Authors :
Mohamed Bahar; Dr. Muhammad Muqeem; Dr. Omkar Pattnaik; Dr. Pawan Baldhare
Volume/Issue :
Volume 9 - 2024, Issue 6 - June
Google Scholar :
https://tinyurl.com/48hcjr9e
Scribd :
https://tinyurl.com/5n8dbp4u
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUN677
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
In the coming years, the protection of data,
objects, networks, systems, and individuals within the
Internet of Things (IoT) will take center stage in research
and standardization efforts. The extensive connectivity of
smart objects, coupled with their significant limitations,
gives rise to numerous security issues that are not
addressed by traditional security problem formulations
and solutions. This work presents an overview of an IoT
security roadmap to guide researchers interested in this
field, basedona unique systemic andcognitive perspective.
The function of each element of this approach will be
clarified, and its relationships with other components and
their influence on the entire system will be elaborated. In
line with the innovative classification of IoT vision, a case
study involving a military live simulation will be showcased
to underline the components and interactions of the
systemic and cognitive method. Following this, a
discussionon security concerns related to privacy, trust,
identification, and access control will be conducted, and
various research challenges will be underscored.
Keywords :
Internet of Things, Security, Systemic and Cognitive Approach, Military Live Simulation.
References :
- J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” Future Gener.Comput. Syst., vol. 29, no. 7, pp. 1645– 1660, 2013.
- Y. Challal, “Securite de l’internet des objets : vers une approche cognitive et systemique,” HDR, Universite de Technologie de Compiegne, 2012.
- Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah, “A systemic approach for iot security,” in DCOSS. IEEE, 2013, pp. 351–355.
- Riahi, E. Natalizio, Y. Challal, N. Mitton, and A. Iera, “A systemic and cognitive approach for IoT security,” in International Conference on Computing, Networking and Communications (ICNC 2014), Honolulu, United States, 2014, invited Paper.
- L. Kiely and T. V. Benzel, Systemic security management,” IEEE Security and Privacy, vol. 4, no. 6, pp. 74–77, 2006. [6] [Online]. Available: http://www.27000.org/ “Advancing IoT Security: A Systemic and Cognitive Framework for Military Applications”
- K. Klair, K.-W. Chin, and R. Raad, “A survey and tutorial of rfid anti-collision protocols,” IEEE Communications Surveys and Tutorials, vol. 12, no. 3, pp. 400–421, 2010.
- R. Acharya and K. Asha., “Data integrity and intrusion detection in wireless sensor networks,” in 2008 16th IEEE International Conference on Networks, Dec 2008, pp. 1–5.
- J. Medeiros, E. F. Watson, J. S. C. II, and M. S. Manivannan, Eds., Proceedings of the 30th conference on Winter simulation, WSC 1998, Washington DC, USA, December 13-16, 1998. WSC, 1998. [Online]. Available: http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5993
- J. E. Hannay, O. M. Mevassvik, A. Skjeltorp, and K. Brathen, “Live, virtual, constructive (lvc) simulation for land operations training: Concept development & experimentation (cd&e).”
- NATO Science and Technology Organization, 2014
In the coming years, the protection of data,
objects, networks, systems, and individuals within the
Internet of Things (IoT) will take center stage in research
and standardization efforts. The extensive connectivity of
smart objects, coupled with their significant limitations,
gives rise to numerous security issues that are not
addressed by traditional security problem formulations
and solutions. This work presents an overview of an IoT
security roadmap to guide researchers interested in this
field, basedona unique systemic andcognitive perspective.
The function of each element of this approach will be
clarified, and its relationships with other components and
their influence on the entire system will be elaborated. In
line with the innovative classification of IoT vision, a case
study involving a military live simulation will be showcased
to underline the components and interactions of the
systemic and cognitive method. Following this, a
discussionon security concerns related to privacy, trust,
identification, and access control will be conducted, and
various research challenges will be underscored.
Keywords :
Internet of Things, Security, Systemic and Cognitive Approach, Military Live Simulation.