Keywords:-
Article Content:-
Abstract
The holistic analysis conducted in this article aimed to identify vulnerabilities, cyber-attacks and ways to mitigate them in IoT systems, which are increasingly implemented in Higher Education Institutions (HEIs). Industry 4.0 is gaining ground in academia, which governs with a large volume of sensitive data, and the growing use of IoT systems brings a number of undeniable benefits and growing challenges. The creation of smart university campuses, of innovative laboratories that allow the simulation of technological processes but also of smart classes that use a mix of technologies for the education of professionals in Industry 4.0, represents the future of education. That is why the security analysis of IoT systems is very important to ensure the confidentiality, integrity and availability of academic data.
References:-
References
Mamadou Gueye and Ernesto Exposito, “University 4.0: The Industry4.0 paradigm applied to Education,” Oct. 2020.
Irina Neaga, “APPLYING INDUSTRY 4.0 AND EDUCATION 4.0 TO ENGINEERING EDUCATION,” in Proceedings 2019 Canadian Engineering Education Association (CEEA-ACEG19) Conference CEEA19, Jun. 2019, pp. 1–6.
D. Mourtzis, E. Vlachou, G. Dimitrakopoulos, and V. Zogopoulos, “Cyber- Physical Systems and Education 4.0 –The Teaching Factory 4.0 Concept,” Procedia Manufacturing, vol. 23, 2018, doi: 10.1016/j.promfg.2018.04.005.
T. Pereira, L. Barreto, and A. Amaral, “Network and information security challenges within Industry 4.0 paradigm,” Procedia Manufacturing, vol. 13, 2017, doi: 10.1016/j.promfg.2017.09.047.
Tim Hearn, “VMWare. VMware Cyber Security Report.” https://www.qassociates.co.uk/wp-content/uploads/2016/06/36300-VMware-Cyber-Security-Report.pdf (accessed Feb. 15, 2021).
Christy Pettey, “How IoT Impacts Data and Analytics,” Gartner, 2018.
https://www.gartner.com/smarterwithgartner/how-iot-impacts-data-and-analytics/ (accessed Feb. 23, 2021).
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions,” Jul. 2012, Accessed: Feb. 28, 2021. [Online]. Available: https://arxiv.org/abs/1207.0203.
M. Poongothai, A. L., and R. Priyadharshini, “Implementation of IoT based Smart Laboratory,” International Journal of Computer Applications, vol. 182, no. 15, Sep. 2018, doi: 10.5120/ijca2018917853.
Madhura Rao, Neetha, Rao Swathi, Sneha M, Shannon Kotian, and Nagaraja Rao, “An IoT Based Smart Campus System ,” International Journal of Scientific & Engineering Research, vol. 9, no. 4, Apr. 2018.
“Machine-to-Machine Communications (M2M); Functional Architecture,” ETSI TS 102 690 v2.1.1, 2013.
David Hanes and Gonzalo Salgueiro, Networking Technologies, Protocols, And Use Cases For The Internet Of Things, 1st ed., vol. 2017.
I. Andrea, C. Chrysostomou, and G. Hadjichristofi, “Internet of Things: Security vulnerabilities and challenges,” Jul. 2015,
doi: 10.1109/ISCC.2015.7405513.
A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks,” Communications of the ACM, vol. 47, no. 6, Jun. 2004,
doi: 10.1145/990680.990707.
Li, “Study on security architecture in the Internet of Things,” in In Measurement, Information and Control (MIC), 2012 International Conference, 2012, pp. 374–377.
A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, “A survey on jamming attacks and countermeasures in WSNs,” IEEE Communications Surveys & Tutorials, vol. 11, no. 4, 2009, doi: 10.1109/SURV.2009.090404.
“Security On The Industrial Internet of Things: The essentials of a secure network,” Deutsche Telekom AG Corporate Communications, 2016.
“Internet of Things,” OWASP.
https://owasp.org/www-project- internet-of-things/ (accessed Feb. 20, 2021).
Navas RE, le Bouder H, Cuppens N, Cuppens F, and Papadopoulos GZ, “Do not trust your neighbors! a small IoT platform illustrating a man-in-the-middle attack,” in International conference on ad-hoc networks and wireless, 2018, pp. 120–125.
A., T. Niculcea, P. Ranaweera, and N.-A. Le-Khac, “Security Considerations for Internet of Things: A Survey,” SN Computer Science, vol. 1, no. 4, Jul. 2020, doi: 10.1007/s42979-020-00201-3.
M. A. Hussain, H. Jin, Z. A. Hussien, Z. A. Abduljabbar, S. H. Abbdal, and A. Ibrahim, “Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing,” Security and Communication Networks, vol. 2017, 2017, doi: 10.1155/2017/9479476.
N. C. Weaver, “TCP Reset Injection,” in Encyclopedia of Cryptography and Security, Boston, MA: Springer US, 2011.
Shray Kapoor, “Session Hijacking Exploiting TCP, UDP and HTTP Sessions”, 2006.
A. Bijalwan, M. Wazid, E. S. Pilli, and R. C. Joshi, “Forensics of Random-UDP Flooding Attacks,” Journal of Networks, vol. 10, no. 5, May 2015, doi: 10.4304/jnw.10.5.287-293.
G. Nebbione and M. C. Calzarossa, “Security of IoT Application Layer Protocols: Challenges and Findings,” Future Internet, vol. 12, no. 3, Mar. 2020, doi: 10.3390/fi12030055.
C. M. Medaglia and A. Serbanati, “An Overview of Privacy and Security Issues in the Internet of Things,” in The Internet of Things, New York, NY: Springer New York, 2010.
CISCO, “IoT security fundamentals,” CISCO. https://static-course-assets.s3.amazonaws.com/IoTFIoTSec10/en/index.html#5.1.1.2 (accessed Feb. 14, 2021).
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle, “Security Challenges in the IP-based Internet of Things,” Wireless Personal Communications, vol. 61, no. 3, Dec. 2011, doi: 10.1007/s11277-011-0385-5.
D. Wu and G. Hu, “Research and improve on secure routing protocols in wireless sensor networks.,” in Circuits and Systems for Communications, 2008. ICCSC 2008. 4th IEEE International Conference, 2008, pp. 853–856.
E. Bertin, D. Hussein, C. Sengul, and V. Frey, “Access control in the Internet of Things: a survey of existing approaches and open research questions,” Annals of Telecommunications, vol. 74, no. 7–8, Aug. 2019, doi: 10.1007/s12243-019-00709-7.