Strengthening Cyber Resilience through IoBT Best Practices: Future Applications

Authors

  • Mohadib Mohadib Universitas Pamulang
  • Achmad Farid Widjdi Universitas Pamulang
  • Azhar Fathoni Universitas Pamulang
  • Saddam Rasyidin Al Faruq Universitas Pamulang

DOI:

https://doi.org/10.55927/fjst.v4i1.13260

Keywords:

Artificial Intelligence, Cybersecurity Innovation, Internet of Battlefield Things, Curriculum, Systematic Literature Review

Abstract

In today's digital era, Internet of Battlefield Things (IoBT) security has become particularly important in ensuring the success of military operations and national security. Through systematic literature observations reviewing publications from 2015 to 2024, this research aims to identify and implement best practices for securing IoBT in state protection, explore potential study topics for future development, and suggest significant IoBT security research topics for researchers. The research results show that developing strong security standards, implementing effective cybersecurity, increasing security awareness, and training, and developing a curriculum are critical to securing IoBT. Additionally, this research also identifies research opportunities that can help implement effective IoBT security strategies and inspire the development of various training curricula. These recommendations will help implement the best IoBT security practices to enhance national security and inspire academic innovation.

Downloads

Download data is not yet available.

References

Abbas, S. G., Hashmat, F., & Shah, G. A. (2020). A Multi-layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 1820–1825. Guangzhou, China: IEEE. doi: 10.1109/TrustCom50675.2020.00249

Abel, E., Muhammad Shafie, A. L., & Howe Chan, W. (2021). Deployment of internet of things-based cloudlet-cloud for surveillance operations. IAES International Journal of Artificial Intelligence (IJ-AI), 10(1), 24. doi: 10.11591/ijai.v10.i1.pp24-34

Agarwal, S., Agarwal, V. D., Mittal, V., & Agarwal, I. (2023). Review of Effect of Internet of Things(IoT) in Cybercrime. International Journal for Research in Applied Science and Engineering Technology, 11(6), 4672–4678. doi: 10.22214/ijraset.2023.54519

Arina, A. (2021). Analysis of IoT security issues used in Higher Education Institutions. INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER RESEARCH, 09(05). doi: 10.47191/ijmcr/v9i5.01

Azzedin, F., & Alhejri, I. (2022). A Layered Taxonomy of Internet of Things Attacks. Proceedings of the 6th International Conference on Future Networks & Distributed Systems, 631–636. Tashkent TAS Uzbekistan: ACM. doi: 10.1145/3584202.3584297

Bhardwaj, A., Kaushik, K., & Kumar, M. (2022). Taxonomy of Security Attacks on Internet of Things. In O. Kaiwartya, K. Kaushik, S. K. Gupta, A. Mishra, & M. Kumar (Eds.), Security and Privacy in Cyberspace (pp. 1–24). Singapore: Springer Nature Singapore. doi: 10.1007/978-981-19-1960-2_1

Bou-Harb, E., & Neshenko, N. (2020). Taxonomy of IoT Vulnerabilities. In E. Bou-Harb & N. Neshenko, Cyber Threat Intelligence for the Internet of Things (pp. 7–58). Cham: Springer International Publishing. doi: 10.1007/978-3-030-45858-4_2

Bruder, R., Stockinger, C., Petrat, D., & Subtil, I. (2021). Development of Cooperative Artificial Intelligence (AI) Applications to Support Human Work in Manufacturing. In N. L. Black, W. P. Neumann, & I. Noy (Eds.), Proceedings of the 21st Congress of the International Ergonomics Association (IEA 2021) (pp. 391–397). Cham: Springer International Publishing. doi: 10.1007/978-3-030-74608-7_49

Canca, C. (2023). AI Ethics and Governance in Defence Innovation. In M. Raska & R. A. Bitzinger, The AI Wave in Defence Innovation (1st ed., pp. 59–79). London: Routledge. doi: 10.4324/9781003218326-4

Casasempere-Satorres, A., & Vercher-Ferrándiz, M. L. (2020). Análisis Documental Bibliográfico. Obteniendo El Máximo Rendimiento A La Revisión De La Literatura En Investigaciones Cualitativas. In F. Freitas, I. Pinho, A. I. Rodrigues, B. M. Faria, & A. Pedro, New Trends In Qualitative Research (pp. 247–257). Ludomedia. doi: 10.36367/ntqr.4.2020.247-257

Dwaraka Srihith I., David Donald A., Aditya Sai Srinivas T., Anjali D., & Chandana A. (2023). Firmware Attacks: The Silent Threat to Your IoT Connected Devices. International Journal of Advanced Research in Science, Communication and Technology, 145–154. doi: 10.48175/IJARSCT-9104

Espinosa García, J., Hernández Encinas, L., & Peinado Domínguez, A. (2021). A Comprehensive Security Framework Proposal to Contribute to Sustainability. Sustainability, 13(12), 6901. doi: 10.3390/su13126901

Færøy, F., Yamin, M., Shukla, A., & Katt, B. (2023). Automatic Verification and Execution of Cyber Attack on IoT Devices. Sensors, 23(2), 733. doi: 10.3390/s23020733

Feng, Y., Li, M., Zeng, C., & Liu, H. (2020). Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective. Entropy, 22(10), 1166. (F:JURNALIOBT). doi: 10.3390/e22101166

Gang, Z.-H., Yu, C.-Y., Huang, H.-B., & Wang, L.-J. (2020). Research on International and Domestic Internet of Things Security Policy. 2020 2nd International Conference on Information Technology and Computer Application (ITCA), 521–524. Guangzhou, China: IEEE. doi: 10.1109/ITCA52113.2020.00115

