Examining Techniques to Enhance the Security and Privacy of IoT Devices and Networks against Cyber Threats †
Abstract
:1. Introduction
1.1. Aim
- RO 1: To analyse the factors associated with the security of IoT devices and networks.
- RO 2: To analyse the role of regulatory policy in order to provide security of IoT devices and networks.
- RO 3: To examine the role of users and user precautions training for securing IoT devices and networks.
- RO 4: To elaborate on the challenges that are hindering the security of IoT and network security.
1.2. Research Question
- RQ 1: What are the factors associated with the security of IoT devices and networks?
- RQ 2: How does regulatory policy provide security for IoT devices and networks?
- RQ 3: What is the role of users and user precautions training for securing IoT devices and networks?
- RQ 4: What are the challenges, hindering the security of IoT and network security?
2. Literature Review
Factors Associated with the Security of IoT Devices and Networks
3. Methodology
3.1. Data Collection
3.2. Data Analysis
Findings
3.3. Regression Analysis
4. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Albaseer, A.; Abdallah, M. Privacy-Preserving Honeypot-Based Detector in Smart Grid Networks: A New Design for Quality-Assurance and Fair Incentives Federated Learning Framework. In Proceedings of the IEEE Consumer Communications and Networking Conference, CCNC, Las Vegas, NV, USA, 8–11 January 2023. [Google Scholar] [CrossRef]
- Gupta, S.; Singh, G. An Empirical Study of IoT Technology to Enhance Data Breaches and Critical Protective Methods via Various Correlation. In Proceedings of the 2022 11th International Conference on System Modeling and Advancement in Research Trends, SMART 2022, Moradabad, India, 16–17 December 2022. [Google Scholar] [CrossRef]
- Bocean, C.G.; Vărzaru, A.A. A Two-Stage SEM–Artificial Neural Network Analysis of Integrating Ethical and Quality Requirements in Accounting Digital Technologies. Systems 2022, 10, 121. [Google Scholar] [CrossRef]
- Mohammed, H.; Hasan, S.R.; Awwad, F. Fusion-on-field security and privacy preservation for IoT edge devices: Concurrent defense against multiple types of hardware trojan attacks. IEEE Access 2020, 8, 36847–36862. [Google Scholar] [CrossRef]
- Haghparast, M.B.; Berehlia, S.; Akbari, M.; Sayadi, A. Developing and evaluating a proposed health security framework in IoT using fuzzy analytic network process method. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 3121–3138. [Google Scholar] [CrossRef]
- Fodor, M.; Viktor, P. IOT devices and 5G network security option from generation aspects. In Proceedings of the ICCC 2022-IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-Medical Systems, Proceedings, Reykjavík, Iceland, 6–9 July 2022. [Google Scholar] [CrossRef]
- Ratkovic, N. Improving home security using blockchain. Int. J. Comput. Inf. Manuf. (IJCIM) 2022, 2, 27–37. [Google Scholar] [CrossRef]
- Hassan, M.M.; Gumaei, A.; Huda, S.; Almogren, A. Increasing the Trustworthiness in the Industrial IoT Networks through a Reliable Cyberattack Detection Model. IEEE Trans. Ind. Inform. 2020, 16, 6154–6162. [Google Scholar] [CrossRef]
- Zhou, C.; Song, W.; Liu, L.; Niu, Z. Blockchain Technology-Enabled Smart Product-Service System Lifecycle Management: A Conceptual Framework. In Proceedings of the IEEE International Conference on Automation Science and Engineering, Hong Kong, China, 20–21 August 2020. [Google Scholar] [CrossRef]
- Suhluli, S.A.; Khan, S.M.F.A. Determinants of user acceptance of wearable IoT devices. Cogent Eng. 2022, 9, 2087456. [Google Scholar] [CrossRef]
- Chukwuere, J.E.; Molefe, B. The Impact of Data Security on the Internet of Things. In Artificial Intelligence in Industry 4.0 and 5G Technology; Chapter 5; Wiley: Hoboken, NJ, USA, 2022. [Google Scholar] [CrossRef]
- Hamza, M.; Akbar, M.A.; Shafiq, M.; Kamal, T.; Baddour, A.M. Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation. Rev. Comput. Eng. Res. 2019, 6. Review of computer Engg Research. [Google Scholar] [CrossRef]
