Fortifying the Frontier: A Critical Examination of Best Practices, Emerging Trends, and Access Management Paradigms in Securing the Expanding Internet of Things (IoT) Network

Authors

  • Amith Kumar Reddy Senior Systems Programmer, BBVA, Birmingham, Alabama, USA Author
  • Ashok Kumar Reddy Sadhu Software Engineer, Deloitte, Dallas, Texas, USA Author

Keywords:

Internet of Things (IoT), Network Security

Abstract

Rapid Development of IoT devices automates and connects numerous sectors. Growing ecosystems threaten security. IoT devices are susceptible to unauthorized access, data leakage, and crucial functionality modifications due to resource limits and large attack surfaces. This vulnerability might disrupt operations, compromise data, and threaten people.

References

1. Network Security Essentials: Applications and Standards (5th Edition) by William Stallings

2. Lightweight Cryptography for the Internet of Things: A Comprehensive Survey by J.-H. Seo et al. (2017)

3. Internet of Things (IoT) Security: A Survey by D. Minoli et al. (2017)

4. Blockchain for Internet of Things Security: A Survey by Z. Yan et al. (2019)

5. A Survey on IoT Communication Protocols: Security and Privacy Issues by B. Bandyopadhyay et al. (2015)

6. Machine Learning for Anomaly Detection in IoT Security: A Survey by S. R. Reddy et al. (2020)

7. Zero-Trust Network Access (ZTNA): A New Paradigm for Network Security by M. Farley et al. (2018)

8. Security and Privacy in Internet of Things (IoT): Challenges and Solutions by A. Bahri et al. (2016)

9. A Comprehensive Survey on Lightweight Cryptography for Resource-Constrained Devices in the Internet of Things by N. Sklavos et al. (2020)

10. Privacy-Preserving Data Aggregation in the Internet of Things: A Survey by Z. Erkin et al. (2019)

11. Physical Layer Security in Wireless Communications: From Theory to Practice by M. Bloch et al. (2015)

12. Encryption and Decryption Algorithms in Network Security by P. Gupta et al. (2014)

13. Transport Layer Security (TLS) Protocol Version 1.3 by E. Rescor (2018)

14. Datagram Transport Layer Security (DTLS) Version 1.3 by E. Rescor et al. (2016)

15. A Survey on Applications of Machine Learning for IoT Security by N. Chowdhury et al. (2020)

16. A Survey on IoT Standardization: Enabling Technologies, Applications, and Challenges by Z. Li et al. (2019)

17. Security and Privacy Considerations for Cyber-Physical Systems by A. A. Kayembe et al. (2016)

18. Lightweight Mutual Authentication Scheme for Resource-Constrained Devices in IoT Security by D. He et al. (2018)

19. Secure and Efficient Homomorphic Encryption for Cloud-Assisted IoT by L. Zhang et al. (2018)

20. Differential Privacy: A Survey of Results by C. Dwork et al. (2008)

21. Federated Learning: Collaborative Machine Learning without Centralized Data by J. Konečnỳ et al. (2016)

22. Jamming-Resistant Communication Protocols for Wireless Networks by A. D. Wood et al. (2006)

23. Radio Frequency Fingerprinting for Network Security by K. W. Ng et al. (2010)

24. Security Analysis of Lightweight Encryption Algorithms for IoT Devices by L. Jiang et al. (2018)

25. Privacy-Preserving Data Aggregation Schemes for Smart Grids by J. Liu et al. (2013)

26. Physical Layer Authentication for Multiple-Access Wireless Channels by Y.-W. Huang et al. (2006)

27. The Security of IoT Devices: Challenges and Opportunities by D. Miorandi et al. (2012)

28. A Lightweight and Secure Communication Protocol for the Internet of Things by C. H. Kim et al. (2014)

29. An Efficient and Scalable Framework for Privacy-Preserving Data Aggregation in Sensor Networks by B. Xu et al. (2006)

30. Security and Privacy in Fog Computing for IoT-Based Applications by A. Moustafa et al. (2019)

Downloads

Published

29-10-2020

How to Cite

[1]
Amith Kumar Reddy and Ashok Kumar Reddy Sadhu, “Fortifying the Frontier: A Critical Examination of Best Practices, Emerging Trends, and Access Management Paradigms in Securing the Expanding Internet of Things (IoT) Network”, J. Sci. Tech., vol. 1, no. 1, pp. 171–195, Oct. 2020, Accessed: Apr. 29, 2025. [Online]. Available: https://tsbpublisher.org/jst/article/view/74