Fortifying IoT Network Security: A Resilient Model Against Cyber Attacks

         


        This study examines a robust framework for enhancing Internet of Things (IoT) network security, focusing on protecting IoT devices against cyber attacks. IoT integration has transformed industries like healthcare, transportation, and smart city development. However, IoT devices often face vulnerabilities due to limited processing power, memory, and storage. This study builds upon prior research to introduce three key methods that address these issues and protect networks from prevalent threats.

1. Local Certificate Authority (CA) Method
To counter "parking lot attacks," where malicious devices gain network access, this method ensures each device receives a unique certificate upon joining the network. A controller device verifies these certificates continuously, preventing unauthorized devices from disrupting network operations.

2. Secured Keywords Dictionary
This mechanism restricts access to a dictionary of encryption keys, protecting against dictionary-based attacks. Inspired by UNIX system safeguards, this approach encrypts sensitive data, allowing only authorized access and ensuring that even if a device is compromised, its keys remain secure.

3. Missing Device Detection
To address physical attacks or device removal, the controller monitors device responses every 20 minutes. If a device fails to respond after multiple attempts, the system deactivates its keys, minimizing the risk of network compromise.

These enhancements create a secure, responsive IoT network that is resilient to common vulnerabilities. Real-world applications of this model could strengthen IoT networks in various fields, promoting data security and privacy. Further studies will focus on scaling this protocol for diverse environments and large networks.

🔗 Full Text: https://www.igminresearch.com/articles/html/igmin149


🔗 DOI Link: https://dx.doi.org/10.61927/igmin149

Comments