT) integration has revolutionized industries such as medicine, environmental care, and urban development. The synergy between IoT devices and 5G cellular networks has further accelerated this transformation, providing ultra-high data rates and ultra-low latency. This connectivity enables various applications, including remote surgery, autonomous driving, virtual reality gaming, and AI-driven smart manufacturing. However, IoT devices’ real-time and high-volume messaging nature exposes them to potential malicious attacks. The implementation of encryption in such networks is challenging due to the constraints of IoT devices, including limited memory, storage, and processing bandwidth. In a previous work [1], we proposed an ongoing key construction process, introducing a pivotal pool to enhance network security. The protocol is designed with a probability analysis to ensure the existence of a shared key between any pair of IoT devices, with the predefined probability set by the system designer. However, our earlier model faced vulnerabilities such as the “parking lot attack” and physical attacks on devices, as highlighted in the conclusion section. We present a complementary solution to address these issues, fortifying our previous protocol against cyber threats. Our approach involves the implementation of an internal Certification Authority (CA) that issues certificates for each IoT device before joining the network.
Furthermore, all encryption keys are distributed by the primary IoT device using the Unix OS ‘passwd’ mechanism. If a device “disappears,” all encryption keys are promptly replaced, ensuring continuous resilience against potential security breaches. This enhanced protocol establishes a robust security framework for IoT networks, safeguarding against internal and external threats.

Figures

References

    1. Leshem G, David E, Domb M. Probability-Based Keys Sharing for IoT Security. ICSEE International Conference on the Science of Electrical Engineering. 2018.
    2. Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013; 29:1645–1660.
    3. Sundmaeker H, Guillemin P, Friess P, Woelfflé S. Vision and challenges for realizing the Internet of Things. In Cluster of European Research Projects on the Internet of Things; European Commission: Brussels, 2010; 3: 34–36.
    4. Stellios I, Kotzanikolaou P, Psarakis M, Alcaraz C, Lopez J. A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 2018; 20:3453–3495.
    5. Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM conference on Computer and communications security, Washington DC.11-2002; 341-47.
    6. Alagheband MR, Aref MR. Dynamic and secure key management model for hierarchical heterogeneous sensor networks. Iet Information Security [IF: 1.04]. DOI — 10.1049/iet-ifs.2012.0144, 2012
    7. Sciancalepore S, Piro G, Boggia G, Bianchi G. Key Management Protocol with Implicit Certificates for IoT systems. Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems. Florence, Italy. ACM, NY, USA. 2015; 37-42. ISBN: 978-1-4503-3502-7
    8. Roman R, Alcaraz C, Lopez J. Key management systems for sensor networks in the context of the Internet of Things. Nicolas Sklavos, Computers & Electrical Engineering. 2011; 37:2; Pages 147-159.
    9. Wazid M, Das AK, Odelu V. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks. IEEE Internet of Things Journal. 2018; 5:1; 269-282: ISSN: 2327-4662
    10. Benslimane Y, BenAhmed K. Efficient End-to-End Secure Key Management Protocol for Internet of Things. International Journal of Electrical and Computer Engineering (IJECE). 2017; 7:6; 3622 3631 ISSN: 2088-8708.
    11. Mahmood Z, Ning H, Ghafoor A. A Polynomial Subset-Based Efficient Multiparty Key Management System for Lightweight Device Networks. Sensors. 2017; 17(4): 670. doi:10.3390/s17040670
    12. Mohammad M. Internet of Things: A Comprehensive Overview on Protocols, Architectures, Technologies, Simulation Tools, and Future Directions. Energies. 2023; 16.8:3465.‏
    13. Gerodimos A, Maglaras L, Ferrag MA, Ayres N, Kantzavelou I. IoT: Communication protocols and security threats. Internet Things Cyber-Phys. Syst.2023; 3: 1–13.
    14. Domínguez-Bolaño T, Campos O, Barral V, Escudero CJ, García-Naya JA. An overview of IoT architectures, technologies, and existing open-source projects. Internet Things. 2022; 20:
    15. Python Own Certificate Authority (ownca). https://packagegalaxy.com/python/ownca.

Similar Articles

Diagnostic Challenges in Pancreatic Tumors
Ionuţ Simion Coman, Elena Violeta Coman, Costin George Florea, Teodora Elena Tudose, Cosmin Burleanu, Anwar Erchid and Valentin Titus Grigorean
DOI10.61927/igmin185
Levetiracetam-induced Rhabdomyolysis - A Rare Complication
Ayisha Farooq Khan, Naeemuddin Shaikh, Faryal Abdy and Dureshahwar Kanwar
DOI10.61927/igmin228
DNA Genetics and UHPLC-Q-TOF-MS Analysis of Phytochemicals for Asparagus racemosus Roots
Nguyen Thi Huong, Do Ngoc Thuy, Phung Van Trung, Le Ngoc Hung and Mai Van Nam
DOI10.61927/igmin217

Social Icons

PUBLISH YOUR RESEARCH

We publish a wide range of article types in biology, medicine and engineering with no editorial biases.

Submit

See Manuscript Guidelines and APC

Explore the IgMin Subjects
Google Scholar
welcome Image

Google Scholar, beta-launched in November 2004, acts as an academic navigator through vast scholarly seas. It covers peer-reviewed journals, books, conference papers, theses, dissertations, preprints, abstracts, technical reports, court opinions, and patents. Search IgMin Articles