International Scientific Journal of Engineering and Management

An International Scholarly || Multidisciplinary || Open Access || Indexing in all major Database & Metadata
The journal follows the UGC Guidelines and is evaluated for inclusion in the Web of Science
ISSN: 2583-6129

Impact Factor: 7.839

IoT Security: Intrusion Detection and Mitigation

  • Version
  • Download 10
  • File Size 635.04 KB
  • File Count 1
  • Create Date 27 April 2025
  • Last Updated 27 April 2025

 IOT Security: Intrusion Detection and Mitigation

Authors:

YEKOLLU SAI VENKATA SATHYA PAVAN SAHIL, SANEPALLI CHARAN SHIVA KUMAR, MARIYALA HARSHITH REDDY, DEVINENI SUSHANTH, DONEPUDI ROHINI

AbstractBusinesses in almost every industry have been redesigned for smarter communication and automation through investments in the Internet of Things (IoT). However, this technological change has brought about scale of cybersecurity issues with it as IoT devices are highly heterogeneous and quite limited in resources. The Internet of things (IoT) is without a doubt one of the most commercially viable technologies in history, with billions of IoT devices in use every day. However, the interconnected nature of these devices also means that they are highly vulnerable to cyber-attacks, and technological developments may prove insufficient to mitigate this threat. In this paper we study specific security challenges posed by IoT ecosystems; outline various potential innovative solutions such as lightweight encryption [1] mutual authentication [2], intrusion detection systems [3] proposed works; provide an overview of existing machine learning tools used for anomaly detection powered with Artificial intelligence which has made it easier for researchers and industries securing their Resources/trade requires building defense mechanisms using intelligent behavior over time when facing repeated cost-cyber domain attacks which operates like networks forming patterns("[4–30]). Since all these techniques still rely heavily on algorithms designed around predefined rulesets in order display higher level management capabilities suit individual needs some users near crux making lack dynamicity will result further exploitation future** The report also covers testimonials of fresh securing mechanisms like blockchain and quantum encryption as potential solutions to the proliferating threat landscape narrows down.


Download

Author's Blog

What is the difference between a Research Paper and a Review Paper?

A research paper and a review paper are both scholarly documents, but they serve different purposes and have different characteristics....
Read More
Author's Blog

What is DOI?

A Digital Object Identifier (DOI) is a unique alphanumeric string that is used to identify and provide a persistent link...
Read More
Author's Blog

What do you need to do during production of your Research Paper?

During the production of a research paper, the following steps need to be taken: conducting research, organizing and analyzing data,...
Read More
Author's Blog

What are the advantages of publishing a research paper?

Publishing a research paper can have many advantages for researchers, including: Career advancement, professional recognition, opportunities for collaboration, increased visibility,...
Read More
Author's Blog

Ways to Support your Academic Wellbeing which preparing the Research Paper/Article

To support your academic wellbeing while publishing a research paper, it's important to set realistic goals, manage your time effectively,...
Read More
Author's Blog

How to improve your Research Paper writing Skills?

Read extensively: One of the best ways to improve your research paper skills is to read extensively in your field...
Read More
Author's Blog

Is DOI compulsory to publish a research paper in a Journal?

DOI is not strictly required to publish a research paper, but it is highly recommended. Basically, the International Scientific Journal...
Read More
Author's Blog

In what ways does research paper give weight to career development?

Publishing a research paper can give weight to a researcher's career development in several ways, such as: establishing oneself as...
Read More
Author's Blog

How to develop a Research Paper from Scratch

Developing a research paper involves several steps including: choosing a topic, conducting background research, formulating a research question or hypothesis,...
Read More
Author's Blog

How Plagiarism report plays crucial role in Research Paper Publication?

Plagiarism is a major concern in the academic and research community, as it undermines the integrity of the research and...
Read More