International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Volume 7 , Issue 2 , PP: 41-55, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures

Avita Jain Fuskele 1 *

  • 1 Department of Information Technology, Jabalpur Engineering College(MP), Bharat - (afuskele@jecjabalpur.ac.in)
  • Doi: https://doi.org/10.54216/IJWAC.070203

    Received: May 16, 2023 Revised: September 19, 2023 Accepted: December 18, 2023
    Abstract

    This study shows a cybersecurity design for Smart City infrastructures that is made up of five programs that work together. There are several tools that work together to make a dynamic and complete strategy. These are Continuous Threat Intelligence Feeds Integration (CTIFI), Machine Learning Anomaly Detection (MLAD), Vulnerability Scanning and Patch Management (VSPM), Network Segmentation and Access Control (NSAC), and Incident Response Planning (IRP). The framework's ablation study shows how important each method is, focusing on how they work together to solve important cybersecurity problems. Comparative tests show that the suggested method is better than others in terms of being able to be used on a larger scale, being accurate, and being cost-effective. For instance, waterfall, bullet, and funnel charts show patterns of scalability, while bar and line charts show signs of dynamic performance. The suggested framework is flexible enough to adapt to new cybersecurity threats thanks to its iterative and linked design. It provides a proactive and effective way to protect Smart City IoT environments.

    Keywords :

    algorithm , cybersecurity , framework , integration , IoT , machine learning , network segmentation , patch management , response planning, Smart City.

    References

    [1]    T. Saba, “Intrusion detection in smart city hospitals using ensemble classifiers,” in Proceedings of the 13th International Conference on the Developments on eSystems Engineering (DeSE2020), IEEE, Liverpool, United Kingdom, December 2020. [Online]. Available: Google Scholar

    [2]    K. Haseeb, N. Islam, Y. Javed, and U. Tariq, “A lightweight secure and energy-efficient fog-based routing protocol for constraint sensors network,” Energies, vol. 14, no. 1, p. 89, 2020. [Online]. Available: Publisher Site | Google Scholar

    [3]    H. Yar, T. Hussain, Z. A. Khan, D. Koundal, M. Y. Lee, and S. W. Baik, “Vision sensor-based real-time fire detection in resource-constrained IoT environments,” Computational Intelligence and Neuroscience, vol. 2021, pp. 1–15, 2021. [Online]. Available: Publisher Site | Google Scholar

    [4]    R. Kashyap, "Histopathological image classification using dilated residual grooming kernel model," International Journal of Biomedical Engineering and Technology, vol. 41, no. 3, p. 272, 2023. [Online]. Available: https://doi.org/10.1504/ijbet.2023.129819

    [5]    J. Kotwal, Dr. R. Kashyap, and Dr. S. Pathan, "Agricultural plant diseases identification: From traditional approach to deep learning," Materials Today: Proceedings, vol. 80, pp. 344–356, 2023. [Online]. Available: https://doi.org/10.1016/j.matpr.2023.02.370

    [6]    Edwin Ramirez-Asis, Romel Percy Melgarejo Bolivar, Leonid Alemán Gonzales, Sushovan Chaudhury, Ramgopal Kashyap, Walaa F. Alsanie, G. K. Viju, "A Lightweight Hybrid Dilated Ghost Model-Based Approach for the Prognosis of Breast Cancer," Computational Intelligence and Neuroscience, vol. 2022, Article ID 9325452, 10 pages, 2022. [Online]. Available: https://doi.org/10.1155/2022/9325452

    [7]    Y. Al-Hamar, H. Kolivand, M. Tajdini, T. Saba, and V. Ramachandran, “Enterprise credential spear-phishing attack detection,” Computers & Electrical Engineering, vol. 94, p. 107363, 2021. [Online]. Available: Publisher Site | Google Scholar

    [8]    V. K. Rahul, R. Vinayakumar, K. Soman, and P. Poornachandran, “Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security,” in Proceedings of the 2018 9th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT, IEEE, Bengaluru, India, July 2018. [Online]. Available: Google Scholar

    [9]    G. A. Ajaeiya, N. Adalian, I. H. Elhajj, A. Kayssi, and A. Chehab, “Flow-based intrusion detection system for SDN,” Proc. - IEEE Symp. Comput. Commun., pp. 787–793, 2017. [Online]. Available: Publisher Site | Google Scholar

    [10] A. Abubakar and B. Pranggono, “Machine learning based intrusion detection system for software defined networks,” in Proceedings of the - 2017 7th International Conference on Emerging Security Technologies, EST 2017, pp. 138–143, IEEE, Canterbury, UK, September 2017. [Online]. Available: Google Scholar

    [11] V. Roy et al., “Detection of sleep apnea through heart rate signal using Convolutional Neural Network,” International Journal of Pharmaceutical Research, vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.

