Secure Internet of Things (IoT) Networks: Study the challenges and develop solutions for securing IoT networks, including authentication, access control, and data protection

  • Mohammad Naveed Hossain
  • Md. Mahedi Hassan
  • Raiyan Janik Monir
  • Md. Shaba Sayeed
  • Shaira Wajiha
  • Tamkin Mahmud Tan
Keywords: IoT, Security, Authentication, Access control, Data protection, framework

Abstract

The present study focuses on the security issues that arise in the context of IoT networks and puts forward potential remedies in the areas of authentication, access control, and data safeguarding. Through a comprehensive analysis of the extant scholarly works, we ascertain deficiencies and construct a framework incorporating sophisticated procedures and cryptographic techniques. The model in question guarantees data confidentiality and integrity while considering limitations in available resources. The efficacy of network security enhancement is demonstrated through the use of simulations. The present study offers valuable contributions to the domain of IoT security by furnishing pragmatic perspectives for safeguarding IoT networks and promoting confidence in the burgeoning IoT milieu.

References

1] Ferrag, Mohamed Amine, et al. ”Authentication protocols for internet of things: a comprehensive survey.” Security and Communication Networks 2017 (2017).
[2] HaddadPajouh, Hamed, et al. ”A survey on internet of things security: Requirements, challenges, and solutions.” Internet of Things 14 (2021): 100129.
[3] Ravidas, Sowmya, et al. ”Access control in Internet-of-Things: A survey.” Journal of Network and Computer Applications 144 (2019): 79-101.
[4] Qiu, Jing, et al. ”A survey on access control in the age of internet of things.” IEEE Internet of Things Journal 7.6 (2020): 4682-4696.
[5] Bertin, Emmanuel, et al. ”Access control in the Internet of Things: a survey of existing approaches and open research questions.” Annals of Telecommunications 74 (2019): 375-388.
[6] Khisa, Shreya, and Sangman Moh. ”Medium access control protocols for the Internet of Things based on unmanned aerial vehicles: A comparative survey.” Sensors 20.19 (2020): 5586.
[7] Jiang, Lili, and Hui Cui. ”Private and Mutual Authentication Protocols for Internet of Things.” Mathematics 11.8 (2023): 1929.
[8] Azrour, Mourade, et al. ”Security analysis of Ye et al. authentication protocol for Internet of Things.” Big Data and Smart Digital Environment. Springer International Publishing, 2019.
[9] Wilson, Preethy. Inter-device authentication protocol for the Internet of Things. Diss. 2017.
[10] Alzahrani, Bander A., et al. ”An anonymous device to device authentication protocol using ECC and self certified public keys usable in Internet of Things based autonomous devices.” Electronics 9.3 (2020): 520.
Published
2023-08-31
How to Cite
Hossain, M. N., Hassan, M. M., Monir, R. J., Sayeed, M. S., Wajiha, S., & Mahmud Tan, T. (2023). Secure Internet of Things (IoT) Networks: Study the challenges and develop solutions for securing IoT networks, including authentication, access control, and data protection. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 9(2), 43-48. https://doi.org/10.33130/AJCT.2023v09i02.007

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.