Strengthening Cyber Resilience through IoBT Best Practices: Future Applications
DOI:
https://doi.org/10.55927/fjst.v4i1.13260Keywords:
Artificial Intelligence, Cybersecurity Innovation, Internet of Battlefield Things, Curriculum, Systematic Literature ReviewAbstract
In today's digital era, Internet of Battlefield Things (IoBT) security has become particularly important in ensuring the success of military operations and national security. Through systematic literature observations reviewing publications from 2015 to 2024, this research aims to identify and implement best practices for securing IoBT in state protection, explore potential study topics for future development, and suggest significant IoBT security research topics for researchers. The research results show that developing strong security standards, implementing effective cybersecurity, increasing security awareness, and training, and developing a curriculum are critical to securing IoBT. Additionally, this research also identifies research opportunities that can help implement effective IoBT security strategies and inspire the development of various training curricula. These recommendations will help implement the best IoBT security practices to enhance national security and inspire academic innovation.
Downloads
References
Abbas, S. G., Hashmat, F., & Shah, G. A. (2020). A Multi-layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 1820–1825. Guangzhou, China: IEEE. doi: 10.1109/TrustCom50675.2020.00249
Abel, E., Muhammad Shafie, A. L., & Howe Chan, W. (2021). Deployment of internet of things-based cloudlet-cloud for surveillance operations. IAES International Journal of Artificial Intelligence (IJ-AI), 10(1), 24. doi: 10.11591/ijai.v10.i1.pp24-34
Agarwal, S., Agarwal, V. D., Mittal, V., & Agarwal, I. (2023). Review of Effect of Internet of Things(IoT) in Cybercrime. International Journal for Research in Applied Science and Engineering Technology, 11(6), 4672–4678. doi: 10.22214/ijraset.2023.54519
Arina, A. (2021). Analysis of IoT security issues used in Higher Education Institutions. INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER RESEARCH, 09(05). doi: 10.47191/ijmcr/v9i5.01
Azzedin, F., & Alhejri, I. (2022). A Layered Taxonomy of Internet of Things Attacks. Proceedings of the 6th International Conference on Future Networks & Distributed Systems, 631–636. Tashkent TAS Uzbekistan: ACM. doi: 10.1145/3584202.3584297
Bhardwaj, A., Kaushik, K., & Kumar, M. (2022). Taxonomy of Security Attacks on Internet of Things. In O. Kaiwartya, K. Kaushik, S. K. Gupta, A. Mishra, & M. Kumar (Eds.), Security and Privacy in Cyberspace (pp. 1–24). Singapore: Springer Nature Singapore. doi: 10.1007/978-981-19-1960-2_1
Bou-Harb, E., & Neshenko, N. (2020). Taxonomy of IoT Vulnerabilities. In E. Bou-Harb & N. Neshenko, Cyber Threat Intelligence for the Internet of Things (pp. 7–58). Cham: Springer International Publishing. doi: 10.1007/978-3-030-45858-4_2
Bruder, R., Stockinger, C., Petrat, D., & Subtil, I. (2021). Development of Cooperative Artificial Intelligence (AI) Applications to Support Human Work in Manufacturing. In N. L. Black, W. P. Neumann, & I. Noy (Eds.), Proceedings of the 21st Congress of the International Ergonomics Association (IEA 2021) (pp. 391–397). Cham: Springer International Publishing. doi: 10.1007/978-3-030-74608-7_49
Canca, C. (2023). AI Ethics and Governance in Defence Innovation. In M. Raska & R. A. Bitzinger, The AI Wave in Defence Innovation (1st ed., pp. 59–79). London: Routledge. doi: 10.4324/9781003218326-4
Casasempere-Satorres, A., & Vercher-Ferrándiz, M. L. (2020). Análisis Documental Bibliográfico. Obteniendo El Máximo Rendimiento A La Revisión De La Literatura En Investigaciones Cualitativas. In F. Freitas, I. Pinho, A. I. Rodrigues, B. M. Faria, & A. Pedro, New Trends In Qualitative Research (pp. 247–257). Ludomedia. doi: 10.36367/ntqr.4.2020.247-257
Dwaraka Srihith I., David Donald A., Aditya Sai Srinivas T., Anjali D., & Chandana A. (2023). Firmware Attacks: The Silent Threat to Your IoT Connected Devices. International Journal of Advanced Research in Science, Communication and Technology, 145–154. doi: 10.48175/IJARSCT-9104
Espinosa García, J., Hernández Encinas, L., & Peinado Domínguez, A. (2021). A Comprehensive Security Framework Proposal to Contribute to Sustainability. Sustainability, 13(12), 6901. doi: 10.3390/su13126901
Færøy, F., Yamin, M., Shukla, A., & Katt, B. (2023). Automatic Verification and Execution of Cyber Attack on IoT Devices. Sensors, 23(2), 733. doi: 10.3390/s23020733
Feng, Y., Li, M., Zeng, C., & Liu, H. (2020). Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective. Entropy, 22(10), 1166. (F:JURNALIOBT). doi: 10.3390/e22101166
