Advancing IOT Security: A Systemic and Cognitive Framework for Military Application


Authors : Mohamed Bahar; Dr. Muhammad Muqeem; Dr. Omkar Pattnaik; Dr. Pawan Baldhare

Volume/Issue : Volume 9 - 2024, Issue 6 - June


Google Scholar : https://tinyurl.com/48hcjr9e

Scribd : https://tinyurl.com/5n8dbp4u

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUN677

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : In the coming years, the protection of data, objects, networks, systems, and individuals within the Internet of Things (IoT) will take center stage in research and standardization efforts. The extensive connectivity of smart objects, coupled with their significant limitations, gives rise to numerous security issues that are not addressed by traditional security problem formulations and solutions. This work presents an overview of an IoT security roadmap to guide researchers interested in this field, basedona unique systemic andcognitive perspective. The function of each element of this approach will be clarified, and its relationships with other components and their influence on the entire system will be elaborated. In line with the innovative classification of IoT vision, a case study involving a military live simulation will be showcased to underline the components and interactions of the systemic and cognitive method. Following this, a discussionon security concerns related to privacy, trust, identification, and access control will be conducted, and various research challenges will be underscored.

Keywords : Internet of Things, Security, Systemic and Cognitive Approach, Military Live Simulation.

References :

  1. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” Future Gener.Comput. Syst., vol. 29, no. 7, pp. 1645– 1660, 2013.
  2. Y. Challal, “Securite de l’internet des objets : vers une approche cognitive et systemique,” HDR, Universite de Technologie de Compiegne, 2012.
  3. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah, “A systemic approach for iot security,” in DCOSS. IEEE, 2013, pp. 351–355.
  4. Riahi, E. Natalizio, Y. Challal, N. Mitton, and A. Iera, “A systemic and cognitive approach for IoT security,” in International Conference on Computing, Networking and Communications (ICNC 2014), Honolulu, United States, 2014, invited Paper.
  5. L. Kiely and T. V. Benzel, Systemic security management,” IEEE Security and Privacy, vol. 4, no. 6, pp. 74–77, 2006. [6] [Online]. Available: http://www.27000.org/ “Advancing IoT Security: A Systemic and Cognitive Framework for Military Applications”
  6. K. Klair, K.-W. Chin, and R. Raad, “A survey and tutorial of rfid anti-collision protocols,” IEEE Communications Surveys and Tutorials, vol. 12, no. 3, pp. 400–421, 2010.
  7. R. Acharya and K. Asha., “Data integrity and intrusion detection in wireless sensor networks,” in 2008 16th IEEE International Conference on Networks, Dec 2008, pp. 1–5.
  8. J. Medeiros, E. F. Watson, J. S. C. II, and M. S. Manivannan, Eds., Proceedings of the 30th conference on Winter simulation, WSC 1998, Washington DC, USA, December 13-16, 1998. WSC, 1998. [Online]. Available: http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5993
  9. J. E. Hannay, O. M. Mevassvik, A. Skjeltorp, and K. Brathen, “Live, virtual, constructive (lvc) simulation for land operations training: Concept development & experimentation (cd&e).”
  10. NATO Science and Technology Organization, 2014

In the coming years, the protection of data, objects, networks, systems, and individuals within the Internet of Things (IoT) will take center stage in research and standardization efforts. The extensive connectivity of smart objects, coupled with their significant limitations, gives rise to numerous security issues that are not addressed by traditional security problem formulations and solutions. This work presents an overview of an IoT security roadmap to guide researchers interested in this field, basedona unique systemic andcognitive perspective. The function of each element of this approach will be clarified, and its relationships with other components and their influence on the entire system will be elaborated. In line with the innovative classification of IoT vision, a case study involving a military live simulation will be showcased to underline the components and interactions of the systemic and cognitive method. Following this, a discussionon security concerns related to privacy, trust, identification, and access control will be conducted, and various research challenges will be underscored.

Keywords : Internet of Things, Security, Systemic and Cognitive Approach, Military Live Simulation.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe