2/2025 - 8 |
Extra paper information in ![]() ![]() ![]() |
Click to see author's profile in ![]() ![]() ![]() |
Not available online | Downloads: 0 | Views: 3 |
Author keywords
security, intrusion detection, authentication, encryption, data privacy
References keywords
security(14), systems(12), india(11), roedunet(9), technology(7), network(7), smart(5), privacy(5), internet(5), electronics(5)
No common words between the references section and the paper title.
About this article
Date of Publication: 2025-06-30
Volume 25, Issue 2, Year 2025, On page(s): 69 - 80
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2025.02008
Abstract
This paper presents a comprehensive review of techniques developed to secure Internet of Things (IoT) infrastructures, motivated by the exponential growth of connected devices and their associated vulnerabilities. In addition to reviewing recent advances in the field, the paper provides experimental validation of selected methods through controlled simulations and real -world test scenarios. The analysis covers encryption protocols, authentication mechanisms, and artificial intelligence-based intrusion detection, emphasizing the effectiveness of layered defence strategies that include anomaly detection and real-time incident response. The study highlights both the technical limitations of current IoT devices and the potential of adaptive security models when properly implemented. It also highlights the importance of combining technical assurance with standardized risk management policies to increase system resilience. By integrating theoretical knowledge with practical experiments, the article contributes to the development of more robust and adaptive IoT security frameworks. |
References | | | Cited By «-- Click to see who has cited this paper |
[1] N. Ammanagi, S. Kulkarni, R. Giri, A. P. S, B. Khati, "Empowering conventional systems: Transforming electronics into smart devices through single-board computers and cloud-based IoT integration," in 2024 IEEE 9th International Conference for Convergence in Technology (I2CT, Pune, India, 2024, pp. 1-6. doi:10.1109/I2CT61223.2024.10543287
[2] "IEEE/UL Standard for clinical internet of things (IoT) data and device interoperability with TIPPSS-Trust, identity, privacy, protection, safety, and security," IEEE Std 2933-2024UL, vol. l, pp. 1-274, Sep. 2024. doi:10.1109/IEEESTD.2024.10697446 [3] E. M. Timofte, D. Balan, "Improving network security using DD- WRT as a solution for SOHO routers," in 2023 22nd RoEduNet Conference: Networking in Education and Research (RoEduNet, Craiova, Romania, 2023, pp. 1-5. doi:10.1109/RoEduNet60162.2023.10274916 [4] A. Mektepbaeva, A. Medarov, A. Kulmuratova, "Analysis of penetration testing methods for specific IoT device: IP camera," in 2024 IEEE 4th International Conference on Smart Information Systems and Technologies (SIST, Astana, Kazakhstan, 2024, pp. 76-82. doi:10.1109/SIST61555.2024.10629431 [5] R. Joshi, A. Sharma, "Compact size and high gain microstrip patch antenna design for mmWave 5G wireless communication," in 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS, Raichur, India, 2024, pp. 1-4. doi:10.1109/ICICACS60521.2024.10498315 [6] M. Adam, M. Hammoudeh, R. Alrawashdeh, B. Alsulaimy, "A Survey on security, privacy, trust, and architectural challenges in IoT systems," in IEEE Access, vol. 12, 2024, pp. 57128-57149. doi:10.1109/ACCESS.2024.3382709 [7] M. Datta, R. Raman, "AI and ML in retail: IoT sensors and augmented reality for competitive strategies using IoT and linear regression," in 2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE, Bangalore, India, 2024, pp. 1-5. doi:10.1109/IITCEE59897.2024.10467247 [8] V. K. V. V. Bathalapalli, S. P. Mohanty, E. Kougianos, V. Iyer, B. Rout, "PMsec 2.0: A security-by-design solution for doctorâs dilemma problem in smart