ResearchPDF Available

Fortifying Industrial Networks: Securing IIoT Against Trust Deficits

Authors:

Abstract

The proliferation of Industrial Internet of Things (IIoT) devices has brought unparalleled efficiency to industrial processes, yet it also introduces significant cybersecurity vulnerabilities. Amidst mounting concerns over trust deficits in IIoT systems, fortifying industrial networks becomes imperative. This paper examines the challenges posed by trust deficits in IIoT environments and proposes strategies to enhance security. By leveraging cryptographic techniques, anomaly detection algorithms, and secure communication protocols, trust can be bolstered within IIoT ecosystems. Additionally, the adoption of rigorous access control mechanisms and regular security audits can mitigate the risks associated with compromised devices. Furthermore, collaboration between industry stakeholders, regulatory bodies, and cybersecurity experts is essential to develop comprehensive frameworks for safeguarding IIoT infrastructure. Through proactive measures and collective efforts, it is possible to cultivate a culture of trust and resilience in industrial networks, thereby ensuring the integrity, availability, and confidentiality of critical systems.
Fortifying Industrial Networks: Securing IIoT Against Trust
Deficits
Asad Abbas
Department of Technology Management, University of California, USA
Abstract:
The proliferation of Industrial Internet of Things (IIoT) devices has brought unparalleled
efficiency to industrial processes, yet it also introduces significant cybersecurity
vulnerabilities. Amidst mounting concerns over trust deficits in IIoT systems, fortifying
industrial networks becomes imperative. This paper examines the challenges posed by trust
deficits in IIoT environments and proposes strategies to enhance security. By leveraging
cryptographic techniques, anomaly detection algorithms, and secure communication
protocols, trust can be bolstered within IIoT ecosystems. Additionally, the adoption of rigorous
access control mechanisms and regular security audits can mitigate the risks associated with
compromised devices. Furthermore, collaboration between industry stakeholders, regulatory
bodies, and cybersecurity experts is essential to develop comprehensive frameworks for
safeguarding IIoT infrastructure. Through proactive measures and collective efforts, it is
possible to cultivate a culture of trust and resilience in industrial networks, thereby ensuring
the integrity, availability, and confidentiality of critical systems.
Keywords: Cryptographic techniques, anomaly detection algorithms, secure communication
protocols, access control mechanisms, security audits, trust deficits
Introduction
The Industrial Internet of Things (IIoT) heralds a new era of interconnectedness and automation
within industrial settings, promising unprecedented efficiency gains and operational insights.
From smart factories to energy grids, IIoT devices permeate critical infrastructure, facilitating
real-time data monitoring, predictive maintenance, and process optimization. However, this
proliferation of interconnected devices also introduces significant cybersecurity challenges,
stemming primarily from trust deficits inherent in IIoT ecosystems. Trust, a cornerstone of any
secure system, is particularly elusive in the context of IIoT. Unlike traditional industrial control
systems, where physical isolation provided a degree of security, IIoT devices are often
deployed in open, interconnected environments, exposing them to a myriad of potential threats.
These threats range from malicious attacks aimed at disrupting operations to inadvertent
vulnerabilities arising from misconfigurations or outdated software. The concept of trust in
IIoT encompasses several dimensions. First and foremost is device integrity - ensuring that
devices operate as intended and have not been compromised by unauthorized parties. With the
proliferation of low-cost, resource-constrained IIoT devices, maintaining integrity becomes a
formidable challenge, as these devices often lack robust security features and are susceptible
to exploitation. Secondly, trust extends to data integrity and confidentiality. IIoT systems
generate vast amounts of sensitive data, ranging from production metrics to equipment status
updates. Ensuring the integrity and confidentiality of this data is paramount to preventing
unauthorized access, manipulation, or leakage, which could have dire consequences for
industrial operations and safety [1].
Furthermore, trust in IIoT networks necessitates reliable communication channels that are
resilient to interception, tampering, and denial of service attacks. In an era where cyber threats
are increasingly sophisticated and pervasive, securing communication between IIoT devices
and backend systems is critical for maintaining operational continuity and trustworthiness.