- Alseady, S.; Baz, A.; Alsubait, T.; Alarabi, L.; Alhakami, H. Towards Security Challenges to Internet-of-Things: Big Data, Networks, and Applications. Int. J. Comput. Sci. Netw. Secur. 2020, 20, 131–141. [Google Scholar]
- Ula, M.; Adek, R.T.; Mukhlish. Towards The Secure Internet of Things: Threats and Solution. In Proceedings of the Malikussaleh International Conference on Multidisciplinary Studies (MICoMS), Lhokseumawe, Indonesia, 30–31 January 2023; Volume 3. [Google Scholar] [CrossRef]
- Khumalo, S.; Sibiya, A.; Teballo; Kekana, A. Strategies for Internet of Things Data Privacy and Security Using Systematic Review. In Proceedings of the European Conference on Information Warfare and Security, ECCWS, Chester, UK, 16–17 June 2022. [Google Scholar] [CrossRef]
- Hussain, B.; Elmedany, W.; Sharif, M.S. The Internet of Things Security Issues and Countermeasures in Network Layer: A Systematic Literature Review. In Proceedings of the 2022 International Conference on Data Analytics for Business and Industry, ICDABI 2022, Sakhir, Bahrain, 25–26 October 2022. [Google Scholar] [CrossRef]
- Chukwuere, J.E. Internet of Things (IoT) Cybersecurity Challenges and Mitigation Mechanisms. Khazanah Sos. 2022, 4, 235–240. [Google Scholar] [CrossRef]
- Devarakonda, S.; Halgamuge, M.N.; Mohammad, A. Critical Issues in the Invasion of the Internet of Things (IoT): Security, Privacy, and Other Vulnerabilities. In Research Anthology on Privatizing and Securing Data; IGI Global: Hershey, PA, USA, 2021. [Google Scholar] [CrossRef]
- Ali, A.; Mateen, A.; Hanan, A.; Amin, F. Advanced Security Framework for Internet of Things (IoT). Technologies 2022, 10, 60. [Google Scholar] [CrossRef]
- Naria, I.P.; Sulistyo, S.; Widyawan. Security and Privacy Issue in Internet of Things, Smart Building System: A Review. In Proceedings of the 2022 International Symposium on Information Technology and Digital Innovation: Technology Innovation During Pandemic, ISITDI 2022, Padang, Indonesia, 27–28 July 2022. [Google Scholar] [CrossRef]
Frequency | Percent | Valid Percent | Cumulative Percent | |
---|---|---|---|---|
Valid Female | 34 | 45.3 | 45.3 | 45.3 |
Male | 34 | 45.3 | 45.3 | 90.7 |
Others | 7 | 9.3 | 9.3 | 100.0 |
Total | 75 | 100 | 100 |
Frequency | Percent | Valid Percent | Cumulative Percent | |
---|---|---|---|---|
Valid Below 20 | 34 | 45.3 | 45.3 | 45.3 |
Between 20 and 25 | 34 | 45.3 | 45.3 | 90.7 |
Between 35 and 60 | 7 | 9.3 | 9.3 | 100.0 |
Total | 75 | 100 | 100 |
Frequency | Percent | Valid Percent | Cumulative Percent | |
---|---|---|---|---|
Valid Below RS 18,000 | 7 | 9.3 | 9.3 | 9.3 |
Between RS 18,000 and 30,000 | 35 | 46.7 | 46.7 | 46.7 |
Between RS 30,000 and 50,000 | 33 | 44.0 | 44.0 | 100.0 |
Total | 75 | 100 | 100 |
Descriptive Statistics | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
N | Range | Minimum | Maximum | Mean | Std Deviation | Variance | Skewness | Kurtosis | ||||
Statistic | Statistic | Statistic | Statistic | Statistic | Std. Error | Statistic | Statistic | Statistic | Std. Error | Statistic | Std. Error | |
DV | 75 | 5.00 | 3.00 | 8.00 | 3.6133 | 0.16861 | 1.46022 | 2.132 | 2.579 | 0.277 | 5.256 | 0.548 |
IV1 | 75 | 6.00 | 2.00 | 8.00 | 3.7467 | 0.20008 | 1.73278 | 3.003 | 1.236 | 0.277 | 0.949 | 0.548 |
IV2 | 75 | 5.00 | 2.00 | 7.00 | 3.5467 | 0.18138 | 1.5079 | 2.467 | 1.137 | 0.277 | 0.151 | 0.548 |
IV3 | 75 | 5.00 | 3.00 | 8.00 | 4.0267 | 0.17499 | 1.51545 | 2.297 | 1.629 | 0.277 | 1.892 | 0.548 |
IV4 | 75 | 5.00 | 3.00 | 8.00 | 3.8267 | 0.19207 | 1.66338 | 2.767 | 1.713 | 0.277 | 1.376 | 0.548 |
Valid N (List wise) | 75 |
Model Summary | ANOVA | Coefficients | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Model | R | R Square | Adjusted R Square | Std. Error of the Estimate | Change Statistics | Durbin Watson | Model | Sum of Squares | df | Mean Square | F | sig | Model | Unstandardized Coefficients | Standardized Coefficients | t | Sig | Correlations | Collinearity Statistics | ||||||||
