FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Effective Cyber Security Using IoT to Prevent E-Threats and Hacking During Covid-19

Author(s) : Dr. Santosh Kumar1, Dr. Rajeev Yadav2, Dr. Priyanka Kaushik3, S B G Tilak Babu4, Dr. Rajesh Kumar Dubey5 and Dr. Muthukumar Subramanian6

Publisher : FOREX Publication

Published : 15 May 2022

e-ISSN : 2347-470X

Page(s) : 111-116




Dr. Santosh Kumar, Asso. Prof., Lucknow Public College of Professional Studies, Lucknow, Uttar Pradesh, India; Email: sanb2lpcps@gmail.com

Dr. Rajeev Yadav, Professor in CSE, Arya Institute of Engineering and Technology, Jaipur, Rajasthan, India; Email: yadavrajeev6@gmail.com

Dr. Priyanka Kaushik, Asso. Prof. in CSE, Poornima Institute of Engineering and Technology, Jaipur, Rajasthan, India; Email: Kaushik.priyanka17@gmail.com

S B G Tilak Babu, Dept. of ECE, Aditya Engineering College, Surampalem, India; Email: thilaksayila@gmail.com

Dr. Rajesh Kumar Dubey, Asso. Prof., Department of Electrical Engineering, Central University of Haryana Mahendergarh, India; Email: rajesh.dubey@cuh.ac.in

Dr. Muthukumar Subramanian, Dept. of CSE, SRM Institute of Science & Technology, Trichy Campus, Tamilnadu, India; Email: drsm.iiit@gmail.com

[1] Ibrahim, H., Karabatak, S. and Abdullahi, A.A., 2020, June. A study on cybersecurity challenges in e-learning and database management system. In 2020 8th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-5). IEEE.[Cross Ref]

[2] Zhao, J., Liu, X., Yan, Q., Li, B., Shao, M., Peng, H. and Sun, L., 2021. Automatically predicting cyber-attack preference with attributed heterogeneous attention networks and transductive learning. Computers& security, 102, p.102152.[Cross Ref]

[3] Ding, A.Y., De Jesus, G.L. and Janssen, M., 2019, September. Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosure. In Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing (pp. 49-55).[Cross Ref]

[4] Lee, I., 2020. Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet, 12(9), p.157.[Cross Ref]

[5] Bertino, E., and Islam, N., (2017). Botnets and internet of things security. Computer, (2), pp. 76-79.[Cross Ref]

[6] Laszka, A., Zhao, M., and Grossklags, J. 2016. Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms. Computer Security – ESORICS 2016 Lecture Notes in Computer Science, pp. 161-178.[Cross Ref]

[7] Abdullah, T.A., Ali, W., Malebary, S. and Ahmed, A.A., 2019. A review of cyber security challenges attacks and solutions for the Internet of Things based smart home. Int. J. Comput. Sci. Netw. Secur, 19(9), p.139.

[8] Singla, M.K., Gupta, J., Nijhawan, P., Ganguli, S. and Rajest, S.S., 2020. Development of an Efficient, Cheap, and Flexible IoT-Based Wind Turbine Emulator. In Business Intelligence for Enterprise Internet of Things (pp. 225-231). Springer, Cham.[Cross Ref]

[9] Matheu-García, S.N., Hernández-Ramos, J.L., Skarmeta, A.F. and Baldini, G., 2019. Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Computer Standards & Interfaces, 62, pp.64-83.[Cross Ref]

[10] Sriram, S., Vinayakumar, R., Alazab, M. and Soman, K.P., 2020, July. Network flow based IoT botnet attack detection using deep learning. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 189-194). IEEE.[Cross Ref]

[11] Hossain, M., Islam, S.R., Ali, F., Kwak, K.S. and Hasan, R., 2018. An internet of things-based health prescription assistant and its security system design. Future generation computer systems, 82, pp.422-439.[Cross Ref]

[12] Ibrahim, H., Karabatak, S. and Abdullahi, A.A., 2020, June. A study on cybersecurity challenges in e-learning and database management system. In 2020 8th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-5). IEEE.[Cross Ref]

[13] Chandrajeet Yadav, Vikash Yadav and Jasvant Kumar (2021), Secure and Reliable Data sharing scheme using Attribute-based Encryption with weighted attribute-based Encryption in Cloud Environment. IJEER 9(3), 48-56. DOI: 10.37391/IJEER.090305.

Dr. Santosh Kumar, Dr. Rajeev Yadav, Dr. Priyanka Kaushik, S B G Tilak Babu, Dr. Rajesh Kumar Dubey and Dr. Muthukumar Subramanian (2022), Effective Cyber Security Using IoT to Prevent E-Threats and Hacking During Covid-19. IJEER 10(2), 111-116. DOI: 10.37391/IJEER.100210.