Gang, Z.-H., Yu, C.-Y., Huang, H.-B., & Wang, L.-J. (2020). Research on International and Domestic Internet of Things Security Policy. 2020 2nd International Conference on Information Technology and Computer Application (ITCA), 521–524. Guangzhou, China: IEEE. doi: 10.1109/ITCA52113.2020.00115
Garg, A., Singh, A., Sharma, K., & Sharma, V. (2022). A Taxonomy for Internet of Things in Security Distributed Denial of Service Attacks. 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 1274–1281. Greater Noida, India: IEEE. doi: 10.1109/ICAC3N56670.2022.10074432
Goel, S., Somya, Sutar, S., & Mekala, P. (2023). Malicious Node Detection in Heterogeneous Internet of Things. In A. K. Dubey, V. Sugumaran, & P. H. J. Chong (Eds.), Advanced IoT Sensors, Networks and Systems (pp. 155–172). Singapore: Springer Nature Singapore. doi: 10.1007/978-981-99-1312-1_13
Haas, Z. J., Culver, T. L., & Sarac, K. (2021). Vulnerability Challenges of Software Defined Networking. IEEE Communications Magazine, 59(7), 88–93. doi: 10.1109/MCOM.001.2100128
Hemmati, A., & Rahmani, A. M. (2022). The Internet of Autonomous Things applications: A taxonomy, technologies, and future directions. Internet of Things, 20, 100635. doi: 10.1016/j.iot.2022.100635
Hussain, A., Sharif, H., Rehman, F., Kirn, H., Sadiq, A., Khan, M. S., … Chandio, A. H. (2023). A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL. 2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 1–5. Sukkur, Pakistan: IEEE. doi: 10.1109/iCoMET57998.2023.10099142
Jaiswal, D., Arora, K., Varshney, M., & Gupta, T. (2023). A Hybrid Method for Network Intrusion Detection. 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC), 732–738. Jalandhar, India: IEEE. doi: 10.1109/ICSCCC58608.2023.10176754
Kanciak, K., Jarosz, M., Glebocki, P., & Wrona, K. (2021). Enabling civil-military information sharing in federated smart environments. 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), 897–902. New Orleans, LA, USA: IEEE. doi: 10.1109/WF-IoT51360.2021.9595715
Koller, M. (2022). Recommendations for Safety-Conscious Smart Device Use by Military Professionals. Academic and Applied Research in Military and Public Management Science, 21(2), 5–14. doi: 10.32565/aarms.2022.2.1
Li, M., Yu, Y., & Zou, Y. (2023). IoT devices firmware security detection based on static analysis technology. In L. Wang & X. Liu (Eds.), International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2023) (p. 82). Changsha, China: SPIE. doi: 10.1117/12.2679937
Mera, A. (2022). Holistic methods for protecting and testing embedded devices (Northeastern University). Northeastern University. doi: 10.17760/D20467199
Munson, K. A. H. (2022). Considerations for a Successful Cybersecurity Program. In V. A. Suveiu, Routledge Handbook of Risk Management and the Law (1st ed., pp. 265–279). New York: Routledge. doi: 10.4324/9781351107242-24
Rajasekar, V. R., & Rajkumar, S. (2023). A Study on Internet of Things Devices Vulnerabilities using Shodan. International Journal of Computing, 149–158. doi: 10.47839/ijc.22.2.3084
Rashid, A., & Khan, A. U. R. (2022). Blockchain-Based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System. IEEE Access, 10, 91572–91587. (F:JURNALIOBT). doi: 10.1109/ACCESS.2022.3201815
Rosero-Montalvo, P. D., István, Z., Tözün, P., & Hernandez, W. (2023). Hybrid Anomaly Detection Model on Trusted IoT Devices. IEEE Internet of Things Journal, 10(12), 10959–10969. doi: 10.1109/JIOT.2023.3243037
Senel, N., Kefferpütz, K., Doycheva, K., & Elger, G. (2023). Multi-Sensor Data Fusion for Real-Time Multi-Object Tracking. Processes, 11(2), 501. doi: 10.3390/pr11020501
Sharma, P., Najjar, L., & Srinivasan, S. (2023). Practical Applications to Prevent Cyberattacks on Internet on Battlefield Things (IoBT). Advanced Information Technologies and Applications, 17–24. Academy and Industry Research Collaboration Center (AIRCC). doi: 10.5121/csit.2023.130602
Stocchero, J. M., Silva, C. A., De Souza Silva, L., Lawisch, M. A., Dos Anjos, J. C. S., & De Freitas, E. P. (2023). Secure Command and Control for Internet of Battle Things Using Novel Network Paradigms. IEEE Communications Magazine, 61(5), 166–172. doi: 10.1109/MCOM.001.2101072
Swathi, Dr. N. (2022). Situational awareness and risk assessment during armed conflict using ceaseless video monitoring via IoMT. International Journal of Scientific Research in Engineering and Management, 06(05). doi: 10.55041/IJSREM13459
Tuscano, A., & Joshi, S. (2023). Significance of Cyber Security of IoT devices in the Healthcare Sector. 2023 Somaiya International Conference on Technology and Information Management (SICTIM), 12–16. Mumbai, India: IEEE. doi: 10.1109/SICTIM56495.2023.10104657
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Mohadib Mohadib, Achmad Farid Widjdi, Azhar Fathoni, Saddam Rasyidin Al Faruq

This work is licensed under a Creative Commons Attribution 4.0 International License.





























