Enhancing & Optimizing Security of IoT Systems using Different Components of Industry 4.0.

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2022 by IJETT Journal
Volume-70 Issue-7
Year of Publication : 2022
Authors : Rajat Verma, Namrata Dhanda, Vishal Nagar
DOI : 10.14445/22315381/IJETT-V70I7P216

How to Cite?

Rajat Verma, Namrata Dhanda, Vishal Nagar, "Enhancing & Optimizing Security of IoT Systems using Different Components of Industry 4.0." International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 147-157, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I7P216

The technological ecosystem is developing at an exponential speed, causing the traditional security measures to fail and act as a ban on Modern Technologies. Likewise, Industry 4.0 requires Modern and SMART Solutions for better security and efficiency. The reason for considering this statement is that conventional security measures cannot continuously protect the rapid facts and figures generated. It is so because the techniques to attack, both active and passive, and the technologies being attacked are improving rapidly. By 2025, around 75 billion devices will be part of the connected system of the Internet of Things (IoT) that will surely generate vast data traversing worldwide, which needs to be secured and protected at any cost. Failure in doing so can lead to unfavourable situations. Since IoT belongs to Industry 4.0, a solution belonging to Industry 4.0 would be the best choice in solving the various challenges of IoT. This paper focuses on comparing diverse components of the fourth Industrial Revolution, namely Cloud Computing, BigData, Cognitive Domains, and Blockchain, to find the best parameter with a motive to secure IoT. Moreover, this paper also proposes a Hybrid Approach for optimizing and enhancing the security perspective of IoT.

AI, Blockchain, Cloud, Cognitive, Privacy.