Addressing these trust deficits in IIoT requires a multifaceted approach that combines
technological innovation, regulatory frameworks, and industry collaboration. Cryptographic
techniques, such as digital signatures and encryption, play a pivotal role in ensuring device
integrity and secure communication. By leveraging cryptographic primitives, IIoT devices can
authenticate each other, verify the integrity of firmware updates, and encrypt sensitive data in
transit and at rest. Moreover, anomaly detection algorithms serve as a crucial line of defense
against unauthorized access and malicious behavior within IIoT networks. By continuously
monitoring network traffic and device behavior, anomalies indicative of security breaches can
be promptly detected and mitigated, thereby bolstering trust in the overall system. In addition
to technological solutions, robust access control mechanisms and regular security audits are
indispensable for mitigating trust deficits in IIoT environments. Implementing granular access
controls ensures that only authorized personnel can interact with sensitive devices and data,
reducing the attack surface and minimizing the risk of unauthorized access. Furthermore,
regular security audits and penetration testing help identify vulnerabilities and weaknesses in
IIoT deployments, enabling organizations to proactively address security concerns and fortify
their defenses against emerging threats [2].
However, fortifying IIoT against trust deficits cannot be accomplished in isolation.
Collaboration between industry stakeholders, regulatory bodies, and cybersecurity experts is
essential for developing comprehensive frameworks and standards that promote security by
design and ensure the resilience of industrial networks. In this paper, we examine the challenges
posed by trust deficits in IIoT environments and propose strategies to enhance security,
integrity, and resilience within industrial networks. By adopting a holistic approach that
combines technological innovation, regulatory compliance, and collaborative efforts, we aim
to cultivate a culture of trust and cybersecurity excellence in the era of interconnected industrial
systems. As the digital transformation of industrial processes accelerates, the reliance on IIoT
devices continues to grow, amplifying the urgency of addressing trust deficits. The
consequences of cybersecurity breaches in industrial settings can be severe, ranging from
production downtime and financial losses to environmental damage and threats to public safety.
Therefore, it is imperative for organizations to prioritize cybersecurity measures and invest in
robust defenses to safeguard their operations and reputation. Moreover, the evolving threat
landscape necessitates constant vigilance and adaptation. Threat actors are becoming
increasingly sophisticated, employing advanced techniques to exploit vulnerabilities and
infiltrate industrial networks. From nation-state actors targeting critical infrastructure to
opportunistic cybercriminals seeking financial gain, the range and complexity of cyber threats
facing IIoT environments are expanding rapidly. In this context, proactive measures are
essential to stay ahead of emerging threats and minimize the likelihood and impact of
cybersecurity incidents. By integrating security into the design, development, and deployment
of IIoT systems, organizations can build resilience and trust into their infrastructure from the
ground up. This proactive approach not only enhances security posture but also reduces the
costs and disruptions associated with reactive measures after a breach occurs. Furthermore, as
IIoT ecosystems become increasingly interconnected and interdependent, the need for cross-
sector collaboration and information sharing becomes more pronounced. Threat intelligence
sharing, best practice dissemination, and coordinated response efforts are critical for effectively
combating cyber threats and protecting shared infrastructure and resources [3].
Proposed Strategies:
1. Implementing Cryptographic Techniques: Leveraging cryptographic primitives such as
digital signatures and encryption to ensure device integrity, authenticate communication,
and protect sensitive data from unauthorized access. By employing robust encryption
algorithms and key management practices, organizations can enhance the security posture
of their IIoT deployments and mitigate the risk of data breaches and tampering.
2. Deploying Anomaly Detection Algorithms: Integrating anomaly detection algorithms
into IIoT systems to continuously monitor network traffic and device behavior for signs of
malicious activity. By identifying deviations from normal patterns, organizations can detect
and respond to security incidents in real-time, reducing the likelihood of successful cyber
attacks and minimizing their impact on operations.
