Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 11 , Issue 1 , PP: 30-37, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

Managing Information Security Risks in the Age of IoT

Abedallah Z. Abualkishik 1 * , Rasha Almajed 2

  • 1 American University in the Emirates, Dubai, UAE - (abedallah.abualkishik@aue.ae)
  • 2 American University in the Emirates, Dubai, UAE - (rasha.almajed@aue.ae)
  • Doi: https://doi.org/10.54216/JCIM.110103

    Received: October 21, 2022 Revised: December 23, 2022 Accepted: January 04, 2023
    Abstract

    The advent of the Internet of Things (IoT) has led to the proliferation of connected devices, creating numerous security challenges. With billions of devices generating vast amounts of data, managing information security risks in the age of IoT has become increasingly complex. Traditional security approaches are not sufficient to mitigate the risks posed by IoT devices. Machine learning (ML) provides a promising approach to enhance the security of IoT systems. This paper proposes a machine learning approach for managing information security risks in the age of IoT. The proposed approach utilizes ML algorithms to identify and mitigate security threats in IoT systems. The approach involves collecting and analyzing data from IoT devices, and applying ML algorithms to detect patterns and anomalies that may indicate security threats. The ML algorithms are trained using both supervised and unsupervised learning techniques to enable them to identify known and unknown threats. The paper describes a case study in which the proposed approach is applied to an IoT system for home security. The results demonstrate that the ML approach can effectively detect security threats in the IoT system and mitigate them in real-time.

    Keywords :

    Internet of Things (IoT) , Information Security and Risks , Machine Learning (ML)

    References

    [1] Chen, K., Zhang, S., Li, Z., Zhang, Y., Deng, Q., Ray, S., & Jin, Y. (2018). Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice. Journal of Hardware and Systems Security, 2, 97-110.

    [2] Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah, S. (2017). Security issues in the Internet of Things (IoT): A comprehensive study. International Journal of Advanced Computer Science and Applications, 8(6).

    [3] Siddiqui, S. T., Alam, S., Ahmad, R., & Shuaib, M. (2020). Security threats, attacks, and possible countermeasures in internet of things. In Advances in Data and Information Sciences: Proceedings of ICDIS 2019 (pp. 35-46). Springer Singapore.

    [4] Abdel-Basset, M., Chang, V., Hawash, H., Chakrabortty, R. K., & Ryan, M. (2020). Deep-IFS: Intrusion detection approach for industrial internet of things traffic in fog environment. IEEE Transactions on Industrial Informatics, 17(11), 7704-7715.

    [5] Li, S., Xu, L. D., & Zhao, S. (2015). The internet of things: a survey. Information systems frontiers, 17, 243-259.

    [6] Rose, K., Eldridge, S., & Chapin, L. (2015). The internet of things: An overview. The internet society (ISOC), 80, 1-50.

    [7] Abdel-Basset, M., Moustafa, N., Hawash, H., Ding, W. (2022). Internet of Things Security Requirements, Threats, Attacks, and Countermeasures. Deep Learning Techniques for IoT Security and Privacy, 67-112.

    [8] Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues, challenges, and open problems in the internet of things. In 2015 ieee world congress on services (pp. 21-28). IEEE.

    [9] Masoodi, F., Alam, S., & Siddiqui, S. T. (2019). Security & privacy threats, attacks and countermeasures in Internet of Things. International Journal of Network Security & Its Applications (IJNSA) Vol, 11.

    [10] Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118-137.

    [11] Jurcut, A., Niculcea, T., Ranaweera, P., & Le-Khac, N. A. (2020). Security considerations for Internet of Things: A survey. SN Computer Science, 1, 1-19.

    [12] Abdel-Basset, M., Moustafa, N., & Hawash, H. (2022). Deep Learning Approaches for Security Threats in IoT Environments. John Wiley & Sons.

    [13] Kumar, S. A., Vealey, T., & Srivastava, H. (2016, January). Security in internet of things: Challenges, solutions and future directions. In 2016 49th Hawaii International Conference on System Sciences (HICSS) (pp. 5772-5781). IEEE.

    [14] Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67, 423-441.

    [15] Nada A. Nabeeh , Alshaimaa A. Tantawy, A Neutrosophic Model for Blockchain Platform Selection based on SWARA and WSM, Neutrosophic and Information Fusion, Vol. 1 , No. 2 , (2023) : 29-43 (Doi : https://doi.org/10.54216/NIF.010204)

    [16] Ahmad, M., Younis, T., Habib, M. A., Ashraf, R., & Ahmed, S. H. (2019). A review of current security issues in Internet of Things. Recent trends and advances in wireless and IoT-enabled networks, 11-23.

