Research Article |
Effective Cyber Security Using IoT to Prevent E-Threats and Hacking During Covid-19
Author(s) : Dr. Santosh Kumar1, Dr. Rajeev Yadav2, Dr. Priyanka Kaushik3, S B G Tilak Babu4, Dr. Rajesh Kumar Dubey5 and Dr. Muthukumar Subramanian6
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 10, Issue 2 , Special Issue on IIoT-WSN
Publisher : FOREX Publication
Published : 15 May 2022
e-ISSN : 2347-470X
Page(s) : 111-116
Abstract
This research work is conducted to make the analysis of digital technology is one of the most admired and effective technologies that has been applied in the global context for faster data management. Starting from business management to connectivity, everywhere the application of IoT and digital technology is undeniable. Besides the advancement of the data management, cyber security is also important to prevent the data stealing or accessing from the unauthorized data. In this context the IoT security technology focusing on the safeguarding the IoT devices connected with internet. Different technologies are taken under the consideration for developing the IoT based cyber security such as Device authentication, Secure on boarding, data encryption and creation of the bootstrap server. All of these technologies are effective to its ground for protecting the digital data. In order to prevent cyber threats and hacking activities like SQL injection, Phishing, and DoS, this research paper has proposed a newer technique of the encryption process by using the python codes and also shown the difference between typical conventional system and proposed system for understanding both the system in a better way.
Keywords: Interdisciplinary
, Cyber security
, Theory of computation
, Internet of Things (IoT)
, E-threat
Dr. Santosh Kumar, Asso. Prof., Lucknow Public College of Professional Studies, Lucknow, Uttar Pradesh, India; Email: sanb2lpcps@gmail.com
Dr. Rajeev Yadav, Professor in CSE, Arya Institute of Engineering and Technology, Jaipur, Rajasthan, India; Email: yadavrajeev6@gmail.com
Dr. Priyanka Kaushik, Asso. Prof. in CSE, Poornima Institute of Engineering and Technology, Jaipur, Rajasthan, India; Email: Kaushik.priyanka17@gmail.com
S B G Tilak Babu, Dept. of ECE, Aditya Engineering College, Surampalem, India; Email: thilaksayila@gmail.com
Dr. Rajesh Kumar Dubey, Asso. Prof., Department of Electrical Engineering, Central University of Haryana Mahendergarh, India; Email: rajesh.dubey@cuh.ac.in
Dr. Muthukumar Subramanian, Dept. of CSE, SRM Institute of Science & Technology, Trichy Campus, Tamilnadu, India; Email: drsm.iiit@gmail.com
[1] Ibrahim, H., Karabatak, S. and Abdullahi, A.A., 2020, June. A study on cybersecurity challenges in e-learning and database management system. In 2020 8th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-5). IEEE.[Cross Ref]
[2] Zhao, J., Liu, X., Yan, Q., Li, B., Shao, M., Peng, H. and Sun, L., 2021. Automatically predicting cyber-attack preference with attributed heterogeneous attention networks and transductive learning. Computers& security, 102, p.102152.[Cross Ref]
[3] Ding, A.Y., De Jesus, G.L. and Janssen, M., 2019, September. Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosure. In Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing (pp. 49-55).[Cross Ref]
[4] Lee, I., 2020. Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet, 12(9), p.157.[Cross Ref]
[5] Bertino, E., and Islam, N., (2017). Botnets and internet of things security. Computer, (2), pp. 76-79.[Cross Ref]
[6] Laszka, A., Zhao, M., and Grossklags, J. 2016. Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms. Computer Security – ESORICS 2016 Lecture Notes in Computer Science, pp. 161-178.[Cross Ref]
[7] Abdullah, T.A., Ali, W., Malebary, S. and Ahmed, A.A., 2019. A review of cyber security challenges attacks and solutions for the Internet of Things based smart home. Int. J. Comput. Sci. Netw. Secur, 19(9), p.139.
[8] Singla, M.K., Gupta, J., Nijhawan, P., Ganguli, S. and Rajest, S.S., 2020. Development of an Efficient, Cheap, and Flexible IoT-Based Wind Turbine Emulator. In Business Intelligence for Enterprise Internet of Things (pp. 225-231). Springer, Cham.[Cross Ref]
[9] Matheu-García, S.N., Hernández-Ramos, J.L., Skarmeta, A.F. and Baldini, G., 2019. Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Computer Standards & Interfaces, 62, pp.64-83.[Cross Ref]
[10] Sriram, S., Vinayakumar, R., Alazab, M. and Soman, K.P., 2020, July. Network flow based IoT botnet attack detection using deep learning. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 189-194). IEEE.[Cross Ref]
[11] Hossain, M., Islam, S.R., Ali, F., Kwak, K.S. and Hasan, R., 2018. An internet of things-based health prescription assistant and its security system design. Future generation computer systems, 82, pp.422-439.[Cross Ref]
[12] Ibrahim, H., Karabatak, S. and Abdullahi, A.A., 2020, June. A study on cybersecurity challenges in e-learning and database management system. In 2020 8th International Symposium on Digital Forensics and Security (ISDFS) (pp. 1-5). IEEE.[Cross Ref]
[13] Chandrajeet Yadav, Vikash Yadav and Jasvant Kumar (2021), Secure and Reliable Data sharing scheme using Attribute-based Encryption with weighted attribute-based Encryption in Cloud Environment. IJEER 9(3), 48-56. DOI: 10.37391/IJEER.090305.
Dr. Santosh Kumar, Dr. Rajeev Yadav, Dr. Priyanka Kaushik, S B G Tilak Babu, Dr. Rajesh Kumar Dubey and Dr. Muthukumar Subramanian (2022), Effective Cyber Security Using IoT to Prevent E-Threats and Hacking During Covid-19. IJEER 10(2), 111-116. DOI: 10.37391/IJEER.100210.