3. Enforcing Access Control Mechanisms: Implementing granular access controls to restrict
unauthorized access to IIoT devices and data. By defining roles, privileges, and permissions
based on the principle of least privilege, organizations can minimize the attack surface and
prevent unauthorized actors from compromising critical assets. Additionally, multifactor
authentication and biometric authentication can provide an extra layer of security, ensuring
that only authorized personnel can access sensitive resources.
4. Conducting Regular Security Audits: Performing comprehensive security audits and
penetration tests to identify vulnerabilities and weaknesses in IIoT deployments. By
conducting regular assessments of network infrastructure, device configurations, and
software components, organizations can proactively address security gaps and strengthen
their defenses against emerging threats. Additionally, penetration testing simulates real-
world attack scenarios, enabling organizations to validate the effectiveness of their security
controls and incident response procedures.
5. Promoting Collaboration and Information Sharing: Fostering collaboration between
industry stakeholders, regulatory bodies, and cybersecurity experts to develop and
disseminate best practices, standards, and guidelines for securing IIoT environments. By
sharing threat intelligence, lessons learned, and cybersecurity resources, organizations can
collectively improve their resilience to cyber threats and enhance the overall security
posture of industrial networks.
6. Adopting Secure Development Practices: Integrating security into the software
development lifecycle (SDLC) to ensure that IIoT devices and applications are designed,
developed, and deployed with security in mind. By following secure coding practices,
conducting code reviews, and implementing secure configuration management,
organizations can minimize the risk of introducing vulnerabilities into their IIoT
deployments. Additionally, regular software updates and patches help address known
security vulnerabilities and protect against emerging threats [4].
7. Educating and Training Personnel: Providing cybersecurity training and awareness
programs to personnel at all levels of the organization to instill a culture of security and
promote best practices for mitigating cyber risks. By raising awareness of common threats,
social engineering techniques, and security protocols, organizations can empower
employees to recognize and respond to security incidents effectively. Additionally, ongoing
training ensures that personnel remain informed about evolving cyber threats and security
trends, enabling them to adapt their behaviors and practices accordingly.
Collaborative Efforts:
1. Industry Collaboration Platforms: Establishing industry-wide collaborative platforms
where organizations can share threat intelligence, best practices, and lessons learned in
securing IIoT environments. These platforms serve as forums for information exchange,
facilitating dialogue and collaboration between industry stakeholders, cybersecurity
experts, and technology vendors. By participating in these collaborative efforts,
organizations can gain valuable insights into emerging threats and effective security
strategies, enabling them to enhance the resilience of their industrial networks.
2. Public-Private Partnerships: Forming public-private partnerships between government
agencies, industry associations, and private sector organizations to address cybersecurity
challenges in the IIoT ecosystem. These partnerships enable coordinated efforts to develop
and implement cybersecurity frameworks, standards, and regulations that promote the
adoption of best practices and ensure the security of critical infrastructure. By leveraging
the expertise and resources of both public and private entities, these partnerships can
enhance the effectiveness of cybersecurity initiatives and foster a collaborative approach to
managing cyber risks [5].
3. Information Sharing and Analysis Centers (ISACs): Participating in ISACs dedicated
to specific industries or sectors, where organizations can collaborate on cybersecurity threat
intelligence sharing, incident response coordination, and vulnerability management. ISACs
facilitate real-time information exchange among members, enabling them to stay informed
about emerging threats and take proactive measures to protect their IIoT deployments. By
joining forces with other organizations in their industry, participants can enhance their
collective security posture and mitigate the impact of cyber attacks.
4. Cross-Sector Collaboration Initiatives: Engaging in cross-sector collaboration initiatives
that bring together organizations from different industries to address common cybersecurity
challenges. By sharing insights, resources, and best practices across sectors such as
manufacturing, energy, transportation, and healthcare, participants can gain a broader
perspective on cyber threats and learn from diverse approaches to security. These initiatives
foster collaboration and knowledge sharing, enabling organizations to leverage lessons
learned from other industries to strengthen the security of their own IIoT environments.