    [17] Abdel-Basset, M., Moustafa, N., Hawash, H., Ding, W., Abdel-Basset, M., Moustafa, N., ... & Ding, W. (2022). Internet of things, preliminaries and foundations. Deep learning techniques for IoT security and privacy, 37-65.

    [18] Mozzaquatro, B. A., Agostinho, C., Goncalves, D., Martins, J., & Jardim-Goncalves, R. (2018). An ontology-based cybersecurity framework for the internet of things. Sensors, 18(9), 3053. [19] Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., & Markakis, E. K. (2020). A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues. IEEE Communications Surveys & Tutorials, 22(2), 1191-1221.

    [20] Vashi, S., Ram, J., Modi, J., Verma, S., & Prakash, C. (2017, February). Internet of Things (IoT): A vision, architectural elements, and security issues. In 2017 international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 492-496). IEEE.

    [21] Radanliev, P., De Roure, D. C., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S., & Burnap, P. (2018). Future developments in cyber risk assessment for the internet of things. Computers in industry, 102, 14-22.

    [22] Kouzinopoulos, C. S., Spathoulas, G., Giannoutakis, K. M., Votis, K., Pandey, P., Tzovaras, D., ... & Nijdam, N. A. (2018). Using blockchains to strengthen the security of internet of things. In Security in Computer and Information Sciences: First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers 1 (pp. 90-100). Springer International Publishing.

    [23] Weber, M., & Boban, M. (2016, May). Security challenges of the internet of things. In 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 638-643). IEEE.

    [24] Perera, C., Ranjan, R., Wang, L., Khan, S. U., & Zomaya, A. Y. (2015). Big data privacy in the internet of things era. IT Professional, 17(3), 32-39.

    [25] Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199-221.

    [26] Azrour, M., Mabrouki, J., Guezzaz, A., & Kanwal, A. (2021). Internet of things security: challenges and key issues. Security and Communication Networks, 2021, 1-11.

    [27] Arias, O., Wurm, J., Hoang, K., & Jin, Y. (2015). Privacy and security in internet of things and wearable devices. IEEE Transactions on Multi-Scale Computing Systems, 1(2), 99-109.

    [28] Mishra, S., Sahoo, S., & Mishra, B. K. (2019). Addressing security issues and standards in Internet of things. In Emerging trends and applications in cognitive computing (pp. 224-257). IGI Global.

    [29] Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: a security point of view. Internet Research.

    [30] Mugarza, I., Flores, J. L., & Montero, J. L. (2020). Security issues and software updates management in the industrial internet of things (iiot) era. Sensors, 20(24), 7160.

    [31] Carrier, T., Victor, P., Tekeoglu, A., & Lashkari, A. H. (2022, February). Detecting Obfuscated Malware using Memory Feature Engineering. In ICISSP (pp. 177-188).

    Cite This Article As :
    Z., Abedallah. , Almajed, Rasha. Managing Information Security Risks in the Age of IoT. Journal of Cybersecurity and Information Management, vol. , no. , 2023, pp. 30-37. DOI: https://doi.org/10.54216/JCIM.110103
    Z., A. Almajed, R. (2023). Managing Information Security Risks in the Age of IoT. Journal of Cybersecurity and Information Management, (), 30-37. DOI: https://doi.org/10.54216/JCIM.110103
    Z., Abedallah. Almajed, Rasha. Managing Information Security Risks in the Age of IoT. Journal of Cybersecurity and Information Management , no. (2023): 30-37. DOI: https://doi.org/10.54216/JCIM.110103
    Z., A. , Almajed, R. (2023) . Managing Information Security Risks in the Age of IoT. Journal of Cybersecurity and Information Management , () , 30-37 . DOI: https://doi.org/10.54216/JCIM.110103
    Z. A. , Almajed R. [2023]. Managing Information Security Risks in the Age of IoT. Journal of Cybersecurity and Information Management. (): 30-37. DOI: https://doi.org/10.54216/JCIM.110103
    Z., A. Almajed, R. "Managing Information Security Risks in the Age of IoT," Journal of Cybersecurity and Information Management, vol. , no. , pp. 30-37, 2023. DOI: https://doi.org/10.54216/JCIM.110103