Claim Missing Document
Check
Articles

Found 2 Documents
Search

Evaluating Security Mechanisms for Wireless Sensor Networks in IoT and IIoT Zhukabayeva, Tamara; Buja, Atdhe; Pacolli, Melinda
Journal of Robotics and Control (JRC) Vol 5, No 4 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i4.21683

Abstract

In the era of interconnected digital ecosystems, the security of Wireless Sensor Networks (WSN) emerges as a pivotal concern, especially within the domains of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT). However, the very nature of WSNs—being distributed, resource-constrained, and often deployed in unattended environments—poses unique cybersecurity challenges.  A main issue and challenge remains their Cybersecurity in communication. In this paper, we provide a systematic review focused on three themes including 1) techniques for secure communication in WSN; 2) algorithms and methods for intrusion detection in WSN; and 3) IoT and IIoT security concerning WSN. It has provided the results of its own for the publications made in the data analysis of three themes. The paper also has a simulation experiment to investigate the behavior of WSNs under sinkhole attacks—one of the prevalent threats to network integrity. Utilizing the Contiki OS Cooja simulator, the experiment carefully evaluates the performance of existing detection algorithms and introduces a novel method for identifying and neutralizing malicious nodes. Our simulation discloses unconventional communication patterns during sinkhole attacks running RPL protocol, emphasizing the effectiveness of our detection mechanisms against cyber threats. Particularly, the introduction of a malicious node (Node 13) significantly disrupted network communication, with traditional security mechanisms failing to immediately detect and isolate the threat. The scope of future research work will include the broader spectrum of cyber threats beyond sinkhole attacks, exploring advanced detection mechanisms, and machine learning-based security protocols for enhanced trust and transparency in WSN communications.
A model proposal for enhancing cyber security in industrial IoT environments Buja, Atdhe; Apostolova, Marika; Luma, Artan
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp231-241

Abstract

The revolution of the industrial sector in the automated one has happened with the use of the Industrial Internet of things (IIoT). They are providing unprecedented possibilities for connection, and automation. Also, the ubiquitous of IIoT has brought new cyber security challenges, putting sensitive data at risk. This research paper proposes a comprehensive model for enhancing the cyber security of IIoT systems. Our model integrates various countermeasures, including a proactive assessment of security vulnerabilities, examination of identified vulnerabilities, categorizing data, delivery of comprehensive reports, and assurance of effective countermeasures based on a cost-benefit approach, aligned with industry standards and frameworks. The proposed model aims to address the need for the development of robust and resilient cyber security solutions for IIoT environments. This research work introduces the proposed model's main functions, integration, workflow, and references. With this research, we contribute to the enhancement of cyber security in the IIoT environment by proposing a model that assists with proactive assessment, effective response, and informed decision-making. We envision that the proposed model will support industrial organizations in securing their IIoT systems against cyber threats, ultimately have stability and secure industrial operations.