[1] Bera A , “Insightful Internet of things statistics (Infographic),” White Paper. Retrieved from https://safeatlast.co/blog/iotstatistics/#gref
[2] Verma, R., Dhanda, N., Nagar, V, “ Towards a Secured IoT Communication: A Blockchain Implementation Through APIs,” In: Singh, P.K., Wierzchoń, S.T., Tanwar, S., Rodrigues, J.J.P.C., Ganzha, M. (eds) Proceedings of Third International Conference on Computing, Communications, and Cyber-Security. Lecture Notes in Networks and Systems, vol 421. Springer, Singapore. https://doi.org/10.1007/978-981-19-1142-2_53.
[3] Ali Haider Shamsan, Arman Rasool Faridi, “A Novel SDNFV IoT Architecture Leveraging Softwarization Technology Services to Alleviate IoT Network Resource Restrictions, “ International Journal of Engineering Trends and Technology, vol.70, no.2, pp. 1-10, 2022.
[4] Popkova, E. G., Ragulina, Y. V., & Bogoviz, A. V, “Fundamental differences of transition to industry 4.0 from previous industrial revolutions,” In Industry 4.0: Industrial Revolution of the 21st Century , pp. 21-29, 2019. Springer, Cham.
[5] Walterbusch, M., Martens, B., & Teuteberg, F, “Evaluating cloud computing services from a total cost of ownership perspective,” Management Research Review, 2013.
[6] Dahunsi, F. M., Idogun, J., & Olawumi, A, “Commercial Cloud Services for a Robust Mobile Application Backend Data Storage,” Indonesian Journal of Computing, Engineering and Design (IJoCED), vol.3, no.1, pp.31-45, 2021.
[7] Lehner, W., & Sattler, K. U, “Database as a service (DBaaS),” In 2010 IEEE 26th International Conference on Data Engineering, (ICDE 2010) pp. 1216-1217, 2010. IEEE.
[8] Megha, C. R., Madhura, A., & Sneha, Y. S, “Cognitive computing and its applications,” In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), pp.1168-1172, 2017. IEEE.
[9] Preece, A., Cerutti, F., Braines, D., Chakraborty, S., & Srivastava, M, “ Cognitive computing for coalition situational understanding,” In 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) , pp. 1-6, 2017.EEE.
[10] Huang, K., Hussain, A., Wang, Q. F., & Zhang, R. (Eds.), “ Deep learning: fundamentals, theory and applications,” Vol. 2, 2019. Springer.
[11] Verma R., Dhanda N., Nagar V, “Security Concerns in IoT Systems and Its Blockchain Solutions,” In: Tavares J.M.R.S., Dutta P., Dutta S., Samanta D. (eds) Cyber Intelligence and Information Retrieval. Lecture Notes in Networks and Systems, vol 291, 2022. Springer, Singapore. https://doi.org/10.1007/978-981-16-4284-5_42.
[12] Verma, R., Dhanda, N., Nagar, V, “ Application of Truffle Suite in a Blockchain Environment, “ In: Singh, P.K., Wierzchoń, S.T., Tanwar, S., Rodrigues, J.J.P.C., Ganzha, M. (eds) Proceedings of Third International Conference on Computing, Communications, and Cyber-Security. Lecture Notes in Networks and Systems, vol 421, 2023. Springer, Singapore. https://doi.org/10.1007/978-981-19- 1142-2_54.
[13] Geetha, R., & Bhanu, S. R. D, “ Recruitment through artificial intelligence: a conceptual study,” International Journal of Mechanical Engineering and Technology, vol.9, no.7, pp. 63-70, 2018.
[14] A. Srikrishnan, Dr. Arun Raaza, Dr. B. Ebenezer Abishek, “ Internet of Things (Iot) Network Security using Quantum Key Distribution Algorithm, “ International Journal of Engineering Trends and Technology, vol.70, no.2, pp.19-23, 2022.
[15] Sengupta, J., Ruj, S., & Bit, S. D, “ A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT,” Journal of Network and Computer Applications, vol.149, pp.102481, 2020.
[16] Kumar, N. M., & Mallick, P. K, “Blockchain technology for security issues and challenges in IoT, “ Procedia Computer Science,vol. 132, pp.1815-1823, 2018.
[17] Verma, R., Dhanda, N., & Nagar, V,” Addressing the issues & challenges of internet of things using blockchain technology,” International Journal of Advanced Science and Technology, vol.29, pp.10074–10082, 2020.
[18] Aqeel-ur-Rehman, S. U. R., Khan, I. U., Moiz, M., & Hasan, S, “Security and privacy issues in IoT,” International Journal of Communication Networks and Information Security (IJCNIS), vol.8, no.3, pp.147-157, 2016.
[19] Hameed, A., & Alomary, A ,”Security issues in IoT: A survey,” In 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) , pp.1-5, 2019. IEEE.
[20] Wu, J., Zhang, Z., Hong, Y., & Wen, Y, “ Cloud radio access network (C-RAN): a primer, “ IEEE network, vol.29, no.1, pp.35-41, 2015.
[21] Georgakopoulos, D., Jayaraman, P. P., Fazia, M., Villari, M., & Ranjan, R, “Internet of Things and edge cloud computing roadmap for manufacturing,” IEEE Cloud Computing, vol.3, no.4, pp.66-73, 2016.
[22] Gai, K., & Steenkamp, A ,”A feasibility study of Platform-as-a-Service using cloud computing for a global service organization,” Journal of Information Systems Applied Research, vol.7, no.3, pp.28, 2014.
[23] Lakshmisri, , “ Software as a service in cloud computing,” International Journal of Creative Research Thoughts (IJCRT), ISSN, vol. 2320no, 2822, pp.182-186.
[24] Serrano, N., Gallardo, G., & Hernantes, “J. Infrastructure as a service and cloud technologies,” IEEE Software, vol.32, no.2, pp. 30- 36, 2015.