R Square Change | F Change | d1 | df2 | Sig. F Change | B | Std Error | Beta | Zero Order | Partial | Part | Tolerance | VIF | |||||||||||||||
1 | 0.692 | 0.479 | 0.472 | 1.06069 | 0.479 | 67.247 | 1 | 73 | 0.000 | 2.276 | Regression Residual total | 75.657 | 1 73 74 | 75.657 1.125 | 67.247 | 0.000 | 1 (constant) IV1 | 1.427 0.584 | 0.293 0.071 | 0.692 | 4.864 8.200 | 0.000 0.000 | 0.692 | 0.692 | 0.692 | 1.000 | 1.000 |
Model Summary | ANOVA | Coefficients | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Model | R | R Square | Adjusted R Square | Std. Error of the Estimate | Change Statistics | Durbin Watson | Model | Sum of Squares | df | Mean Square | F | sig | Model | Unstandardized Coefficients | Standardized Coefficients | t | Sig | Correlations | Collinearity Statistics | ||||||||
R Square Change | F Change | d1 | df2 | Sig. F Change | B | Std Error | Beta | Zero Order | Partial | Part | Tolerance | VIF | |||||||||||||||
1 | 0.741 | 0.550 | 0.544 | 0.98647 | 0.550 | 89.143 | 1 | 73 | 0.000 | 2.633 | Regression Residual total | 86.784 71.038 157.787 | 1 73 74 | 86.784 0.973 | 89.143 | 0.000 | 1 (constant) IV2 | 1.169 0.689 | 0.283 0.073 | 0.741 | 40.132 9.442 | 0.000 0.000 | 0.741 | 0.741 | 0.741 | 1.000 | 1.000 |
Model Summary | ANOVA | Coefficients | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Model | R | R Square | Adju-sted R Square | Std. Error of the Estimate | Change Statistics | Durbin Watson | Model | Sum of Squares | df | Mean Square | F | sig | Model | Unstandardized Coefficients | Standardized Coefficients | t | Sig | Correlations | Collinearity Statistics | ||||||||
R Square Change | F Change | d1 | df2 | Sig. F Change | B | Std Error | Beta | Zero Order | Partial | Part | Tolerance | VIF | |||||||||||||||
1 | 0.780 | 0.609 | 0.603 | 0.91951 | 0.609 | 113.621 | 1 | 73 | 0.000 | 2.805 | 1 Regression Residual total | 96.066 61.721 157.787 | 1 73 74 | 96.066 0.845 | 113.621 | 0.000 | 1 (constant) IV2 | 0.586 0.752 | 0.303 0.071 | 0.780 | 1.932 10.659 | 0.057 0.000 | 0.780 | 0.780 | 0.780 | 1.000 | 1.000 |
Model Summary | ANOVA | Coefficients | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Model | R | R Square | Adjusted R square | Std. Error of the Estimate | Change Statistics | Durbin Watson | Model | Sum of Squares | df | Mean Square | F | sig | Model | Unstandardized Coefficients | Standardized Coefficients | t | Sig | Correlations | Collinearity Statistics | ||||||||
R Square Change | F Change | d1 | df2 | Sig. F Change | B | Std Error | Beta | Zero Order | Partial | Part | Tolerance | VIF | |||||||||||||||
1 | 0.762 | 0.581 | 0.575 | 0.95195 | 0.581 | 101.118 | 1 | 73 | 0.000 | 2.696 | 1 Regression Residual total | 91.634 66.153 157.787 | 1 73 74 | 91.634 0.906 | 101.118 | 0.000 | 1 (constant) IV2 | 1.053 0.669 | 0.277 0.067 | 0.762 | 3.799 10.056 | 0.000 0.000 | 0.762 | 0.762 | 0.762 | 1.000 | 1.000 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Qureshi, I.; Habeeb, M.A.; Shadab, S.G.M.; Mohammad, B.; Irfan, M.; Shavalliuddin, S.M.; Gupta, M. Examining Techniques to Enhance the Security and Privacy of IoT Devices and Networks against Cyber Threats. Eng. Proc. 2024, 62, 23. https://doi.org/10.3390/engproc2024062023
Qureshi I, Habeeb MA, Shadab SGM, Mohammad B, Irfan M, Shavalliuddin SM, Gupta M. Examining Techniques to Enhance the Security and Privacy of IoT Devices and Networks against Cyber Threats. Engineering Proceedings. 2024; 62(1):23. https://doi.org/10.3390/engproc2024062023
Chicago/Turabian StyleQureshi, Imran, Mohammed Abdul Habeeb, Syed Ghouse Mohiuddin Shadab, Burhanuddin Mohammad, Mohammed Irfan, Syed Muhammad Shavalliuddin, and Mohit Gupta. 2024. "Examining Techniques to Enhance the Security and Privacy of IoT Devices and Networks against Cyber Threats" Engineering Proceedings 62, no. 1: 23. https://doi.org/10.3390/engproc2024062023