Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
Towards Proactive Platforms for Mitigating Cyber Risks of IoT Devices Using Frameworks AI, Blockchain and DLT as an Approach to Security Enhancement: A Comparative Survey with Caliax platform
Author(s):
1. Ahmed Aljhayyish: College of Computing and IT Engineering, Information Technology Department, University of Qom, and Assistant Teacher, Computer Technology Engineering Department, University of Imam Kadhum, Diwaniyah Sections, Iraq.
2. Asghar Tajoddin: Department of Electrical and Engineering, Faculty of Computer, University of Zanjan, Iran.
3. Nawar Jumaah: Department of Computer Engineering, Ministry of Education, Baghdad, Iraq.
Abstract:
In the rapidly expanding IoT landscape, security concerns, particularly regarding old firmware, are gaining greater significance. This paper surveys comparisons of the top IoT platforms, such as AWS IoT, Microsoft Azure IoT, Google Cloud IoT, and the CALIAX platform IoT, with a special emphasis on secure over-the-air (OTA) firmware updates. CALIAX differentiates itself by incorporating artificial intelligence (AI), blockchain, and decentralized technologies to improve security. The research analyzes important metrics, including OTA success rates, scalability, energy usage, and security protocols. Studying the structures of these platforms shows the benefits of merging AI and blockchain to enhance IoT security, guaranteeing preemptive defense and effective update processes. Moreover, issues such as maintaining data accuracy and ensuring network stability are also being tackled. The results highlight the capability of AI and blockchain technologies to ensure the security of IoT devices, providing a more durable and adaptable method for handling OTA firmware updates in different industries.
Page(s): 1909-1918
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 16, Issue: 4, Year: 2024
Keywords:
Blockchain , IoT security , AI , CALIAX Platform IoT , OTA Firmware Updates
References:
[1] Al-Fuqaha A.,Guizani M.,Mohammadi M.,Aledhari M.,Ayyash M. .2015 .Internet of Things: A survey on enabling technologies, protocols, and applications. ” IEEE Communications Surveys & Tutorials, 17(4) : 2347-2376.
[2] Wang J. C.,Xu J.,Hao S.,Yi W.,Zhong J.,Networks Communication .2022 .The impact of OTA firmware updates on IoT-Deepsense: Behavioral security detection of IoT devices. , : .
[3] Kim Y.,Kum S.,Yu M.,Moon J. .2023 .AI management platform with embedded edge cluster. ” Journal of IoT Security, : .
[4] Hasan H. R.,Salah K.,I. Yaqoob K.,Jayaraman R.,Pesic S.,Omar M. .2022 .Trustworthy IoT data streaming using blockchain and. , : .
[5] M. I. Alghamdi .2022 .A hybrid model for intrusion detection in IoT applications. Wireless Communications and Mobile Computing, : .
[6] Grover S.,Broll B.,Babb D. .2023 .Cybersecurity education in the age of AI: Integrating AI learning into high school curricula. Cybersecurity Journal, : .
[7] Youssef M.,Kong L.,Min X.,Qu Y. .2023 .IoT security challenges in smart cities: A review of security solutions and technologies. ” IEEE Transactions on Services Computing, : .
[8] Hussain A.,Kandan R.,Ong H. H. .2023 .A survey of machine learning techniques for IoT security. Future Generation Computer Systems, : .
[9] Zhao M.,Saba T.,Khan A. R.,Hong S. .2021 .A survey on blockchain technology for IoT security. ” IEEE Internet of Things Journal, : .
[10] Aljhayyish A.,Tajoddin A.,Alftlawi A. .2024 .Enhancing IoT Devices Security with AI: Platform for Proactive Cyberattack Risk Management,”. Journal of Electrical Systems, : .
[11] AlJabri Z.,Huda S. .2023 .A comprehensive review of lightweight authenticated encryption for IoT devices. Wireless Communications and Mobile Computing, 9071969 : .
[12] Sharma S.,Aerosols Atmospheric .2022 .AI verification platform using blockchain with distributed ledger technology (DLT), Nucleation. , : .
[13] Grover S.,Broll B.,Babb D. .2023 .Cybersecurity education in the age of AI: Integrating AI learning into cybersecurity high school curricula. , : .
[14] Yadav S.,Sharma K.,Kumar C.,Arora A. .2021 .Blockchain-based synergistic solution to current cybersecurity frameworks. Multimedia Tools and Applications, : .
[15] Elo M.,T. M. M.,T. M. M.,Improving M. .2021 .IoT federation resiliency with distributed ledger technology. IEEE Access, 9 : 161695-161708.
[16] Saba T.,Khan A. R.,Sadad T.,Hong S. .2022 .Securing the IoT system of smart city against cyber threats using deep learning. Discrete Dynamics in Nature and Society, 1241122 : .
[17] Tejaswi B.,Mannan M.,M. M. .2023 .Youssef, all your IoT devices are belong to us: Security weaknesses in IoT management platforms. , : .
[18] Jiao T. R.,Kong L.,Min X.,Qu Y. .2022 .Blockchain for AI: A disruptive integration. Proceedings of the International Conference, : .
[19] Lourens M. E.,Dabral A. P.,Gangodkar D.,Rathour N.,Tida N.,Chadha A. .2022 .Integration of AI with cybersecurity: A detailed systematic review with practical issues and challenges. , : .
[20] Peterson Y. .2023 .Enhancing IoT security and privacy with trusted execution environments and machine learning. , : .
[21] Kumar S. .2023 .Cybersecurity flood attacks and risk assessment for Internet of Things (IoT) distributed systems. , : .
[22] Bukhary I.,Ismail M. F.,Kandan R.,Ong H. H. .2019 .On-premise AI platform: From DC to edge. , : .
[23] I. Emanuilov .2020 .Security through transparency and openness in computer design. , : .
[24] Koirala A.,Bista R.,Ferreira J. .2023 .Enhancing IoT device security through network attack data analysis using machine learning algorithms. Future Internet, : .
[25] Shelke P. A. .2023 .Enhancing IoT security and privacy with trusted execution environments and machine learning. , : .
[26] Tejaswi B.,Mannan M.,M. M. .2023 .Youssef, all your IoT devices are belong to us: Security weaknesses in IoT management platforms. , : .
Citations
Citations are not available for this document.
0

Citations

0

Downloads

17

Views