Advancing IOT Security: A Systemic and Cognitive Framework for Military Application

Mohamed Bahar; Dr. Muhammad Muqeem; Dr. Omkar Pattnaik; Dr. Pawan Baldhare1

1

Publication Date: 2024/06/29

Abstract: In the coming years, the protection of data, objects, networks, systems, and individuals within the Internet of Things (IoT) will take center stage in research and standardization efforts. The extensive connectivity of smart objects, coupled with their significant limitations, gives rise to numerous security issues that are not addressed by traditional security problem formulations and solutions. This work presents an overview of an IoT security roadmap to guide researchers interested in this field, basedona unique systemic andcognitive perspective. The function of each element of this approach will be clarified, and its relationships with other components and their influence on the entire system will be elaborated. In line with the innovative classification of IoT vision, a case study involving a military live simulation will be showcased to underline the components and interactions of the systemic and cognitive method. Following this, a discussionon security concerns related to privacy, trust, identification, and access control will be conducted, and various research challenges will be underscored.

Keywords: Internet of Things, Security, Systemic and Cognitive Approach, Military Live Simulation.

DOI: https://doi.org/10.38124/ijisrt/IJISRT24JUN677

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT24JUN677.pdf

REFERENCES

  1. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” Future Gener.Comput. Syst., vol. 29, no. 7, pp. 1645– 1660, 2013.
  2. Y. Challal, “Securite de l’internet des objets : vers une approche cognitive et systemique,” HDR, Universite de Technologie de Compiegne, 2012.
  3. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah, “A systemic approach for iot security,” in DCOSS. IEEE, 2013, pp. 351–355.
  4. Riahi, E. Natalizio, Y. Challal, N. Mitton, and A. Iera, “A systemic and cognitive approach for IoT security,” in International Conference on Computing, Networking and Communications (ICNC 2014), Honolulu, United States, 2014, invited Paper.
  5. L. Kiely and T. V. Benzel, Systemic security management,” IEEE Security and Privacy, vol. 4, no. 6, pp. 74–77, 2006. [6] [Online]. Available: http://www.27000.org/ “Advancing IoT Security: A Systemic and Cognitive Framework for Military Applications”
  6. K. Klair, K.-W. Chin, and R. Raad, “A survey and tutorial of rfid anti-collision protocols,” IEEE Communications Surveys and Tutorials, vol. 12, no. 3, pp. 400–421, 2010.
  7. R. Acharya and K. Asha., “Data integrity and intrusion detection in wireless sensor networks,” in 2008 16th IEEE International Conference on Networks, Dec 2008, pp. 1–5.
  8. J. Medeiros, E. F. Watson, J. S. C. II, and M. S. Manivannan, Eds., Proceedings of the 30th conference on Winter simulation, WSC 1998, Washington DC, USA, December 13-16, 1998. WSC, 1998. [Online]. Available: http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5993
  9. J. E. Hannay, O. M. Mevassvik, A. Skjeltorp, and K. Brathen, “Live, virtual, constructive (lvc) simulation for land operations training: Concept development & experimentation (cd&e).”
  10. NATO Science and Technology Organization, 2014