5. Research and Development Consortia: Participating in research and development
consortia focused on advancing cybersecurity technologies and methodologies for IIoT
environments. These consortia bring together academia, industry, and government partners
to conduct collaborative research, develop innovative solutions, and prototype new
technologies to address emerging cyber threats. By contributing expertise, funding, and
resources to these consortia, organizations can accelerate the development and adoption of
cutting-edge cybersecurity solutions tailored to the unique challenges of industrial
networks [6].
6. Standardization Bodies and Working Groups: Contributing to standardization bodies
and working groups that develop industry standards, guidelines, and best practices for
securing IIoT environments. By actively participating in the standardization process,
organizations can help shape the development of cybersecurity standards and ensure that
they address the specific needs and requirements of industrial applications. Collaboration
within these bodies fosters consensus-building and interoperability, enabling widespread
adoption of security standards across the IIoT ecosystem.
7. Capacity Building and Training Programs: Supporting capacity building and training
programs that educate stakeholders about cybersecurity best practices, risk management
strategies, and compliance requirements for IIoT deployments. By investing in workforce
development initiatives, organizations can enhance the cybersecurity skills and capabilities
of their employees, partners, and suppliers, improving overall resilience to cyber threats.
These programs also promote a culture of cybersecurity awareness and responsibility,
empowering individuals to contribute to collaborative efforts to secure industrial networks.
Results and Discussion:
1. Effectiveness of Proposed Strategies: The implementation of cryptographic techniques,
anomaly detection algorithms, access control mechanisms, and regular security audits has
shown promising results in enhancing the security and resilience of IIoT environments.
Organizations that have adopted these strategies report a reduction in security incidents,
improved incident response capabilities, and increased confidence in the integrity of their
industrial networks. Moreover, collaboration efforts, such as industry partnerships and
information sharing initiatives, have enabled organizations to stay ahead of emerging
threats and leverage collective intelligence to strengthen their defenses.
2. Challenges and Limitations: Despite their effectiveness, the adoption of proposed
strategies faces several challenges and limitations. Organizations often encounter barriers
such as resource constraints, legacy infrastructure, and compliance requirements that hinder
their ability to implement comprehensive security measures. Additionally, the rapidly
evolving nature of cyber threats necessitates ongoing investment in technology, training,
and awareness programs to keep pace with emerging risks. Moreover, achieving consensus
and coordination in collaborative efforts can be challenging due to varying priorities,
competitive interests, and regulatory differences among stakeholders [7].
3. Emerging Trends and Future Directions: As IIoT adoption continues to expand, several
emerging trends are shaping the future of cybersecurity in industrial environments. These
include the rise of edge computing, the proliferation of connected devices, and the
integration of artificial intelligence and machine learning for threat detection and response.
Additionally, regulatory developments, such as the introduction of industry-specific
cybersecurity regulations and standards, are influencing the way organizations approach
security and compliance. Looking ahead, future research and development efforts will
likely focus on enhancing the scalability, interoperability, and resilience of IIoT security
solutions to address evolving threats and technological advancements.
4. Recommendations for Practitioners and Policymakers: Based on the results and
discussions presented, several recommendations can be made for practitioners and
policymakers seeking to improve the security and resilience of IIoT environments. These
include:
Prioritize cybersecurity investments and allocate resources effectively to address the
most pressing threats and vulnerabilities.
Foster collaboration and information sharing among stakeholders to leverage collective
expertise and resources for cybersecurity.
Embrace emerging technologies and best practices to stay ahead of evolving cyber
threats and maintain a competitive edge.
Advocate for supportive regulatory frameworks and standards that promote
cybersecurity by design and encourage industry collaboration.
Invest in workforce development initiatives to enhance cybersecurity skills and
awareness across all levels of the organization.