    [12] R. Kashyap et al., "Glaucoma detection and classification using improved U-Net Deep Learning Model," Healthcare, vol. 10, no. 12, p. 2497, 2022. [Online]. Available: https://doi.org/10.3390/healthcare10122497

    [13] Vinodkumar Mohanakurup, Syam Machinathu Parambil Gangadharan, Pallavi Goel, Devvret Verma, Sameer Alshehri, Ramgopal Kashyap, Baitullah Malakhil, "Breast Cancer Detection on Histopathological Images Using a Composite Dilated Backbone Network," Computational Intelligence and Neuroscience, vol. 2022, Article ID 8517706, 10 pages, 2022. [Online]. Available: https://doi.org/10.1155/2022/8517706

    [14] M. Elhoseny, K. Haseeb, A. A. Shah, I. Ahmad, Z. Jan, and M. I. Alghamdi, "IoT solution for AI-enabled PRIVACY-PREServing with big data transferring: an application for healthcare using blockchain," Energies, vol. 14, no. 17, p. 5364, 2021. [Online]. Available: Publisher Site | Google Scholar

    [15] R. Abbasi, B. Luo, G. Rehman, H. Hassan, M. S. Iqbal, and L. Xu, "A new multilevel reversible bit-planes data hiding technique based on histogram shifting of efficient compressed domain," Vietnam Journal of Computer Science, vol. 5, no. 2, pp. 185–196, 2018. [Online]. Available: Publisher Site | Google Scholar

    [16] R. Abbasi, L. Xu, F. Amin, and B. Luo, "Efficient lossless compression based reversible data hiding using multilayered n-bit localization," Security and Communication Networks, vol. 2019, Article ID 8981240, 2019. [Online]. Available: Publisher Site | Google Scholar

    [17] R. Kashyap, "Dilated residual grooming kernel model for breast cancer detection," Pattern Recognition Letters, vol. 159, pp. 157–164, 2022. [Online]. Available: https://doi.org/10.1016/j.patrec.2022.04.037

    [18] S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. [Online]. Available: https://doi.org/10.1155/2021/2942808

    [19] M. Yasin, A. R. Cheema, and F. Kausar, "Analysis of Internet Download Manager for collection of digital forensic artefacts," Digital Investigation, vol. 7, no. 1-2, pp. 90–94, 2010. [Online]. Available: Publisher Site | Google Scholar

    [20] K. Haseeb, Z. Jan, F. A. Alzahrani, and G. Jeon, "A secure mobile wireless sensor networks based protocol for smart data gathering with cloud," Computers & Electrical Engineering, vol. 97, p. 107584, 2022. [Online]. Available: Publisher Site | Google Scholar

    [21] B. Z. H. Zhao, M. Ikram, H. J. Asghar, M. A. Kaafar, A. Chaabane, and K. Thilakarathna, "A decade of mal-activity reporting: a retrospective analysis of internet malicious activity blacklists," in Proceedings of the AsiaCCS - 2019 ACM Asia Conference on Computer and Communications Security, pp. 193–205, ACM, April 2019. [Online]. Available: Google Scholar

     

    Cite This Article As :
    Jain, Avita. Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures. International Journal of Wireless and Ad Hoc Communication, vol. , no. , 2023, pp. 41-55. DOI: https://doi.org/10.54216/IJWAC.070203
    Jain, A. (2023). Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures. International Journal of Wireless and Ad Hoc Communication, (), 41-55. DOI: https://doi.org/10.54216/IJWAC.070203
    Jain, Avita. Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures. International Journal of Wireless and Ad Hoc Communication , no. (2023): 41-55. DOI: https://doi.org/10.54216/IJWAC.070203
    Jain, A. (2023) . Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures. International Journal of Wireless and Ad Hoc Communication , () , 41-55 . DOI: https://doi.org/10.54216/IJWAC.070203
    Jain A. [2023]. Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures. International Journal of Wireless and Ad Hoc Communication. (): 41-55. DOI: https://doi.org/10.54216/IJWAC.070203
    Jain, A. "Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures," International Journal of Wireless and Ad Hoc Communication, vol. , no. , pp. 41-55, 2023. DOI: https://doi.org/10.54216/IJWAC.070203