Garg, A., Singh, A., Sharma, K., & Sharma, V. (2022). A Taxonomy for Internet of Things in Security Distributed Denial of Service Attacks. 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 1274–1281. Greater Noida, India: IEEE. doi: 10.1109/ICAC3N56670.2022.10074432

Goel, S., Somya, Sutar, S., & Mekala, P. (2023). Malicious Node Detection in Heterogeneous Internet of Things. In A. K. Dubey, V. Sugumaran, & P. H. J. Chong (Eds.), Advanced IoT Sensors, Networks and Systems (pp. 155–172). Singapore: Springer Nature Singapore. doi: 10.1007/978-981-99-1312-1_13

Haas, Z. J., Culver, T. L., & Sarac, K. (2021). Vulnerability Challenges of Software Defined Networking. IEEE Communications Magazine, 59(7), 88–93. doi: 10.1109/MCOM.001.2100128

Hemmati, A., & Rahmani, A. M. (2022). The Internet of Autonomous Things applications: A taxonomy, technologies, and future directions. Internet of Things, 20, 100635. doi: 10.1016/j.iot.2022.100635

Hussain, A., Sharif, H., Rehman, F., Kirn, H., Sadiq, A., Khan, M. S., … Chandio, A. H. (2023). A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL. 2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 1–5. Sukkur, Pakistan: IEEE. doi: 10.1109/iCoMET57998.2023.10099142

Jaiswal, D., Arora, K., Varshney, M., & Gupta, T. (2023). A Hybrid Method for Network Intrusion Detection. 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC), 732–738. Jalandhar, India: IEEE. doi: 10.1109/ICSCCC58608.2023.10176754

Kanciak, K., Jarosz, M., Glebocki, P., & Wrona, K. (2021). Enabling civil-military information sharing in federated smart environments. 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), 897–902. New Orleans, LA, USA: IEEE. doi: 10.1109/WF-IoT51360.2021.9595715

Koller, M. (2022). Recommendations for Safety-Conscious Smart Device Use by Military Professionals. Academic and Applied Research in Military and Public Management Science, 21(2), 5–14. doi: 10.32565/aarms.2022.2.1

Li, M., Yu, Y., & Zou, Y. (2023). IoT devices firmware security detection based on static analysis technology. In L. Wang & X. Liu (Eds.), International Conference on Intelligent Systems, Communications, and Computer Networks (ISCCN 2023) (p. 82). Changsha, China: SPIE. doi: 10.1117/12.2679937

Mera, A. (2022). Holistic methods for protecting and testing embedded devices (Northeastern University). Northeastern University. doi: 10.17760/D20467199

Munson, K. A. H. (2022). Considerations for a Successful Cybersecurity Program. In V. A. Suveiu, Routledge Handbook of Risk Management and the Law (1st ed., pp. 265–279). New York: Routledge. doi: 10.4324/9781351107242-24

Rajasekar, V. R., & Rajkumar, S. (2023). A Study on Internet of Things Devices Vulnerabilities using Shodan. International Journal of Computing, 149–158. doi: 10.47839/ijc.22.2.3084

Rashid, A., & Khan, A. U. R. (2022). Blockchain-Based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System. IEEE Access, 10, 91572–91587. (F:JURNALIOBT). doi: 10.1109/ACCESS.2022.3201815

Rosero-Montalvo, P. D., István, Z., Tözün, P., & Hernandez, W. (2023). Hybrid Anomaly Detection Model on Trusted IoT Devices. IEEE Internet of Things Journal, 10(12), 10959–10969. doi: 10.1109/JIOT.2023.3243037

Senel, N., Kefferpütz, K., Doycheva, K., & Elger, G. (2023). Multi-Sensor Data Fusion for Real-Time Multi-Object Tracking. Processes, 11(2), 501. doi: 10.3390/pr11020501

Sharma, P., Najjar, L., & Srinivasan, S. (2023). Practical Applications to Prevent Cyberattacks on Internet on Battlefield Things (IoBT). Advanced Information Technologies and Applications, 17–24. Academy and Industry Research Collaboration Center (AIRCC). doi: 10.5121/csit.2023.130602

Stocchero, J. M., Silva, C. A., De Souza Silva, L., Lawisch, M. A., Dos Anjos, J. C. S., & De Freitas, E. P. (2023). Secure Command and Control for Internet of Battle Things Using Novel Network Paradigms. IEEE Communications Magazine, 61(5), 166–172. doi: 10.1109/MCOM.001.2101072

Swathi, Dr. N. (2022). Situational awareness and risk assessment during armed conflict using ceaseless video monitoring via IoMT. International Journal of Scientific Research in Engineering and Management, 06(05). doi: 10.55041/IJSREM13459

Tuscano, A., & Joshi, S. (2023). Significance of Cyber Security of IoT devices in the Healthcare Sector. 2023 Somaiya International Conference on Technology and Information Management (SICTIM), 12–16. Mumbai, India: IEEE. doi: 10.1109/SICTIM56495.2023.10104657

Downloads

Published

2025-01-31

How to Cite

Mohadib, M., Widjdi, A. F. ., Fathoni, A. ., & Faruq, S. R. A. . (2025). Strengthening Cyber Resilience through IoBT Best Practices: Future Applications. Formosa Journal of Science and Technology, 4(1), 349–368. https://doi.org/10.55927/fjst.v4i1.13260