[25] Lu, C. W., Hsieh, C. M., Chang, C. H., & Yang, C. T, “ An improvement to data service in cloud computing with content sensitive transaction analysis and adaptation,” In 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, pp.463- 468, 2013. IEEE.
[26] Curino, C., Jones, E. P., Popa, R. A., Malviya, N., Wu, E., Madden, S., & Zeldovich, N, “ Relational cloud: A database-as-a-service for the cloud, “ 2011.
[27] Shu, S., Shen, X., Zhu, Y., Huang, T., Yan, S., & Li, S, “Prototyping efficient desktop-as-a-service for fpga based cloud computing architecture,” In 2012 IEEE Fifth International Conference on Cloud Computing , IEEE, pp.702-709, 2012.
[28] Van Eyk, E., Iosup, A., Abad, C. L., Grohmann, J., & Eismann, S. “A SPEC RG cloud group's vision on the performance challenges of FaaS cloud architectures, “ In Companion of the 2018 ACM/SPEC International Conference on Performance Engineering, pp. 21- 24, 2018.
[29] Costa, I., Araujo, J., Dantas, J., Campos, E., Silva, F. A., & Maciel, P, “ Availability Evaluation and Sensitivity Analysis of a Mobile Backend‐as‐a‐service Platform,” Quality and Reliability Engineering International, vol.32, no.7, pp. 2191-2205, 2016.
[30] Chen, Y., & Bellavitis, C, “ Blockchain disruption and decentralized finance: The rise of decentralized business models, “ Journal of Business Venturing Insights, vol.13, pp.e00151, 2020.
[31] Garzik, J., & Donnelly, J. C. “Blockchain 101: an introduction to the future, In Handbook of Blockchain, Digital Finance, and Inclusion,” Vol. 2, pp.79-186,2018. Academic Press.
[32] Kekulandara, M, “A Blockchain-based Auditable and Secure Voting System (Doctoral dissertation, University of Rhode Island) ,” 2020.
[33] Panda, S. K., Elngar, A. A., Balas, V. E., & Kayed, M. (Eds.), “Bitcoin and Blockchain: History and Current Applications,” CRC Press , 2020.
[34] Nakamoto, S, “Bitcoin: A peer-to-peer electronic cash system,” Decentralized Business Review, pp. 21260, 2008.
[35] Mukherjee, P., & Pradhan, C, “ Blockchain 1.0 to Blockchain 4.0—The Evolutionary Transformation of Blockchain Technology,” In Blockchain Technology: Applications and Challenges, pp. 29-49 , 2021. Springer, Cham.
[36] Zhu, L., Gai, K., & Li, M ,” Blockchain Technology in Internet of Things,” Germany: Springer, pp.1-143, 2019..
[37] Saad, M., Spaulding, J., Njilla, L., Kamhoua, C. A., Nyang, D., & Mohaisen, A, “Overview of attack surfaces in blockchain,” Blockchain for distributed systems security, pp. 51-66, 2019.
[38] Rajesh Kumar .M, Venkatesh .J, Zubair Rahman .A. M. J. Md, “ Feature Centric Data Augmentation Model-Based Mobile Commerce for Efficient Retail Growth using BlockChain,” International Journal of Engineering Trends and Technology, vol. 70, no.3, pp. 179- 184, 2022. https://doi.org/10.14445/22315381/IJETT-V70I3P220.
[39] Caro, M. P., Ali, M. S., Vecchio, M., & Giaffreda, R ,” Blockchain-based traceability in Agri-Food supply chain management: A practical implementation,” In the 2018 IoT Vertical and Topical Summit on Agriculture-Tuscany (IOT Tuscany) , IEEE, pp.1-4, 2018.
[40] Shaverdian, P, “ Start With Trust: Utilizing Blockchain to Resolve the Third-Party Data Breach Problem,” UCLA L. Rev., pp.66, pp. 1242, 2019.
[41] Lopez, J., & Dahab, R, “An overview of elliptic curve cryptography,” 2000.
[42] Gupta, V., Gupta, S., Chang, S., & Stebila, D. “Performance analysis of elliptic curve cryptography for SSL,” In Proceedings of the 1st ACM workshop on Wireless security, pp. 87-94, 2000.
[43] Verma, R., Dhanda, N., Nagar, V, “ Enhancing Security with In-Depth Analysis of Brute-Force Attack on Secure Hashing Algorithms, “ In: Kaiser, M.S., Bandyopadhyay, A., Ray, K., Singh, R., Nagar, V. (eds) Proceedings of Trends in Electronics and Health Informatics. Lecture Notes in Networks and Systems, Springer, Singapore, vol.376 , 2022. https://doi.org/10.1007/978-981-16- 8826-3_44.
[44] Data volume of internet of things (IoT) connections worldwide in 2019 and 2025(in zettabytes). Retrieved from https://www.statista.com/statistics/1017863/worldwide-iot-connected-devices-data-size/#:~:text=Data%20volume%20of%20IoT%20connected%20devices%20worldwide%202019%20and%202025&text=The%20stati stic%20shows%20the%20overall,reach%2079.4%20zettabytes%20(ZBs)
[45] Manyika, J., Chui, M., Bisson, P., Woetzel, J., Dobbs, R., Bughin, J., & Aharon, D, “Unlocking the Potential of the Internet of Things”, McKinsey Global Institute, vol.1, 2015.
[46] Castillo O'Sullivan, A., & Thierer, A. D, “Projecting the growth and economic impact of the internet of things,“ Available at SSRN 2618794, 2015.
[47] Ng, I. C., & Wakenshaw, S. Y, “The Internet-of-Things: Review and research directions,” International Journal of Research in Marketing, vol.34, no.1, pp. 3-21, 2017.
[48] Karafiloski, E., & Mishev, A , “Blockchain solutions for big data challenges: A literature review,” In IEEE EUROCON 2017-17th International Conference on Smart Technologies , IEEE. pp. 763-768, 2017
[49] Goodfellow, I., Bengio, Y., & Courville, A,”Machine learning basics,” Deep learning, vol.1, no.7, pp.98-164, 2016.
[50] P.Maungmeesri, K. Kantananon, B. Maungmeesri, D. Maneetham, “ The Innovation for Smart Patient Screening Platform via IoT System,” International Journal of Engineering Trends and Technology, vol.70, no.2, pp.192-200, 2022.