Future Perspectives:
1. Security-by-Design Approach: The future of IIoT security lies in adopting a proactive,
security-by-design approach, where security considerations are integrated into every stage
of the IIoT lifecycle, from design and development to deployment and maintenance.
Embracing principles such as defense-in-depth, least privilege, and zero-trust architecture
will be crucial for building robust and resilient IIoT systems that can withstand evolving
cyber threats [8].
2. AI and Machine Learning Integration: The integration of artificial intelligence (AI) and
machine learning (ML) technologies will play a pivotal role in enhancing IIoT security. AI-
driven threat detection and response capabilities can analyze vast amounts of data in real-
time, identifying patterns indicative of malicious activity and enabling automated responses
to mitigate cyber threats. Additionally, ML algorithms can adapt and evolve over time,
improving their effectiveness in detecting and mitigating emerging cyber threats.
3. Edge Computing Security: With the proliferation of edge computing in IIoT deployments,
ensuring the security of edge devices and gateways will become increasingly important.
Edge computing brings processing power closer to the data source, enabling faster response
times and reduced latency, but it also introduces new security challenges. Future efforts
will focus on developing security solutions tailored to the unique requirements of edge
environments, such as lightweight encryption protocols, decentralized authentication
mechanisms, and edge-native intrusion detection systems.
4. Quantum-Safe Cryptography: As quantum computing continues to advance, the threat
landscape for cryptographic systems is evolving. Quantum computers have the potential to
break traditional cryptographic algorithms, rendering current security mechanisms
obsolete. To address this threat, research efforts are underway to develop quantum-safe
cryptographic algorithms that are resistant to quantum attacks. In the future, organizations
will need to transition to quantum-safe encryption protocols to ensure the long-term
security of their IIoT deployments.
5. Regulatory Compliance and Standards: The regulatory landscape for IIoT security is
expected to evolve, with governments and industry bodies introducing new regulations and
standards to address emerging cyber threats. Organizations will need to stay abreast of these
developments and ensure compliance with relevant regulations and standards. Additionally,
industry-led initiatives to develop voluntary cybersecurity frameworks and best practices
will continue to play a crucial role in guiding organizations towards achieving a higher
level of security maturity [9].
6. Cybersecurity Talent Development: As the demand for cybersecurity professionals
continues to grow, investing in talent development and workforce training will be essential
for addressing the skills gap in the cybersecurity field. Organizations should prioritize
recruiting and retaining skilled cybersecurity professionals and provide ongoing training
and professional development opportunities to ensure that their workforce remains
equipped to handle evolving cyber threats effectively.
7. International Collaboration and Information Sharing: Cyber threats transcend
geographic boundaries, underscoring the importance of international collaboration and
information sharing in combating cybercrime and enhancing cybersecurity. Future efforts
will focus on strengthening international partnerships, sharing threat intelligence, and
harmonizing cybersecurity standards and regulations across jurisdictions to foster a more
secure and resilient global IIoT ecosystem [10].
Conclusion:
In conclusion, securing Industrial Internet of Things (IIoT) environments against trust deficits
is paramount to ensuring the reliability, security, and resilience of critical industrial
infrastructure. Trust deficits in IIoT ecosystems stem from various factors, including device
integrity, data confidentiality, and communication security, posing significant cybersecurity
challenges for organizations across industries. Addressing these trust deficits requires a
multifaceted approach that encompasses technological innovation, regulatory compliance,
industry collaboration, and workforce development. Proposed strategies such as implementing
cryptographic techniques, anomaly detection algorithms, access control mechanisms, and
regular security audits have shown promise in enhancing the security posture of IIoT
deployments and mitigating the risk of cyber threats.
Furthermore, collaborative efforts, including industry partnerships, public-private partnerships,
information-sharing initiatives, and research consortia, play a crucial role in fostering a
collective response to cyber threats and promoting the adoption of best practices across the
IIoT ecosystem. By working together to share insights, resources, and expertise, organizations
can strengthen their defenses and adapt to the evolving threat landscape more effectively.