healthcare," in 2023 OITS International Conference on Information Technology (OCIT, Raipur, India, 2023, pp. 456-461. doi:10.1109/OCIT59427.2023.10430808 [9] H. Strohmier, J. R. Lowe, A. G. Rodriguez, M. M. Trammell, "Security and privacy threats posed by IoT devices used by students on college campuses," in 12th International Symposium on Digital Forensics and Security (ISDFS, San Antonio, TX, USA, 2024, pp. 1-6. doi:10.1109/ISDFS60797.2024.10527253 [10] R. C. Molokwu, B. C. Molokwu, V. C. Molokwu, "An overview of blockchain-based application in internet of things (IoT)," in 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Honolulu, Oahu, HI, USA, 2023, pp. 280-285. doi:10.1109/SMC53992.2023.10394258 [11] J. Alsafran, W. Elmedany, M. S. Sharif, "Solution of IoT security and privacy challenges: A systematic literature review," in Arab ICT Conference (AICTC, Manama, Bahrain, 2024, pp. 145-154. doi:10.1109/AICTC58357.2024.10735034 [12] "IEEE Standard for Blockchain-Based Zero-Trust Framework for the Internet of Things (IoT)," IEEE Std 3219-2023, vol. l, pp. 1-26, Apr. 2024. doi:10.1109/IEEESTD.2024.10531234 [13] S. Barrett, B. Boswell, G. Dorai, "Exploring the vulnerabilities of IoT devices: A comprehensive analysis of Mirai and Bashlite attack vectors," in 2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS, San Antonio, TX, USA, 2023, pp. 125-132. doi:10.1109/IOTSMS59855.2023.10325725 [14] A. Rakshe, N. Dongre, "Survey on security protocols for IoT," in 2024 IEEE 9th International Conference for Convergence in Technology (I2CT, Pune, India, 2024, pp. 1-5. doi:10.1109/I2CT61223.2024.10544115 [15] G. Neelakantam, "Prediction model for suicidal behavior disorder risk analysis by correlating cyber and real world data," in 2024 International Conference on Emerging Techniques in Computational Intelligence (ICETCI, Hyderabad, India, 2024, pp. 223-229. doi:10.1109/ICETCI62771.2024.10704210 [16] A. V. Vardhan, S. Mohanty, M. Pradhan, "A lightweight blockchain-enabled authentication scheme for securing internet of drones devices," in 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE), Rourkela, India, 2024, pp. 1-6. doi:10.1109/ICSPCRE62303.2024.10674933 [17] S. Nanthini, U. Jain, R. Arora, R. Bhatia, K. Sutaria, H. Patil, "Virtual twin analytics: Advancing IoT security through AI-powered software informatics," in 2024 First International Conference on Software, Systems and Information Technology (SSITCON, Tumkur, India, 2024, pp. 1-8. doi:10.1109/SSITCON62437.2024.10796819 [18] M. Snehi, A. Bhandari, "IoT-based DDoS on cyber physical systems: Research challenges, datasets and future prospects," in 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS, Toronto, ON, Canada, 2022, pp. 1-8. doi:10.1109/IEMTRONICS55184.2022.9795708 [19] P. P. Pawar, D. Kumar, R. Krupa, P. K. Pareek, H. M. Manoj, K. S. Deepika, "SINN based federated learning model for intrusion detection with blockchain technology in digital forensic," in 2024 International Conference on Data Science and Network Security (ICDSNS, Tiptur, India, 2024, pp. 01-07. doi:10.1109/ICDSNS62112.2024.10691050 [20] J. R. Raj, S. Srinivasulu, "Design of IoT based VPN gateway for Home network," in 2022 International Conference on Electronics and Renewable Systems (ICEARS), Tuticorin, India, 2022, pp. 561-564. doi:10.1109/ICEARS53579.2022.9751838 [21] D.-F. Hritcan, A. Graur, D. Balan, "Securing IoT environments using ZeroTier and OPNsense," in 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet, Sep. 2024, pp. 1-4. doi:10.1109/RoEduNet64292.2024.10722755 [22] C. K. N. S. A. C. K. M. Rafee, N. S. M. Usop, "Towards secure local area network (LAN) using opnsense firewall," Malays. J. Comput. Appl. Math., vol. 6, no. 1, Art. no. 1, Mar. 2023. doi:10.37231/myjcam.2023.6.1.85 [23] J. S. Majid, "Building a firewall and intrusion detection system dased network security system using opnsense tools," Iraqi J. Intell. Comput. Inform. IJICI, vol. 4, no. 1, Art. no. 1, Apr. 2025. doi:10.52940/ijici.v4i1.96 [24] V. B. A. Pardosi, S. Sutariyani, M. Ikhsanudin, A. Naufal, "Addressing DNS propagation challenges with repurposed STBs, ZeroTier networking, and indonesian ISP integration," J. Intell. Syst. Inf. Technol., vol. 1, no. 2, Art. no. 2, Jul. 2024. doi:10.61971/jisit.v1i2.46 [25] D.