Enhancing Resilience in IoT Architectures for Critical IT Systems: A Comprehensive Review |
||
|
|
|
© 2024 by IJCTT Journal | ||
Volume-72 Issue-5 |
||
Year of Publication : 2024 | ||
Authors : Anirudh Khanna, Deep Manishkumar Dave | ||
DOI : 10.14445/22312803/IJCTT-V72I5P128 |
How to Cite?
Anirudh Khanna, Deep Manishkumar Dave, "Enhancing Resilience in IoT Architectures for Critical IT Systems: A Comprehensive Review," International Journal of Computer Trends and Technology, vol. 72, no. 5, pp. 223-231, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I5P128
Abstract
This paper explores the criticality of cybersecurity measures within the realms of IoT and IT systems, emphasizing the integration of resilient architectures to combat the sophisticated array of cyber threats that jeopardize the integrity, confidentiality, and availability of information. It dissects the vulnerabilities inherent in contemporary IoT and IT ecosystems, proposing a layered security approach that marries state-of-the-art encryption, anomaly detection, and security-by-design principles. This research underscores the importance of adaptability, proactive defense mechanisms, and the implementation of comprehensive security policies tailored to the unique challenges posed by the IoT landscape. The findings aim to guide stakeholders in fortifying their networks against escalating cyber threats, ensuring the sustainable and secure expansion of IoT technologies across critical infrastructures.
Keywords
Anomaly detection, Cybersecurity, Encryption, IoT, Resilience, Security-by-Design, Vulnerabilities.
Reference
[1] Chanhyuk Lee et al., “Addressing IoT Storage Constraints: A Hybrid Architecture for Decentralized Data Storage and Centralized Management,” Internet of Things, vol. 25, pp. 1-17, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Aron Laszka et al., “Integrating Redundancy, Diversity, and Hardening to Improve Security of Industrial Internet of Things,” CyberPhysical Systems, vol. 6, no. 1, pp. 1–32, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Zhuyu Yang et al., “A Multi-Criteria Framework for Critical Infrastructure Systems Resilience,” International Journal of Critical Infrastructure Protection, vol. 42, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Joseph Jonathan Magoua, and Nan Li, “The Human Factor in the Disaster Resilience Modeling of Critical Infrastructure Systems,” Reliability Engineering & System Safety, vol. 232, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Aejaz Nazir Lone, Suhel Mustajab, and Mahfooz Alam, “A Comprehensive Study on Cybersecurity Challenges and Opportunities in the IoT World,” Security and Privacy, vol. 6, no. 6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Tanusan Rajmohan, Phu H. Nguyen, and Nicolas Ferry, “A Decade of Research on Patterns and Architectures for IOT Security,” Cybersecurity, vol. 5, no. 1, pp. 1-29, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Amir Djenna, Saad Harous, and Djamel Eddine Saidouni, “Internet of Things Meet Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure,” Applied Sciences, vol. 11, no. 10, pp. 1-30, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Parul Goyal, Ashok Kumar Sahoo, and Tarun Kumar Sharma, “Internet of Things: Architecture And Enabling Technologies,” Materials Today: Proceedings, vol. 34, pp. 719-735, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Latika Kakkar et al., “IoT Architectures and Its Security: A Review,” Proceedings of the Second International Conference on Information Management and Machine Intelligence, pp. 87-94, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] B.B. Gupta, and Megha Quamara, “An Overview of Internet of Things (IoT): Architectural Aspects, Challenges, and Protocols,” Concurrency and Computation: Practice and Experience, vol. 32, no. 21, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Hichem Mrabet et al., “A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis,” Sensors, vol. 20, no. 13, pp. 1-19, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Syed Anas Ansar et al., “Security in IOT layers: Emerging Challenges with Countermeasures,” Computer Vision and Robotics, pp. 551– 563, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Vandana Choudhary, and Sarvesh Tanwar, “A Concise Review on Internet of Things: Architecture and Its Enabling Technologies,” Computational Intelligence for Engineering and Management Applications, pp. 443–456, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Fabio Federici, Davide Martintoni, and Valerio Senni, “A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures,” Electronics, vol. 12, no. 3, pp. 1-20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Claudio Zanasi, Silvio Russo, and Michele Colajanni, “Flexible Zero Trust Architecture for the Cybersecurity of Industrial IoT Infrastructures,” Ad Hoc Networks, vol. 156, pp. 1-15, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Padmanabhan Balasubramanian, Douglas L. Maskell, and Krishnamachar Prasad, “RESAC: A Redundancy Strategy Involving Approximate Computing for Error-Tolerant Applications,” Microelectronics Reliability, vol. 150, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Derick Musundi Kesa, “Ensuring Resilience: Integrating it Disaster Recovery Planning and Business Continuity for Sustainable Information Technology Operations,” World Journal of Advanced Research and Reviews, vol. 18, no. 3, pp. 970–992, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Chiranjeev Bansal, and Sarvesh Tanwar, “The Role of Cloud Computing in Ensuring Business Continuity During Disasters,” 6 th International Conference on Contemporary Computing and Informatics, Gautam Buddha Nagar, India, pp. 782-787, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Mauro Tropea, Mattia Giovanni Spina, and Floriano De Rango, “Supporting Dynamic IDS Deployment With Load Balancing Strategy for SDN-Enabled Drones In Emergency Scenarios,” Proceedings of the International ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, pp. 297-300, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Muna Al-Hawawreh et al., “Securing the Industrial Internet of Things Against Ransomware Attacks: A Comprehensive Analysis of the Emerging Threat Landscape and Detection Mechanisms,” Journal of Network and Computer Applications, vol. 223, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Arunabha Mukhopadhyay, and Swati Jain, “A Framework for Cyber-Risk Insurance against Ransomware: A Mixed-Method Approach,” International Journal of Information Management, vol. 74, pp. 1-17, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Seth Sarefo, Maurice Dawson, and Mphago Banyatsang, “An Exploratory Analysis of the Cybersecurity Threat Landscape for Botswana,” Procedia Computer Science, vol. 219, pp. 1012–1022, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Yu-Sheng Yang et al., “Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token,” Sensors, vol. 23, no. 10, pp. 1-17, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Dietmar P.F. Möller, “Intrusion Detection and Prevention,” Guide to Cybersecurity in Digital Transformation, pp. 131–179, 2023.
[CrossRef] [Publisher Link]
[25] Carlos Rubio García et al., “Quantum-Resistant Transport Layer Security,” Computer Communications, vol. 213, pp. 345–358, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Siromani Duddu et al., “Secure Socket Layer Stripping Attack using Address Resolution Protocol Spoofing,” 4 th International Conference on Intelligent Computing and Control Systems, pp. 973-978, 2020.
[CrossRef] [Google Scholar] [Publisher Link]