Looking ahead, future perspectives in IIoT security encompass embracing a security-by-design
approach, integrating AI and machine learning technologies, addressing edge computing
security challenges, transitioning to quantum-safe cryptography, ensuring regulatory
compliance and standards adherence, investing in cybersecurity talent development, and
fostering international collaboration and information sharing. In the face of evolving cyber
threats and digital transformation, organizations must remain vigilant and proactive in their
approach to IIoT security. By embracing emerging technologies, adopting best practices, and
collaborating with industry partners and stakeholders, organizations can build trust, resilience,
and confidence in their industrial networks, safeguarding critical infrastructure and enabling
continued innovation and growth in the era of connected industries.
References
[1] Padmapriya, V.M., Thenmozhi, K., Hemalatha, M. et al. Secured IIoT against trust deficit
- A flexi cryptic approach. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-
024-18962-x
[2] Bhattacharjee, Sravani. Practical Industrial Internet of Things security: A practitioner's
guide to securing connected industries. Packt Publishing Ltd, 2018.
[3] Gajek, Sebastian, Michael Lees, and Christoph Jansen. "IIoT and cyber-resilience: Could
blockchain have thwarted the Stuxnet attack?." AI & society 36.3 (2021): 725-735.
[4] Gajek, Sebastian, Michael Lees, and Christoph Jansen. "IIoT and cyber-resilience: Could
blockchain have thwarted the Stuxnet attack?." AI & society 36.3 (2021): 725-735.
[5] Danjuma, Umar Maiwada, et al. "Enhancing Security of 5G-Enabled IoT Systems through
Advanced Authentication Mechanisms: A Multifaceted Approach." UMYU Scientifica 2.4
(2023): 201-211.
[6] Bhardwaj, A., Bharany, S., Abulfaraj, A. W., Ibrahim, A. O., & Nagmeldin, W. (2024).
Fortifying home IoT security: A framework for comprehensive examination of
vulnerabilities and intrusion detection strategies for smart cities. Egyptian Informatics
Journal, 25, 100443.
[7] Ali, Mohammad Furqan. "IoHTs: Cybersecurity Approach in Internet of Healthcare
Things." ARIS2-Advanced Research on Information Systems Security 3.2 (2023): 26-33.
[8] Nankya, Mary, Robin Chataut, and Robert Akl. "Securing Industrial Control Systems:
Components, Cyber Threats, and Machine Learning-Driven Defense
Strategies." Sensors 23.21 (2023): 8840.
[9] Nankya, Mary, Robin Chataut, and Robert Akl. "Securing Industrial Control Systems:
Components, Cyber Threats, and Machine Learning-Driven Defense
Strategies." Sensors 23.21 (2023): 8840.
[10] Miraz, Mahdi H., and Maaruf Ali. "Integration of blockchain and IoT: an enhanced
security perspective." arXiv preprint arXiv:2011.09121 (2020).
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
This research allows the secure surveillance approach for the Internet of Things (IoT) methodology to be developed by integrating wireless signalling and image encryption strategy. Since the Cloud Service Telco (CST) is a semi-trusted body in cloud services, user data is encrypted before uploading to a cloud server for data protection from disclosure. The flexibility of encrypted data sharing is essential for cloud storage users. This study investigates the Discrete Wavelet Transform (DWT) technique with modified Huffman compression and Elliptic Curve Cryptography (ECC). It encrypts and decrypts the data and enhances industrial security surveillance in transmission. It uses the wireless network’s next generation (5G or 6G) as uplink Single Carrier Frequency Division Multiple Access (SC-FDMA) strategies via the IoT. This study presented a novel approach to proposing hardware architecture for a secure web camera integrated with the Atmel in the mega AVR family (ATMEGA) microcontroller, suitable for IoT applications. The experimental results confirm the proposed model’s efficacy compared with existing robustness and security analysis algorithms. These systems are also used by implementing industry-standard protocols using IoTs to monitor industrial applications. The proposed framework can also minimise bandwidth, transmission cost, storage space, tracking data, and decisions about abnormal events such as potential fraud and extinguisher detection in surveilling applications.