-F. Hritcan, D. Balan, "Exposing IoT Platforms securely and anonymously behind CGNAT," in 2024 23rd RoEduNet Conference: Networking in Education and Research (RoEduNet, Sep. 2024, pp. 1-4. doi:10.1109/RoEduNet64292.2024.10722287 [26] A. Susanto, A. H. Fathulloh, Nuryasin, A. Fitriyani, "Comparative analysis of key management service performance on AWS, Google Cloud, and Oracle Cloud with performance testing," in 2023 11th International Conference on Cyber and IT Service Management (CITSM), Nov. 2023, pp. 1-6. doi:10.1109/CITSM60085.2023.10455569 [27] I. Ali, J. Li, J. Chen, Y. Chen, S. Ullah, A. Wakeel, "Preserving location privacy of IoT devices in heterogeneous edge computing architecture through deniability-based authentication," in IEEE Transactions on Consumer Electronics. doi:10.1109/TCE.2025.3544271 [28] P. Vaish, N. Anand, G. Sharma, "Dealing heavy IoT systems with hybrid cloud platform," in 2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI, Gwalior, India, 2022, pp. 1-4. doi:10.1109/IATMSI56455.2022.10119415 [29] F. B. Fava et al., "Assessing the performance of docker in docker containers for microservice-based architectures," in 2024 32nd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Mar. 2024, pp. 137-142. doi:10.1109/PDP62718.2024.00026 [30] W. M. C. J. T. Kithulwatta, K. P. N. Jayasena, B. T. G. S. Kumara, R. M. K. T. Rathnayaka, "Docker containerized infrastructure orchestration with portainer container-native approach," in 2022 3rd International Conference for Emerging Technology (INCET), May 2022, pp. 1-6. doi:10.1109/INCET54531.2022.9825257 [31] J. D. Dzaky, J. A. Saputra, N. N. Singale, H. A. Saputri, A. C. Sari, "Improving DNS server resilience against DDoS attacks through anycast routing," in 2024 6th International Conference on Cybernetics and Intelligent System (ICORIS), Nov. 2024, pp. 1-6. doi:10.1109/ICORIS63540.2024.10903731 [32] D.-F. Hritcan, D. Balan, "Using tailscale and PfSense for security and anonymity of iot environments," in 2024 International Conference on Development and Application Systems (DAS, May 2024, pp. 91-94. doi:10.1109/DAS61944.2024.10541192 [33] M. Soltane, A. Gasmi, "Network attack detection in the pfsense firewall via deep learning," in 2024 IEEE International Multi- Conference on Smart Systems & Green Process (IMC-SSGP), Djerba, Tunisia, 2024, pp. 1-6. doi:10.1109/IMC-SSGP63352.2024.10919795 [34] H. Is, "A comprehensive analysis of NGFWs for cyber-physical system security after the crowdstrike incident," in 2024 Global Energy Conference (GEC, Batman, Turkiye, 2024, pp. 12-20. doi:10.1109/GEC61857.2024.10881876 Web of Science® Citations for all references: 0 SCOPUS® Citations for all references: 0 Web of Science® Average Citations per reference: 0 SCOPUS® Average Citations per reference: 0 TCR = Total Citations for References / ACR = Average Citations per Reference We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more Citations for references updated on 2025-06-30 13:45 in 3 seconds. Note1: Web of Science® is a registered trademark of Clarivate Analytics. Note2: SCOPUS® is a registered trademark of Elsevier B.V. Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site. |
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania
All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.
Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.
Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.