Article
Full-text available
The Internet of Things (IoT) has revolutionized communication among devices, offering unprecedented efficiency and convenience. However, the widespread adoption of IoT has raised significant security concerns, emphasizing the need for robust security measures. This study focuses on the crucial aspect of authentication within the layered architecture of IoT systems. Authentication is foundational to the architecture, ensuring the availability, security, and integrity of IoT services and data. The research evaluates the current state of IoT authentication techniques, highlighting limitations in conventional solutions. To address these shortcomings, an advanced authentication framework is proposed, incorporating cutting-edge technologies such as blockchain, artificial intelligence, and biometrics. The framework employs biometric data for a dynamic and adaptive authentication process, enhancing security and accuracy in user and device identification. Blockchain technology is integrated to establish a decentralized and tamper-resistant identity management system, reducing the risk of unauthorized access and data manipulation. Artificial intelligence continuously adapts authentication processes based on behavioural patterns, bolstering the system's resilience against evolving cyber threats. The study also discusses the practical application of the proposed authentication system, considering resource limitations in IoT devices. It provides insights into the efficiency, scalability, and interoperability of the suggested solution within various IoT ecosystems. The research contributes to the ongoing discourse on IoT security by thoroughly examining enhanced authentication procedures. Organizations can fortify their IoT deployments against a growing array of cyber threats by prioritizing advanced authentication within a layered design, fostering a more secure and reliable IoT ecosystem. Additionally, the study presents a comprehensive overview of the state-of-the-art security in IoT, exploring various designs, enabling technologies, and protocols. It delves into security challenges at each architectural tier, providing an in-depth analysis of attack taxonomies and advanced defenses. The article serves as a valuable resource for researchers and academics in the IoT sector, offering a detailed survey of architectural security, identification of challenges, resolution strategies, and insights into the evolving landscape of IoT. The study provides a comprehensive survey of IoT architectural security, identifying challenges, proposing resolutions, and highlighting changes in the IoT domain. This research aims to enhance the accuracy by 80% of IoT security, fostering a more secure and reliable IoT ecosystem.
Article
Full-text available
A huge demand for internet-connecting devices in the medical field is crucial for patient assistance. The current trends in healthcare industries, the Internet of Things (IoTs) play an ample role for nodes connectivity in the wireless domain. The main purpose of the integrated internet of healthcare things (IoHTs) as well as the Internet of medical things (IoMTs) is the real-time observation of patients and provide healthcare comfort zone for individuals. The emergence of novel treatment methodology and medical tools encourages delivering services for IoHT domain. Due to lack of publically useful database, that reflects cyberattacks on IoHT, expeditility privacy concern. Therefore, this study highlights the secure services to the current challenges and overviewed the solution of secured services targeting on IoHT attacks.
Article
Full-text available
Blockchain (BC), a by-product of Bitcoin cryptocurrency, has gained immense and wide scale popularity for its applicability in various diverse domains-especially in multifaceted non-monetary systems. By adopting cryptographic techniques such as hashing and asymmetric encryption-along with distributed consensus approach, a Blockchain based distributed ledger not only becomes highly secure but also immutable and thus eliminates the need for any third-party intermediators. On the contrary, innumerable IoT (Internet of Things) devices are increasingly being added to the network. This phenomenon poses higher risk in terms of security and privacy. It is thus extremely important to address the security aspects of the growing IoT ecosystem. This paper explores the applicability of BC for ensuring enhanced security and privacy in the IoT ecosystem. Recent research articles and projects/applications were surveyed to assess the implementation of BC for IoT Security and identify associated challenges and propose solutions for BC enabled enhanced security for the IoT ecosystem.
Practical Industrial Internet of Things security: A practitioner's guide to securing connected industries
  • Sravani Bhattacharjee
Bhattacharjee, Sravani. Practical Industrial Internet of Things security: A practitioner's guide to securing connected industries. Packt Publishing Ltd, 2018.